NASA Astrophysics Data System (ADS)
Kröger, Knut; Creutzburg, Reiner
2013-03-01
The growth of Android in the mobile sector and the interest to investigate these devices from a forensic point of view has rapidly increased. Many companies have security problems with mobile devices in their own IT infrastructure. To respond to these incidents, it is important to have professional trained staff. Furthermore, it is necessary to further train their existing employees in the practical applications of mobile forensics owing to the fact that a lot of companies are trusted with very sensitive data. Inspired by these facts, this paper - a continuation of a paper of January 2012 [1] which showed the conception of a course for professional training and education in the field of computer and mobile forensics - addresses training approaches and practical exercises to investigate Android mobile devices.
Forensic analysis of social networking application on iOS devices
NASA Astrophysics Data System (ADS)
Zhang, Shuhui; Wang, Lianhai
2013-12-01
The increased use of social networking application on iPhone and iPad make these devices a goldmine for forensic investigators. Besides, QQ, Wechat, Sina Weibo and skype applications are very popular in China and didn't draw attention to researchers. These social networking applications are used not only on computers, but also mobile phones and tablets. This paper focuses on conducting forensic analysis on these four social networking applications on iPhone and iPad devices. The tests consisted of installing the social networking applications on each device, conducting common user activities through each application and correlation analysis with other activities. Advices to the forensic investigators are also given. It could help the investigators to describe the crime behavior and reconstruct the crime venue.
Automating Disk Forensic Processing with SleuthKit, XML and Python
2009-05-01
1 Automating Disk Forensic Processing with SleuthKit, XML and Python Simson L. Garfinkel Abstract We have developed a program called fiwalk which...files themselves. We show how it is relatively simple to create automated disk forensic applications using a Python module we have written that reads...software that the portable device may contain. Keywords: Computer Forensics; XML; Sleuth Kit; Python I. INTRODUCTION In recent years we have found many
Blind source computer device identification from recorded VoIP calls for forensic investigation.
Jahanirad, Mehdi; Anuar, Nor Badrul; Wahab, Ainuddin Wahid Abdul
2017-03-01
The VoIP services provide fertile ground for criminal activity, thus identifying the transmitting computer devices from recorded VoIP call may help the forensic investigator to reveal useful information. It also proves the authenticity of the call recording submitted to the court as evidence. This paper extended the previous study on the use of recorded VoIP call for blind source computer device identification. Although initial results were promising but theoretical reasoning for this is yet to be found. The study suggested computing entropy of mel-frequency cepstrum coefficients (entropy-MFCC) from near-silent segments as an intrinsic feature set that captures the device response function due to the tolerances in the electronic components of individual computer devices. By applying the supervised learning techniques of naïve Bayesian, linear logistic regression, neural networks and support vector machines to the entropy-MFCC features, state-of-the-art identification accuracy of near 99.9% has been achieved on different sets of computer devices for both call recording and microphone recording scenarios. Furthermore, unsupervised learning techniques, including simple k-means, expectation-maximization and density-based spatial clustering of applications with noise (DBSCAN) provided promising results for call recording dataset by assigning the majority of instances to their correct clusters. Copyright © 2017 Elsevier Ireland Ltd. All rights reserved.
Calibration Testing of Network Tap Devices
DOE Office of Scientific and Technical Information (OSTI.GOV)
Popovsky, Barbara; Chee, Brian; Frincke, Deborah A.
2007-11-14
Abstract: Understanding the behavior of network forensic devices is important to support prosecutions of malicious conduct on computer networks as well as legal remedies for false accusations of network management negligence. Individuals who seek to establish the credibility of network forensic data must speak competently about how the data was gathered and the potential for data loss. Unfortunately, manufacturers rarely provide information about the performance of low-layer network devices at a level that will survive legal challenges. This paper proposes a first step toward an independent calibration standard by establishing a validation testing methodology for evaluating forensic taps against manufacturermore » specifications. The methodology and the theoretical analysis that led to its development are offered as a conceptual framework for developing a standard and to "operationalize" network forensic readiness. This paper also provides details of an exemplar test, testing environment, procedures and results.« less
Buck, Ursula; Naether, Silvio; Braun, Marcel; Thali, Michael
2008-09-18
Non-invasive documentation methods such as surface scanning and radiological imaging are gaining in importance in the forensic field. These three-dimensional technologies provide digital 3D data, which are processed and handled in the computer. However, the sense of touch gets lost using the virtual approach. The haptic device enables the use of the sense of touch to handle and feel digital 3D data. The multifunctional application of a haptic device for forensic approaches is evaluated and illustrated in three different cases: the representation of bone fractures of the lower extremities, by traffic accidents, in a non-invasive manner; the comparison of bone injuries with the presumed injury-inflicting instrument; and in a gunshot case, the identification of the gun by the muzzle imprint, and the reconstruction of the holding position of the gun. The 3D models of the bones are generated from the Computed Tomography (CT) images. The 3D models of the exterior injuries, the injury-inflicting tools and the bone injuries, where a higher resolution is necessary, are created by the optical surface scan. The haptic device is used in combination with the software FreeForm Modelling Plus for touching the surface of the 3D models to feel the minute injuries and the surface of tools, to reposition displaced bone parts and to compare an injury-causing instrument with an injury. The repositioning of 3D models in a reconstruction is easier, faster and more precisely executed by means of using the sense of touch and with the user-friendly movement in the 3D space. For representation purposes, the fracture lines of bones are coloured. This work demonstrates that the haptic device is a suitable and efficient application in forensic science. The haptic device offers a new way in the handling of digital data in the virtual 3D space.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Smith, Jared M; Ferber, Aaron E; Greenlee, Elliot D
Akatosh is a highly configurable system based on the integration of the capabilities of one or more Intrusion Detection Systems (IDS) and automated forensic analysis. Akatosh reduces the false positive rates of IDSs and alleviates costs of incident response by pointing forensic personnel to the root cause of an incident on affected endpoint devices. Akatosh is able to analyze a computer system in near real-time and provide operations and forensic analyst personnel with continuous feedback on the impact of malware and software on deployed systems. Additionally, Akatosh provides the ability to look back into any prior state in the historymore » of the computer system along with the ability to compare one or more prior system states with any other prior state.« less
IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations
Lopez, Javier
2018-01-01
IoT-Forensics is a novel paradigm for the acquisition of electronic evidence whose operation is conditioned by the peculiarities of the Internet of Things (IoT) context. As a branch of computer forensics, this discipline respects the most basic forensic principles of preservation, traceability, documentation, and authorization. The digital witness approach also promotes such principles in the context of the IoT while allowing personal devices to cooperate in digital investigations by voluntarily providing electronic evidence to the authorities. However, this solution is highly dependent on the willingness of citizens to collaborate and they may be reluctant to do so if the sensitive information within their personal devices is not sufficiently protected when shared with the investigators. In this paper, we provide the digital witness approach with a methodology that enables citizens to share their data with some privacy guarantees. We apply the PRoFIT methodology, originally defined for IoT-Forensics environments, to the digital witness approach in order to unleash its full potential. Finally, we show the feasibility of a PRoFIT-compliant digital witness with two use cases. PMID:29414864
IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations.
Nieto, Ana; Rios, Ruben; Lopez, Javier
2018-02-07
IoT-Forensics is a novel paradigm for the acquisition of electronic evidence whose operation is conditioned by the peculiarities of the Internet of Things (IoT) context. As a branch of computer forensics, this discipline respects the most basic forensic principles of preservation, traceability, documentation, and authorization. The digital witness approach also promotes such principles in the context of the IoT while allowing personal devices to cooperate in digital investigations by voluntarily providing electronic evidence to the authorities. However, this solution is highly dependent on the willingness of citizens to collaborate and they may be reluctant to do so if the sensitive information within their personal devices is not sufficiently protected when shared with the investigators. In this paper, we provide the digital witness approach with a methodology that enables citizens to share their data with some privacy guarantees. We apply the PRoFIT methodology, originally defined for IoT-Forensics environments, to the digital witness approach in order to unleash its full potential. Finally, we show the feasibility of a PRoFIT-compliant digital witness with two use cases.
A Forensically Sound Adversary Model for Mobile Devices.
Do, Quang; Martini, Ben; Choo, Kim-Kwang Raymond
2015-01-01
In this paper, we propose an adversary model to facilitate forensic investigations of mobile devices (e.g. Android, iOS and Windows smartphones) that can be readily adapted to the latest mobile device technologies. This is essential given the ongoing and rapidly changing nature of mobile device technologies. An integral principle and significant constraint upon forensic practitioners is that of forensic soundness. Our adversary model specifically considers and integrates the constraints of forensic soundness on the adversary, in our case, a forensic practitioner. One construction of the adversary model is an evidence collection and analysis methodology for Android devices. Using the methodology with six popular cloud apps, we were successful in extracting various information of forensic interest in both the external and internal storage of the mobile device.
A Forensically Sound Adversary Model for Mobile Devices
Choo, Kim-Kwang Raymond
2015-01-01
In this paper, we propose an adversary model to facilitate forensic investigations of mobile devices (e.g. Android, iOS and Windows smartphones) that can be readily adapted to the latest mobile device technologies. This is essential given the ongoing and rapidly changing nature of mobile device technologies. An integral principle and significant constraint upon forensic practitioners is that of forensic soundness. Our adversary model specifically considers and integrates the constraints of forensic soundness on the adversary, in our case, a forensic practitioner. One construction of the adversary model is an evidence collection and analysis methodology for Android devices. Using the methodology with six popular cloud apps, we were successful in extracting various information of forensic interest in both the external and internal storage of the mobile device. PMID:26393812
Exposing Vital Forensic Artifacts of USB Devices in the Windows 10 Registry
2015-06-01
12b. DISTRIBUTION CODE 13. ABSTRACT (maximum 200 words) Digital media devices are regularly seized pursuant to criminal investigations and...ABSTRACT Digital media devices are regularly seized pursuant to criminal investigations and Microsoft Windows is the most commonly encountered... digital footprints available on seized computers that assist in re-creating a crime scene and telling the story of the events that occurred. Part of this
Stereolithography: a potential new tool in forensic medicine.
Dolz, M S; Cina, S J; Smith, R
2000-06-01
Stereolithography is a computer-mediated method that can be used to quickly create anatomically correct three-dimensional epoxy and acrylic resin models from various types of medical data. Multiple imaging modalities can be exploited, including computed tomography and magnetic resonance imaging. The technology was first developed and used in 1986 to overcome limitations in previous computer-aided manufacturing/milling techniques. Stereolithography is presently used to accurately reproduce both the external and internal anatomy of body structures. Current medical uses of stereolithography include preoperative planning of orthopedic and maxillofacial surgeries, the fabrication of custom prosthetic devices; and the assessment of the degree of bony and soft-tissue injury caused by trauma. We propose that there is a useful, as yet untapped, potential for this technology in forensic medicine.
Forensic print extraction using 3D technology and its processing
NASA Astrophysics Data System (ADS)
Rajeev, Srijith; Shreyas, Kamath K. M.; Panetta, Karen; Agaian, Sos S.
2017-05-01
Biometric evidence plays a crucial role in criminal scene analysis. Forensic prints can be extracted from any solid surface such as firearms, doorknobs, carpets and mugs. Prints such as fingerprints, palm prints, footprints and lip-prints can be classified into patent, latent, and three-dimensional plastic prints. Traditionally, law enforcement officers capture these forensic traits using an electronic device or extract them manually, and save the data electronically using special scanners. The reliability and accuracy of the method depends on the ability of the officer or the electronic device to extract and analyze the data. Furthermore, the 2-D acquisition and processing system is laborious and cumbersome. This can lead to the increase in false positive and true negative rates in print matching. In this paper, a method and system to extract forensic prints from any surface, irrespective of its shape, is presented. First, a suitable 3-D camera is used to capture images of the forensic print, and then the 3-D image is processed and unwrapped to obtain 2-D equivalent biometric prints. Computer simulations demonstrate the effectiveness of using 3-D technology for biometric matching of fingerprints, palm prints, and lip-prints. This system can be further extended to other biometric and non-biometric modalities.
Location tracking forensics on mobile devices
NASA Astrophysics Data System (ADS)
Sack, Stefan; Kröger, Knut; Creutzburg, Reiner
2013-03-01
The spread of navigation devices has increased significantly over the last 10 years. With the help of the current development of even smaller navigation receiver units it is to navigate with almost any current smart phone. Modern navigation systems are no longer limited to satellite navigation, but use current techniques, e.g. WLAN localization. Due to the increased use of navigation devices their relevance to forensic investigations has risen rapidly. Because navigation, for example with navigation equipment and smartphones, have become common place these days, also the amount of saved navigation data has risen rapidly. All of these developments lead to a necessary forensic analysis of these devices. However, there are very few current procedures for investigating of navigation devices. Navigation data is forensically interesting because by the position of the devices in most cases the location and the traveled path of the owner can be reconstructed. In this work practices for forensic analysis of navigation devices are developed. Different devices will be analyzed and it is attempted, by means of forensic procedures to restore the traveled path of the mobile device. For analysis of the various devices different software and hardware is used. There will be presented common procedures for securing and testing of mobile devices. Further there will be represented the specials in the investigation of each device. The different classes considered are GPS handhelds, mobile navigation devices and smartphones. It will be attempted, wherever possible, to read all data of the device. The aim is to restore complete histories of the navigation data and to forensically study and analyze these data. This is realized by the usage of current forensic software e.g. TomTology or Oxygen Forensic Suite. It is also attempted to use free software whenever possible. Further alternative methods are used (e.g. rooting) to access locked data of the unit. To limit the practical work the data extraction is focused on the frequently used device sample of a specific class, as the procedure for many groups of devices can be similar. In the present work a Garmin Dakota 10, a TomTom GO 700, an iPhone 4 (iOS) and a Samsung Galaxy S Plus (Android) is used because they have a wide circulation.
Review of Forensic Tools for Smartphones
NASA Astrophysics Data System (ADS)
Jahankhani, Hamid; Azam, Amir
The technological capability of mobile devices in particular Smartphones makes their use of value to the criminal community as a data terminal in the facilitation of organised crime or terrorism. The effective targeting of these devices from criminal and security intelligence perspectives and subsequent detailed forensic examination of the targeted device will significantly enhance the evidence available to the law enforcement community. When phone devices are involved in crimes, forensic examiners require tools that allow the proper retrieval and prompt examination of information present on these devices. Smartphones that are compliant to Global System for Mobile Communication (GSM) standards, will maintains their identity and user's personal information on Subscriber Identity Module (SIM). Beside SIM cards, substantial amount of information is stored on device's internal memory and external memory modules. The aim of this paper is to give an overview of the currently available forensic software tools that are developed to carry out forensic investigation of mobile devices and point to current weaknesses within this process.
Forensic Investigation of Cooperative Storage Cloud Service: Symform as a Case Study.
Teing, Yee-Yang; Dehghantanha, Ali; Choo, Kim-Kwang Raymond; Dargahi, Tooska; Conti, Mauro
2017-05-01
Researchers envisioned Storage as a Service (StaaS) as an effective solution to the distributed management of digital data. Cooperative storage cloud forensic is relatively new and is an under-explored area of research. Using Symform as a case study, we seek to determine the data remnants from the use of cooperative cloud storage services. In particular, we consider both mobile devices and personal computers running various popular operating systems, namely Windows 8.1, Mac OS X Mavericks 10.9.5, Ubuntu 14.04.1 LTS, iOS 7.1.2, and Android KitKat 4.4.4. Potential artefacts recovered during the research include data relating to the installation and uninstallation of the cloud applications, log-in to and log-out from Symform account using the client application, file synchronization as well as their time stamp information. This research contributes to an in-depth understanding of the types of terrestrial artifacts that are likely to remain after the use of cooperative storage cloud on client devices. © 2016 American Academy of Forensic Sciences.
Urschler, Martin; Höller, Johannes; Bornik, Alexander; Paul, Tobias; Giretzlehner, Michael; Bischof, Horst; Yen, Kathrin; Scheurer, Eva
2014-08-01
The increasing use of CT/MR devices in forensic analysis motivates the need to present forensic findings from different sources in an intuitive reference visualization, with the aim of combining 3D volumetric images along with digital photographs of external findings into a 3D computer graphics model. This model allows a comprehensive presentation of forensic findings in court and enables comparative evaluation studies correlating data sources. The goal of this work was to investigate different methods to generate anonymous and patient-specific 3D models which may be used as reference visualizations. The issue of registering 3D volumetric as well as 2D photographic data to such 3D models is addressed to provide an intuitive context for injury documentation from arbitrary modalities. We present an image processing and visualization work-flow, discuss the major parts of this work-flow, compare the different investigated reference models, and show a number of cases studies that underline the suitability of the proposed work-flow for presenting forensically relevant information in 3D visualizations. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-31
... Administrative Law Judge; Termination of the Investigation AGENCY: U.S. International Trade Commission. ACTION... law judge in the above-identified investigation. FOR FURTHER INFORMATION CONTACT: James A. Worth..., Washington d/b/a CRU-DataPort LLC of Vancouver, Washington (``CRU''); Digital Intelligence, Inc. of New...
Testing a Novel 3D Printed Radiographic Imaging Device for Use in Forensic Odontology.
Newcomb, Tara L; Bruhn, Ann M; Giles, Bridget; Garcia, Hector M; Diawara, Norou
2017-01-01
There are specific challenges related to forensic dental radiology and difficulties in aligning X-ray equipment to teeth of interest. Researchers used 3D printing to create a new device, the combined holding and aiming device (CHAD), to address the positioning limitations of current dental X-ray devices. Participants (N = 24) used the CHAD, soft dental wax, and a modified external aiming device (MEAD) to determine device preference, radiographer's efficiency, and technique errors. Each participant exposed six X-rays per device for a total of 432 X-rays scored. A significant difference was found at the 0.05 level between the three devices (p = 0.0015), with the MEAD having the least amount of total errors and soft dental wax taking the least amount of time. Total errors were highest when participants used soft dental wax-both the MEAD and the CHAD performed best overall. Further research in forensic dental radiology and use of holding devices is needed. © 2016 American Academy of Forensic Sciences.
Multimedia Forensics Is Not Computer Forensics
NASA Astrophysics Data System (ADS)
Böhme, Rainer; Freiling, Felix C.; Gloe, Thomas; Kirchner, Matthias
The recent popularity of research on topics of multimedia forensics justifies reflections on the definition of the field. This paper devises an ontology that structures forensic disciplines by their primary domain of evidence. In this sense, both multimedia forensics and computer forensics belong to the class of digital forensics, but they differ notably in the underlying observer model that defines the forensic investigator’s view on (parts of) reality, which itself is not fully cognizable. Important consequences on the reliability of probative facts emerge with regard to available counter-forensic techniques: while perfect concealment of traces is possible for computer forensics, this level of certainty cannot be expected for manipulations of sensor data. We cite concrete examples and refer to established techniques to support our arguments.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-07
... Intelligence, Inc. FOR FURTHER INFORMATION CONTACT: Lisa R. Barton, Acting Secretary to the Commission, U.S. International Trade Commission, 500 E Street SW., Washington, DC 20436, telephone (202) 708-2310. Copies of non.... International Trade Commission, 500 E Street SW., Washington, DC 20436, telephone (202) 205-2000. General...
The prevalence of encoded digital trace evidence in the nonfile space of computer media(,) (.).
Garfinkel, Simson L
2014-09-01
Forensically significant digital trace evidence that is frequently present in sectors of digital media not associated with allocated or deleted files. Modern digital forensic tools generally do not decompress such data unless a specific file with a recognized file type is first identified, potentially resulting in missed evidence. Email addresses are encoded differently for different file formats. As a result, trace evidence can be categorized as Plain in File (PF), Encoded in File (EF), Plain Not in File (PNF), or Encoded Not in File (ENF). The tool bulk_extractor finds all of these formats, but other forensic tools do not. A study of 961 storage devices purchased on the secondary market and shows that 474 contained encoded email addresses that were not in files (ENF). Different encoding formats are the result of different application programs that processed different kinds of digital trace evidence. Specific encoding formats explored include BASE64, GZIP, PDF, HIBER, and ZIP. Published 2014. This article is a U.S. Government work and is in the public domain in the USA. Journal of Forensic Sciences published by Wiley Periodicals, Inc. on behalf of American Academy of Forensic Sciences.
Windows 7 Antiforensics: A Review and a Novel Approach.
Eterovic-Soric, Brett; Choo, Kim-Kwang Raymond; Mubarak, Sameera; Ashman, Helen
2017-07-01
In this paper, we review literature on antiforensics published between 2010 and 2016 and reveal the surprising lack of up-to-date research on this topic. This research aims to contribute to this knowledge gap by investigating different antiforensic techniques for devices running Windows 7, one of the most popular operating systems. An approach which allows for removal or obfuscation of most forensic evidence is then presented. Using the Trojan software DarkComet RAT as a case study, we demonstrate the utility of our approach and that a Trojan Horse infection may be a legitimate possibility, even if there is no evidence of an infection on a seized computer's hard drive. Up-to-date information regarding how forensic artifacts can be compromised will allow relevant stakeholders to make informed decisions when deciding the outcome of legal cases involving digital evidence. © 2017 American Academy of Forensic Sciences.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-29
.... Marengo Avenue, Suite 250, Pasadena, CA 91101. Ji2, Inc., 11235 Knott Ave., Suite C, Cypress, CA 90630... Investigation Pursuant to 19 U.S.C. 1337 AGENCY: U.S. International Trade Commission. ACTION: Notice. SUMMARY..., 2011, under section 337 of the Tariff Act of 1930, as amended, 19 U.S.C. 1337, on behalf of MyKey...
Applications of Computer Technology in Intercollegiate Debate.
ERIC Educational Resources Information Center
Kay, Jack, Ed.
1986-01-01
Focusing on how computers can and should be used in intercollegiate forensics, this journal issue offers the perspectives of a number of forensics instructors. The lead article, "Applications of Computer Technology in Intercollegiate Debate" by Theodore F. Sheckels, Jr., discusses five areas in which forensics educators might use computer…
Generating a Corpus of Mobile Forensic Images for Masquerading user Experimentation.
Guido, Mark; Brooks, Marc; Grover, Justin; Katz, Eric; Ondricek, Jared; Rogers, Marcus; Sharpe, Lauren
2016-11-01
The Periodic Mobile Forensics (PMF) system investigates user behavior on mobile devices. It applies forensic techniques to an enterprise mobile infrastructure, utilizing an on-device agent named TractorBeam. The agent collects changed storage locations for later acquisition, reconstruction, and analysis. TractorBeam provides its data to an enterprise infrastructure that consists of a cloud-based queuing service, relational database, and analytical framework for running forensic processes. During a 3-month experiment with Purdue University, TractorBeam was utilized in a simulated operational setting across 34 users to evaluate techniques to identify masquerading users (i.e., users other than the intended device user). The research team surmises that all masqueraders are undesirable to an enterprise, even when a masquerader lacks malicious intent. The PMF system reconstructed 821 forensic images, extracted one million audit events, and accurately detected masqueraders. Evaluation revealed that developed methods reduced storage requirements 50-fold. This paper describes the PMF architecture, performance of TractorBeam throughout the protocol, and results of the masquerading user analysis. © 2016 American Academy of Forensic Sciences.
An Android Communication App Forensic Taxonomy.
Azfar, Abdullah; Choo, Kim-Kwang Raymond; Liu, Lin
2016-09-01
Due to the popularity of Android devices and applications (apps), Android forensics is one of the most studied topics within mobile forensics. Communication apps, such as instant messaging and Voice over IP (VoIP), are one popular app category used by mobile device users, including criminals. Therefore, a taxonomy outlining artifacts of forensic interest involving the use of Android communication apps will facilitate the timely collection and analysis of evidentiary materials from such apps. In this paper, 30 popular Android communication apps were examined, where a logical extraction of the Android phone images was collected using XRY, a widely used mobile forensic tool. Various information of forensic interest, such as contact lists and chronology of messages, was recovered. Based on the findings, a two-dimensional taxonomy of the forensic artifacts of the communication apps is proposed, with the app categories in one dimension and the classes of artifacts in the other dimension. Finally, the artifacts identified in the study of the 30 communication apps are summarized using the taxonomy. It is expected that the proposed taxonomy and the forensic findings in this paper will assist forensic investigations involving Android communication apps. © 2016 American Academy of Forensic Sciences.
Computer Forensics: Is It the Next Hot IT Subject?
ERIC Educational Resources Information Center
Williams, Victor G.; Revels, Ken
2006-01-01
Digital Forensics is not just the recovery of data or information from computer systems and their networks. It is not a procedure that can be accomplished by software alone, and most important, it is not something that can be accomplished by other than a trained IT forensic professional. Digital Forensics is an emerging science and was developed…
An introduction to computer forensics.
Furneaux, Nick
2006-07-01
This paper provides an introduction to the discipline of Computer Forensics. With computers being involved in an increasing number, and type, of crimes the trace data left on electronic media can play a vital part in the legal process. To ensure acceptance by the courts, accepted processes and procedures have to be adopted and demonstrated which are not dissimilar to the issues surrounding traditional forensic investigations. This paper provides a straightforward overview of the three steps involved in the examination of digital media: Acquisition of data. Investigation of evidence. Reporting and presentation of evidence. Although many of the traditional readers of Medicine, Science and the Law are those involved in the biological aspects of forensics, I believe that both disciplines can learn from each other, with electronic evidence being more readily sought and considered by the legal community and the long, tried and tested scientific methods of the forensic community being shared and adopted by the computer forensic world.
Three-dimensional computer visualization of forensic pathology data.
March, Jack; Schofield, Damian; Evison, Martin; Woodford, Noel
2004-03-01
Despite a decade of use in US courtrooms, it is only recently that forensic computer animations have become an increasingly important form of communication in legal spheres within the United Kingdom. Aims Research at the University of Nottingham has been influential in the critical investigation of forensic computer graphics reconstruction methodologies and techniques and in raising the profile of this novel form of data visualization within the United Kingdom. The case study presented demonstrates research undertaken by Aims Research and the Department of Forensic Pathology at the University of Sheffield, which aims to apply, evaluate, and develop novel 3-dimensional computer graphics (CG) visualization and virtual reality (VR) techniques in the presentation and investigation of forensic information concerning the human body. The inclusion of such visualizations within other CG or VR environments may ultimately provide the potential for alternative exploratory directions, processes, and results within forensic pathology investigations.
Defense Threat Reduction Agency Radiochemical Needs
NASA Astrophysics Data System (ADS)
Walsh, Michael A. R.; Velazquez, Daniel L.
2009-08-01
The United States Government (USG) first developed nuclear forensics-related capabilities to analyze radiological and nuclear materials, including underground nuclear test debris and interdicted materials. Nuclear forensics is not a new mission for Department of Defense (DoD). The department's existing nuclear forensics capability is the result of programs that span six (6) decades and includes activities to assess foreign nuclear weapons testing activities, monitor and verify nuclear arms control treaties, and to support intelligence and law enforcement activities. Today, nuclear forensics must support not only weapons programs and nuclear smuggling incidents, but also the scientific analysis and subsequent attribution of terrorists' use of radiological or nuclear materials/devices. Nuclear forensics can help divulge the source of origin of nuclear materials, the type of design for an interdicted or detonated device, as well as the pathway of the materials or device to the incident. To accomplish this mission, the USG will need trained radiochemists and nuclear scientists to fill new positions and replace the retiring staff.
Virtual reality and 3D animation in forensic visualization.
Ma, Minhua; Zheng, Huiru; Lallie, Harjinder
2010-09-01
Computer-generated three-dimensional (3D) animation is an ideal media to accurately visualize crime or accident scenes to the viewers and in the courtrooms. Based upon factual data, forensic animations can reproduce the scene and demonstrate the activity at various points in time. The use of computer animation techniques to reconstruct crime scenes is beginning to replace the traditional illustrations, photographs, and verbal descriptions, and is becoming popular in today's forensics. This article integrates work in the areas of 3D graphics, computer vision, motion tracking, natural language processing, and forensic computing, to investigate the state-of-the-art in forensic visualization. It identifies and reviews areas where new applications of 3D digital technologies and artificial intelligence could be used to enhance particular phases of forensic visualization to create 3D models and animations automatically and quickly. Having discussed the relationships between major crime types and level-of-detail in corresponding forensic animations, we recognized that high level-of-detail animation involving human characters, which is appropriate for many major crime types but has had limited use in courtrooms, could be useful for crime investigation. © 2010 American Academy of Forensic Sciences.
Extracting forensic evidence from biometric devices
NASA Astrophysics Data System (ADS)
Geradts, Zeno J.; Ruifrok, Arnout C.
2003-08-01
Over the past few years, both large multinationals and governments have begun to contribute to even larger projects on biometric devices. Terrorist attacks in America and in other countries have highlighted the need for better identification systems for people as well as improved systems for controlling access to buildings. Another reason for investment in Research and Development in Biometric Devices, is the massive growth in internet-based systems -- whether for e-commerce, e-government or internal processes within organizations. The interface between the system and the user is routinely abused, as people have to remember many complex passwords and handle tokens of various types. In this paper an overview is given of the information that is important to know before an examination of such is systems can be done in a forensic proper way. In forensic evidence with biometric devices the forensic examiner should consider the possibilities of tampering with the biometric systems or the possibilities of unauthorized access before drawing conclusions.
Client-side Skype forensics: an overview
NASA Astrophysics Data System (ADS)
Meißner, Tina; Kröger, Knut; Creutzburg, Reiner
2013-03-01
IT security and computer forensics are important components in the information technology. In the present study, a client-side Skype forensics is performed. It is designed to explain which kind of user data are stored on a computer and which tools allow the extraction of those data for a forensic investigation. There are described both methods - a manual analysis and an analysis with (mainly) open source tools, respectively.
Isotopic Ratios of Samarium by TIMS for Nuclear Forensic Application
DOE Office of Scientific and Technical Information (OSTI.GOV)
Louis Jean, James; Inglis, Jeremy David
The isotopic ratio of Nd, Sm, and Gd can provide important information regarding fissile material (nuclear devices, reactors), neutron environment, and device yield. These studies require precise measurement of Sm isotope ratios, by either TIMS or MC-ICP-MS. There has been an increasing trend to measure smaller and smaller quantities of Sm bearing samples. In nuclear forensics 10-100 ng of Sm are needed for precise measurement. To measure sub-ng Sm samples using TIMS for nuclear forensic analysis.
Computer Forensics Education - the Open Source Approach
NASA Astrophysics Data System (ADS)
Huebner, Ewa; Bem, Derek; Cheung, Hon
In this chapter we discuss the application of the open source software tools in computer forensics education at tertiary level. We argue that open source tools are more suitable than commercial tools, as they provide the opportunity for students to gain in-depth understanding and appreciation of the computer forensic process as opposed to familiarity with one software product, however complex and multi-functional. With the access to all source programs the students become more than just the consumers of the tools as future forensic investigators. They can also examine the code, understand the relationship between the binary images and relevant data structures, and in the process gain necessary background to become the future creators of new and improved forensic software tools. As a case study we present an advanced subject, Computer Forensics Workshop, which we designed for the Bachelor's degree in computer science at the University of Western Sydney. We based all laboratory work and the main take-home project in this subject on open source software tools. We found that without exception more than one suitable tool can be found to cover each topic in the curriculum adequately. We argue that this approach prepares students better for forensic field work, as they gain confidence to use a variety of tools, not just a single product they are familiar with.
NASA Astrophysics Data System (ADS)
Kröger, Knut; Creutzburg, Reiner
2014-02-01
IT security and computer forensics are important components in the information technology. From year to year, incidents and crimes increase that target IT systems or were done with their help. More and more companies and authorities have security problems in their own IT infrastructure. To respond to these incidents professionally, it is important to have well trained staff. The fact that many agencies and companies work with very sensitive data make it necessary to further train the own employees in the field of network forensics and penetration testing. Motivated by these facts, this paper - a continuation of a paper of January 2012 [1], which showed the conception of a course for professional training and education in the field of computer and mobile forensics - addresses the practical implementation important relationships of network forensic and penetration testing.
Professionalism in Computer Forensics
NASA Astrophysics Data System (ADS)
Irons, Alastair D.; Konstadopoulou, Anastasia
The paper seeks to address the need to consider issues regarding professionalism in computer forensics in order to allow the discipline to develop and to ensure the credibility of the discipline from the differing perspectives of practitioners, the criminal justice system and in the eyes of the public. There is a need to examine and develop professionalism in computer forensics in order to promote the discipline and maintain the credibility of the discipline.
Microfluidic Devices for Forensic DNA Analysis: A Review.
Bruijns, Brigitte; van Asten, Arian; Tiggelaar, Roald; Gardeniers, Han
2016-08-05
Microfluidic devices may offer various advantages for forensic DNA analysis, such as reduced risk of contamination, shorter analysis time and direct application at the crime scene. Microfluidic chip technology has already proven to be functional and effective within medical applications, such as for point-of-care use. In the forensic field, one may expect microfluidic technology to become particularly relevant for the analysis of biological traces containing human DNA. This would require a number of consecutive steps, including sample work up, DNA amplification and detection, as well as secure storage of the sample. This article provides an extensive overview of microfluidic devices for cell lysis, DNA extraction and purification, DNA amplification and detection and analysis techniques for DNA. Topics to be discussed are polymerase chain reaction (PCR) on-chip, digital PCR (dPCR), isothermal amplification on-chip, chip materials, integrated devices and commercially available techniques. A critical overview of the opportunities and challenges of the use of chips is discussed, and developments made in forensic DNA analysis over the past 10-20 years with microfluidic systems are described. Areas in which further research is needed are indicated in a future outlook.
Horsman, Graeme
2018-04-23
The forensic analysis of mobile handsets is becoming a more prominent factor in many criminal investigations. Despite such devices frequently storing relevant evidential content to support an investigation, accessing this information is becoming an increasingly difficult task due to enhanced effective security features. Where access to a device's resident data is not possible via traditional mobile forensic methods, in some cases it may still be possible to extract user information via queries made to an installed intelligent personal assistant. This article presents an evaluation of the information which is retrievable from Apple's Siri when interacted with on a locked iOS device running iOS 11.2.5 (the latest at the time of testing). The testing of verbal commands designed to elicit a response from Siri demonstrate the ability to recover call log, SMS, Contacts, Apple Maps, Calendar, and device information which may support any further investigation. © 2018 American Academy of Forensic Sciences.
[Forensic evidence-based medicine in computer communication networks].
Qiu, Yun-Liang; Peng, Ming-Qi
2013-12-01
As an important component of judicial expertise, forensic science is broad and highly specialized. With development of network technology, increasement of information resources, and improvement of people's legal consciousness, forensic scientists encounter many new problems, and have been required to meet higher evidentiary standards in litigation. In view of this, evidence-based concept should be established in forensic medicine. We should find the most suitable method in forensic science field and other related area to solve specific problems in the evidence-based mode. Evidence-based practice can solve the problems in legal medical field, and it will play a great role in promoting the progress and development of forensic science. This article reviews the basic theory of evidence-based medicine and its effect, way, method, and evaluation in the forensic medicine in order to discuss the application value of forensic evidence-based medicine in computer communication networks.
Cardiac Implantable Electronic Device Interrogation at Forensic Autopsy: An Underestimated Resource?
Lacour, Philipp; Buschmann, Claas; Storm, Christian; Nee, Jens; Parwani, Abdul Shokor; Huemer, Martin; Attanasio, Philipp; Boldt, Leif-Hendrik; Rauch, Geraldine; Kucher, Andreas; Pieske, Burkert; Haverkamp, Wilhelm; Blaschke, Florian
2018-06-19
Postmortem interrogations of cardiac implantable electronic devices (CIEDs), recommended at autopsy in suspected cases of sudden cardiac death, are rarely performed, and data on systematic postmortem CIED analysis in the forensic pathology are missing. The aim of the study was to determine whether nonselective postmortem CIED interrogations and data analysis are useful to the forensic pathologist to determine the cause, mechanism, and time of death and to detect potential CIED-related safety issues. From February 2012 to April 2017, all autopsy subjects in the department of forensic medicine at the University Hospital Charité who had a CIED underwent device removal and interrogation. Over the study period, 5368 autopsies were performed. One hundred fifty subjects had in total 151 CIEDs, including 109 pacemakers, 35 defibrillators, and 7 implantable loop recorders. In 40 cases (26.7%) time of death and in 51 cases (34.0%) cause of death could not be determined by forensic autopsy. Of these, CIED interrogation facilitated the determination of time of death in 70.0% of the cases and clarified the cause of death in 60.8%. Device concerns were identified in 9 cases (6.0%), including 3 hardware, 4 programming, and 2 algorithm issues. One CIED was submitted to the manufacturer for a detailed technical analysis. Our data demonstrate the necessity of systematic postmortem CIED interrogation in forensic medicine to determine the cause and timing of death more accurately. In addition, CIED analysis is an important tool to detect potential CIED-related safety issues. © 2018 American Heart Association, Inc.
A Term Project for a Course on Computer Forensics
ERIC Educational Resources Information Center
Harrison, Warren
2006-01-01
The typical approach to creating an examination disk for exercises and projects in a course on computer forensics is for the instructor to populate a piece of media with evidence to be retrieved. While such an approach supports the simple use of forensic tools, in many cases the use of an instructor-developed examination disk avoids utilizing some…
Featured Invention: Laser Scaling Device
NASA Technical Reports Server (NTRS)
Dunn, Carol Anne
2008-01-01
In September 2003, NASA signed a nonexclusive license agreement with Armor Forensics, a subsidiary of Armor Holdings, Inc., for the laser scaling device under the Innovative Partnerships Program. Coupled with a measuring program, also developed by NASA, the unit provides crime scene investigators with the ability to shoot photographs at scale without having to physically enter the scene, analyzing details such as bloodspatter patterns and graffiti. This ability keeps the scene's components intact and pristine for the collection of information and evidence. The laser scaling device elegantly solved a pressing problem for NASA's shuttle operations team and also provided industry with a useful tool. For NASA, the laser scaling device is still used to measure divots or damage to the shuttle's external tank and other structures around the launchpad. When the invention also met similar needs within industry, the Innovative Partnerships Program provided information to Armor Forensics for licensing and marketing the laser scaling device. Jeff Kohler, technology transfer agent at Kennedy, added, "We also invited a representative from the FBI's special photography unit to Kennedy to meet with Armor Forensics and the innovator. Eventually the FBI ended up purchasing some units. Armor Forensics is also beginning to receive interest from DoD [Department of Defense] for use in military crime scene investigations overseas."
Evaluation of the on-site immunoassay drug-screening device Triage-TOX in routine forensic autopsy.
Tominaga, Mariko; Michiue, Tomomi; Maeda, Hitoshi
2015-11-01
Instrumental identification of drugs with quantification is essential in forensic toxicology, while on-site immunoassay urinalysis drug-screening devices conveniently provide preliminary information when adequately used. However, suitable or sufficient urine specimens are not always available. The present study evaluated the efficacy of a new on-site immunoassay drug-screening device Triage-TOX (Alere Inc., San Diego, CA, USA), which has recently been developed to provide objective data on the one-step automated processor, using 51 urine and 19 pericardial fluid samples from 66 forensic autopsy cases, compared with Triage-Drug of Abuse (DOA) and Monitect-9. For benzodiazepines, the positive predictive value and specificity of Triage-TOX were higher than those of Triage-DOA; however, sensitivity was higher with Monitect-9, despite frequent false-positives. The results for the other drugs with the three devices also included a few false-negatives and false-positives. These observations indicate the applicability of Triage-TOX in preliminary drug screening using urine or alternative materials in routine forensic autopsy, when a possible false-negative is considered, especially for benzodiazepines, providing objective information; however, the combined use of another device such as Monitect-9 can help minimize misinterpretation prior to instrumental analysis. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.
USB Storage Device Forensics for Windows 10.
Arshad, Ayesha; Iqbal, Waseem; Abbas, Haider
2018-05-01
Significantly increased use of USB devices due to their user-friendliness and large storage capacities poses various threats for many users/companies in terms of data theft that becomes easier due to their efficient mobility. Investigations for such data theft activities would require gathering critical digital information capable of recovering digital forensics artifacts like date, time, and device information. This research gathers three sets of registry and logs data: first, before insertion; second, during insertion; and the third, after removal of a USB device. These sets are analyzed to gather evidentiary information from Registry and Windows Event log that helps in tracking a USB device. This research furthers the prior research on earlier versions of Microsoft Windows and compares it with latest Windows 10 system. Comparison of Windows 8 and Windows 10 does not show much difference except for new subkey under USB Key in registry. However, comparison of Windows 7 with latest version indicates significant variances. © 2017 American Academy of Forensic Sciences.
[Computer simulation by passenger wound analysis of vehicle collision].
Zou, Dong-Hua; Liu, Nning-Guo; Shen, Jie; Zhang, Xiao-Yun; Jin, Xian-Long; Chen, Yi-Jiu
2006-08-15
To reconstruct the course of vehicle collision, so that to provide the reference for forensic identification and disposal of traffic accidents. Through analyzing evidences left both on passengers and vehicles, technique of momentum impulse combined with multi-dynamics was applied to simulate the motion and injury of passengers as well as the track of vehicles. Model of computer stimulation perfectly reconstructed phases of the traffic collision, which coincide with details found by forensic investigation. Computer stimulation is helpful and feasible for forensic identification in traffic accidents.
Microfluidic Devices for Forensic DNA Analysis: A Review
Bruijns, Brigitte; van Asten, Arian; Tiggelaar, Roald; Gardeniers, Han
2016-01-01
Microfluidic devices may offer various advantages for forensic DNA analysis, such as reduced risk of contamination, shorter analysis time and direct application at the crime scene. Microfluidic chip technology has already proven to be functional and effective within medical applications, such as for point-of-care use. In the forensic field, one may expect microfluidic technology to become particularly relevant for the analysis of biological traces containing human DNA. This would require a number of consecutive steps, including sample work up, DNA amplification and detection, as well as secure storage of the sample. This article provides an extensive overview of microfluidic devices for cell lysis, DNA extraction and purification, DNA amplification and detection and analysis techniques for DNA. Topics to be discussed are polymerase chain reaction (PCR) on-chip, digital PCR (dPCR), isothermal amplification on-chip, chip materials, integrated devices and commercially available techniques. A critical overview of the opportunities and challenges of the use of chips is discussed, and developments made in forensic DNA analysis over the past 10–20 years with microfluidic systems are described. Areas in which further research is needed are indicated in a future outlook. PMID:27527231
Comparing Two Tools for Mobile-Device Forensics
2017-09-01
baseline standard. 2.4 Mobile Operating Systems "A mobile operating system is an operating system that is specifically designed to run on mobile devices... run on mobile devices" [7]. There are many different types of mobile operating systems and they are constantly changing, which means an operating...to this is that the security features make forensic analysis more difficult [11]. 2.4.2 iPhone "The iPhone runs an operating system called iOS. It is a
Inquiry-Based Learning Case Studies for Computing and Computing Forensic Students
ERIC Educational Resources Information Center
Campbell, Jackie
2012-01-01
Purpose: The purpose of this paper is to describe and discuss the use of specifically-developed, inquiry-based learning materials for Computing and Forensic Computing students. Small applications have been developed which require investigation in order to de-bug code, analyse data issues and discover "illegal" behaviour. The applications…
[Possibilities of use of digital imaging in forensic medicine].
Gaval'a, P; Ivicsics, I; Mlynár, J; Novomeský, F
2005-07-01
Based on the daily practice with digital photography and documentation, the authors point out the achievements of the computer technologies implementation to the practice of forensic medicine. The modern methods of imaging, especially the digital photography, offer a wide spectrum of use in forensic medicine--the digital documentation and archivation of autopsy findings, the possibility of immediate consultation of findings with another experts via Internet, and many others. Another possibility is a creation of digital photographic atlas of forensic medicine as a useful aid in pre- and postgradual study. Thus the application of the state-of-the-art computer technologies to the forensic medicine discloses the unknown before possibilities for further development of such a discipline of human medical sciences.
The Defense Threat Reduction Agency's Technical Nuclear Forensics Research and Development Program
NASA Astrophysics Data System (ADS)
Franks, J.
2015-12-01
The Defense Threat Reduction Agency (DTRA) Technical Nuclear Forensics (TNF) Research and Development (R&D) Program's overarching goal is to design, develop, demonstrate, and transition advanced technologies and methodologies that improve the interagency operational capability to provide forensics conclusions after the detonation of a nuclear device. This goal is attained through the execution of three focus areas covering the span of the TNF process to enable strategic decision-making (attribution): Nuclear Forensic Materials Exploitation - Development of targeted technologies, methodologies and tools enabling the timely collection, analysis and interpretation of detonation materials.Prompt Nuclear Effects Exploitation - Improve ground-based capabilities to collect prompt nuclear device outputs and effects data for rapid, complementary and corroborative information.Nuclear Forensics Device Characterization - Development of a validated and verified capability to reverse model a nuclear device with high confidence from observables (e.g., prompt diagnostics, sample analysis, etc.) seen after an attack. This presentation will outline DTRA's TNF R&D strategy and current investments, with efforts focusing on: (1) introducing new technical data collection capabilities (e.g., ground-based prompt diagnostics sensor systems; innovative debris collection and analysis); (2) developing new TNF process paradigms and concepts of operations to decrease timelines and uncertainties, and increase results confidence; (3) enhanced validation and verification (V&V) of capabilities through technology evaluations and demonstrations; and (4) updated weapon output predictions to account for the modern threat environment. A key challenge to expanding these efforts to a global capability is the need for increased post-detonation TNF international cooperation, collaboration and peer reviews.
Open Source Live Distributions for Computer Forensics
NASA Astrophysics Data System (ADS)
Giustini, Giancarlo; Andreolini, Mauro; Colajanni, Michele
Current distributions of open source forensic software provide digital investigators with a large set of heterogeneous tools. Their use is not always focused on the target and requires high technical expertise. We present a new GNU/Linux live distribution, named CAINE (Computer Aided INvestigative Environment) that contains a collection of tools wrapped up into a user friendly environment. The CAINE forensic framework introduces novel important features, aimed at filling the interoperability gap across different forensic tools. Moreover, it provides a homogeneous graphical interface that drives digital investigators during the acquisition and analysis of electronic evidence, and it offers a semi-automatic mechanism for the creation of the final report.
Towards early software reliability prediction for computer forensic tools (case study).
Abu Talib, Manar
2016-01-01
Versatility, flexibility and robustness are essential requirements for software forensic tools. Researchers and practitioners need to put more effort into assessing this type of tool. A Markov model is a robust means for analyzing and anticipating the functioning of an advanced component based system. It is used, for instance, to analyze the reliability of the state machines of real time reactive systems. This research extends the architecture-based software reliability prediction model for computer forensic tools, which is based on Markov chains and COSMIC-FFP. Basically, every part of the computer forensic tool is linked to a discrete time Markov chain. If this can be done, then a probabilistic analysis by Markov chains can be performed to analyze the reliability of the components and of the whole tool. The purposes of the proposed reliability assessment method are to evaluate the tool's reliability in the early phases of its development, to improve the reliability assessment process for large computer forensic tools over time, and to compare alternative tool designs. The reliability analysis can assist designers in choosing the most reliable topology for the components, which can maximize the reliability of the tool and meet the expected reliability level specified by the end-user. The approach of assessing component-based tool reliability in the COSMIC-FFP context is illustrated with the Forensic Toolkit Imager case study.
[Research & development on computer expert system for forensic bones estimation].
Zhao, Jun-ji; Zhang, Jan-zheng; Liu, Nin-guo
2005-08-01
To build an expert system for forensic bones estimation. By using the object oriented method, employing statistical data of forensic anthropology, combining the statistical data frame knowledge representation with productions and also using the fuzzy matching and DS evidence theory method. Software for forensic estimation of sex, age and height with opened knowledge base was designed. This system is reliable and effective, and it would be a good assistant of the forensic technician.
The use of self-organising maps for anomalous behaviour detection in a digital investigation.
Fei, B K L; Eloff, J H P; Olivier, M S; Venter, H S
2006-10-16
The dramatic increase in crime relating to the Internet and computers has caused a growing need for digital forensics. Digital forensic tools have been developed to assist investigators in conducting a proper investigation into digital crimes. In general, the bulk of the digital forensic tools available on the market permit investigators to analyse data that has been gathered from a computer system. However, current state-of-the-art digital forensic tools simply cannot handle large volumes of data in an efficient manner. With the advent of the Internet, many employees have been given access to new and more interesting possibilities via their desktop. Consequently, excessive Internet usage for non-job purposes and even blatant misuse of the Internet have become a problem in many organisations. Since storage media are steadily growing in size, the process of analysing multiple computer systems during a digital investigation can easily consume an enormous amount of time. Identifying a single suspicious computer from a set of candidates can therefore reduce human processing time and monetary costs involved in gathering evidence. The focus of this paper is to demonstrate how, in a digital investigation, digital forensic tools and the self-organising map (SOM)--an unsupervised neural network model--can aid investigators to determine anomalous behaviours (or activities) among employees (or computer systems) in a far more efficient manner. By analysing the different SOMs (one for each computer system), anomalous behaviours are identified and investigators are assisted to conduct the analysis more efficiently. The paper will demonstrate how the easy visualisation of the SOM enhances the ability of the investigators to interpret and explore the data generated by digital forensic tools so as to determine anomalous behaviours.
Forensic Taxonomy of Android Social Apps.
Azfar, Abdullah; Choo, Kim-Kwang Raymond; Liu, Lin
2017-03-01
An Android social app taxonomy incorporating artifacts that are of forensic interest will enable users and forensic investigators to identify the personally identifiable information (PII) stored by the apps. In this study, 30 popular Android social apps were examined. Artifacts of forensic interest (e.g., contacts lists, chronology of messages, and timestamp of an added contact) were recovered. In addition, images were located, and Facebook token strings used to tie account identities and gain access to information entered into Facebook by a user were identified. Based on the findings, a two-dimensional taxonomy of the forensic artifacts of the social apps is proposed. A comparative summary of existing forensic taxonomies of different categories of Android apps, designed to facilitate timely collection and analysis of evidentiary materials from Android devices, is presented. © 2016 American Academy of Forensic Sciences.
Recommended Practice: Creating Cyber Forensics Plans for Control Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Eric Cornelius; Mark Fabro
Cyber forensics has been in the popular mainstream for some time, and has matured into an information-technology capability that is very common among modern information security programs. The goal of cyber forensics is to support the elements of troubleshooting, monitoring, recovery, and the protection of sensitive data. Moreover, in the event of a crime being committed, cyber forensics is also the approach to collecting, analyzing, and archiving data as evidence in a court of law. Although scalable to many information technology domains, especially modern corporate architectures, cyber forensics can be challenging when being applied to non-traditional environments, which are notmore » comprised of current information technologies or are designed with technologies that do not provide adequate data storage or audit capabilities. In addition, further complexity is introduced if the environments are designed using proprietary solutions and protocols, thus limiting the ease of which modern forensic methods can be utilized. The legacy nature and somewhat diverse or disparate component aspects of control systems environments can often prohibit the smooth translation of modern forensics analysis into the control systems domain. Compounded by a wide variety of proprietary technologies and protocols, as well as critical system technologies with no capability to store significant amounts of event information, the task of creating a ubiquitous and unified strategy for technical cyber forensics on a control systems device or computing resource is far from trivial. To date, no direction regarding cyber forensics as it relates to control systems has been produced other than what might be privately available from commercial vendors. Current materials have been designed to support event recreation (event-based), and although important, these requirements do not always satisfy the needs associated with incident response or forensics that are driven by cyber incidents. To address these issues and to accommodate for the diversity in both system and architecture types, a framework based in recommended practices to address forensics in the control systems domain is required. This framework must be fully flexible to allow for deployment into any control systems environment regardless of technologies used. Moreover, the framework and practices must provide for direction on the integration of modern network security technologies with traditionally closed systems, the result being a true defense-in-depth strategy for control systems architectures. This document takes the traditional concepts of cyber forensics and forensics engineering and provides direction regarding augmentation for control systems operational environments. The goal is to provide guidance to the reader with specifics relating to the complexity of cyber forensics for control systems, guidance to allow organizations to create a self-sustaining cyber forensics program, and guidance to support the maintenance and evolution of such programs. As the current control systems cyber security community of interest is without any specific direction on how to proceed with forensics in control systems environments, this information product is intended to be a first step.« less
Marcinková, Mária; Straka, Ľubomír; Novomeský, František; Janík, Martin; Štuller, František; Krajčovič, Jozef
2018-01-01
Massive progress in developing even more precise imaging modalities influenced all medical branches including the forensic medicine. In forensic anthropology, an inevitable part of forensic medicine itself, the use of all imaging modalities becomes even more important. Despite of acquiring more accurate informations about the deceased, all of them can be used in the process of identification and/or age estimation. X - ray imaging is most commonly used in detecting foreign bodies or various pathological changes of the deceased. Computed tomography, on the other hand, can be very helpful in the process of identification, whereas outcomes of this examination can be used for virtual reconstruction of living objects. Magnetic resonance imaging offers new opportunities in detecting cardiovascular pathological processes or develompental anomalies. Ultrasonography provides promising results in age estimation of living subjects without excessive doses of radiation. Processing the latest information sources available, authors introduce the application examples of X - ray imaging, computed tomography, magnetic resonance imaging and ultrasonography in everyday forensic medicine routine, with particular focusing on forensic anthropology.
Thali, Michael J; Schweitzer, Wolf; Yen, Kathrin; Vock, Peter; Ozdoba, Christoph; Spielvogel, Elke; Dirnhofer, Richard
2003-03-01
The goal of this study was the full-body documentation of a gunshot wound victim with multislice helical computed tomography for subsequent comparison with the findings of the standard forensic autopsy. Complete volume data of the head, neck, and trunk were acquired by use of two acquisitions of less than 1 minute of total scanning time. Subsequent two-dimensional multiplanar reformations and three-dimensional shaded surface display reconstructions helped document the gunshot-created skull fractures and brain injuries, including the wound track, and the intracerebral bone fragments. Computed tomography also demonstrated intracardiac air embolism and pulmonary aspiration of blood resulting from bullet wound-related trauma. The "digital autopsy," even when postprocessing time was added, was more rapid than the classic forensic autopsy and, based on the nondestructive approach, offered certain advantages in comparison with the forensic autopsy.
Information Assurance and Forensic Readiness
NASA Astrophysics Data System (ADS)
Pangalos, Georgios; Katos, Vasilios
Egalitarianism and justice are amongst the core attributes of a democratic regime and should be also secured in an e-democratic setting. As such, the rise of computer related offenses pose a threat to the fundamental aspects of e-democracy and e-governance. Digital forensics are a key component for protecting and enabling the underlying (e-)democratic values and therefore forensic readiness should be considered in an e-democratic setting. This position paper commences from the observation that the density of compliance and potential litigation activities is monotonically increasing in modern organizations, as rules, legislative regulations and policies are being constantly added to the corporate environment. Forensic practices seem to be departing from the niche of law enforcement and are becoming a business function and infrastructural component, posing new challenges to the security professionals. Having no a priori knowledge on whether a security related event or corporate policy violation will lead to litigation, we advocate that computer forensics need to be applied to all investigatory, monitoring and auditing activities. This would result into an inflation of the responsibilities of the Information Security Officer. After exploring some commonalities and differences between IS audit and computer forensics, we present a list of strategic challenges the organization and, in effect, the IS security and audit practitioner will face.
iPhone forensics based on Macintosh open source and freeware tools
NASA Astrophysics Data System (ADS)
Höne, Thomas; Creutzburg, Reiner
2011-02-01
The aim of this article is to show the usefulness of Mac OS X based open source tools for forensic investigation of modern iPhones. It demonstrates how important data stored in the iPhone is investigated. Two different scenarios of investigations are presented that are well-suited for a forensics lab work in university. This work shows how to analyze an Apple iPhone using open source and freeware tools. Important data used in a forensics investigation, which are possibly stored on a mobile device are presented. Also the superstructure and functions of the iPhone are explained.
The Application of Peer Teaching in Digital Forensics Education
ERIC Educational Resources Information Center
Govan, Michelle
2016-01-01
The field of digital forensics requires a multidisciplinary understanding of a range of diverse subjects, but is interdisciplinary (in using principles, techniques and theories from other disciplines) encompassing both computer and forensic science. This requires that practitioners have a deep technical knowledge and understanding, but that they…
NASA Astrophysics Data System (ADS)
Kröger, Knut; Creutzburg, Reiner
2012-06-01
IT security and computer forensics are important components in the information technology. From year to year, incidents and crimes increase that target IT systems or was done with their help. More and more companies and authorities have security problems in their own IT infrastructure. To respond to these incidents professionally, it is important to have well trained staff. The fact that many agencies and companies work with very sensitive data makes it necessary to further train the own employees in the field of IT forensics. Motivated by these facts, a training concept, which allows the creation of practical exercises, is presented in this paper. The focus is on the practical implementation of forensic important relationships.
Demonstrating Operating System Principles via Computer Forensics Exercises
ERIC Educational Resources Information Center
Duffy, Kevin P.; Davis, Martin H., Jr.; Sethi, Vikram
2010-01-01
We explore the feasibility of sparking student curiosity and interest in the core required MIS operating systems course through inclusion of computer forensics exercises into the course. Students were presented with two in-class exercises. Each exercise demonstrated an aspect of the operating system, and each exercise was written as a computer…
Novoselov, V P; Fedorov, S A
1999-01-01
UNISCAN scanner with PC was used at department of medical criminology and at the histological department of the Novosibirsk Regional Bureau of Forensic Medical Expert Evaluations. The quality of images obtained by computers and digital photography is not inferior to that of traditional photographs.
Hall-McGee, P
1997-01-01
The author provides a training package for forensic staff on how to handle prisoner patients who are being treated at a healthcare facility. She covers such topics as fire and evacuation plans, interim life safety measures, blood and bloodborne pathogens exposure, universal precautions, respiratory protection and TB, and voluntary medical immobilization and protection devices.
Problem Based Learning in Digital Forensics
ERIC Educational Resources Information Center
Irons, Alastair; Thomas, Paula
2016-01-01
The purpose of this paper is to compare and contrast the efforts of two universities to address the issue of providing computer forensics students with the opportunity to get involved in the practical aspects of forensic search and seizure procedures. The paper discusses the approaches undertaken by the University of Sunderland and the University…
Usui, Akihito; Kawasumi, Yusuke; Hosokai, Yoshiyuki; Kozakai, Masataka; Saito, Haruo; Funayama, Masato
2016-01-01
Gunshot injury has always been an important field of investigation in postmortem forensic radiology. The localization and retrieval of the bullet and of potentially important fragments are vital to these cases. Using postmortem multidetector-row computed tomography (MDCT) prior to forensic autopsy, we sought to illustrate the importance of this modality in the noninvasive characterization of gunshot wounds. We obtained and analyzed MDCT images in three cases of gunshot wounds (accidental close-range shotgun shooting, suicidal contact gunshot to the head and accidental long-range buckshot shooting). We discuss the value of postmortem MDCT findings in gunshot wound cases by comparing with forensic autopsy findings in Japan, a developing country with miserably low autopsy rate. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
Handwriting Classification in Forensic Science.
ERIC Educational Resources Information Center
Ansell, Michael
1979-01-01
Considers systems for the classification of handwriting features, discusses computer storage of information about handwriting features, and summarizes recent studies that give an idea of the range of forensic handwriting research. (GT)
A Comprehensive Review on Adaptability of Network Forensics Frameworks for Mobile Cloud Computing
Abdul Wahab, Ainuddin Wahid; Han, Qi; Bin Abdul Rahman, Zulkanain
2014-01-01
Network forensics enables investigation and identification of network attacks through the retrieved digital content. The proliferation of smartphones and the cost-effective universal data access through cloud has made Mobile Cloud Computing (MCC) a congenital target for network attacks. However, confines in carrying out forensics in MCC is interrelated with the autonomous cloud hosting companies and their policies for restricted access to the digital content in the back-end cloud platforms. It implies that existing Network Forensic Frameworks (NFFs) have limited impact in the MCC paradigm. To this end, we qualitatively analyze the adaptability of existing NFFs when applied to the MCC. Explicitly, the fundamental mechanisms of NFFs are highlighted and then analyzed using the most relevant parameters. A classification is proposed to help understand the anatomy of existing NFFs. Subsequently, a comparison is given that explores the functional similarities and deviations among NFFs. The paper concludes by discussing research challenges for progressive network forensics in MCC. PMID:25097880
A comprehensive review on adaptability of network forensics frameworks for mobile cloud computing.
Khan, Suleman; Shiraz, Muhammad; Wahab, Ainuddin Wahid Abdul; Gani, Abdullah; Han, Qi; Rahman, Zulkanain Bin Abdul
2014-01-01
Network forensics enables investigation and identification of network attacks through the retrieved digital content. The proliferation of smartphones and the cost-effective universal data access through cloud has made Mobile Cloud Computing (MCC) a congenital target for network attacks. However, confines in carrying out forensics in MCC is interrelated with the autonomous cloud hosting companies and their policies for restricted access to the digital content in the back-end cloud platforms. It implies that existing Network Forensic Frameworks (NFFs) have limited impact in the MCC paradigm. To this end, we qualitatively analyze the adaptability of existing NFFs when applied to the MCC. Explicitly, the fundamental mechanisms of NFFs are highlighted and then analyzed using the most relevant parameters. A classification is proposed to help understand the anatomy of existing NFFs. Subsequently, a comparison is given that explores the functional similarities and deviations among NFFs. The paper concludes by discussing research challenges for progressive network forensics in MCC.
2015-07-13
computer forensic evidence, we were not able to prove or disprove his contention that he did not share the technical data with anybody. Also, as...a retransfer occurred. Our evaluation was limited based on NASA’s inability to provide historical email records and the lack of computer forensic
REACTOR PHYSICS MODELING OF SPENT RESEARCH REACTOR FUEL FOR TECHNICAL NUCLEAR FORENSICS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nichols, T.; Beals, D.; Sternat, M.
2011-07-18
Technical nuclear forensics (TNF) refers to the collection, analysis and evaluation of pre- and post-detonation radiological or nuclear materials, devices, and/or debris. TNF is an integral component, complementing traditional forensics and investigative work, to help enable the attribution of discovered radiological or nuclear material. Research is needed to improve the capabilities of TNF. One research area of interest is determining the isotopic signatures of research reactors. Research reactors are a potential source of both radiological and nuclear material. Research reactors are often the least safeguarded type of reactor; they vary greatly in size, fuel type, enrichment, power, and burn-up. Manymore » research reactors are fueled with highly-enriched uranium (HEU), up to {approx}93% {sup 235}U, which could potentially be used as weapons material. All of them have significant amounts of radiological material with which a radioactive dispersal device (RDD) could be built. Therefore, the ability to attribute if material originated from or was produced in a specific research reactor is an important tool in providing for the security of the United States. Currently there are approximately 237 operating research reactors worldwide, another 12 are in temporary shutdown and 224 research reactors are reported as shut down. Little is currently known about the isotopic signatures of spent research reactor fuel. An effort is underway at Savannah River National Laboratory (SRNL) to analyze spent research reactor fuel to determine these signatures. Computer models, using reactor physics codes, are being compared to the measured analytes in the spent fuel. This allows for improving the reactor physics codes in modeling research reactors for the purpose of nuclear forensics. Currently the Oak Ridge Research reactor (ORR) is being modeled and fuel samples are being analyzed for comparison. Samples of an ORR spent fuel assembly were taken by SRNL for analytical and radiochemical analysis. The fuel assembly was modeled using MONTEBURNS(MCNP5/ ORIGEN2.2) and MCNPX/CINDER90. The results from the models have been compared to each other and to the measured data.« less
Computer-assisted virtual autopsy using surgical navigation techniques.
Ebert, Lars Christian; Ruder, Thomas D; Martinez, Rosa Maria; Flach, Patricia M; Schweitzer, Wolf; Thali, Michael J; Ampanozi, Garyfalia
2015-01-01
OBJECTIVE; Virtual autopsy methods, such as postmortem CT and MRI, are increasingly being used in forensic medicine. Forensic investigators with little to no training in diagnostic radiology and medical laypeople such as state's attorneys often find it difficult to understand the anatomic orientation of axial postmortem CT images. We present a computer-assisted system that permits postmortem CT datasets to be quickly and intuitively resliced in real time at the body to narrow the gap between radiologic imaging and autopsy. Our system is a potentially valuable tool for planning autopsies, showing findings to medical laypeople, and teaching CT anatomy, thus further closing the gap between radiology and forensic pathology.
Application of Finite Element Method in Traffic Injury and Its Prospect in Forensic Science.
Liu, C G; Lu, Y J; Gao, J; Liu, Q
2016-06-01
The finite element method (FEM) is a numerical computation method based on computer technology, and has been gradually applied in the fields of medicine and biomechanics. The finite element analysis can be used to explore the loading process and injury mechanism of human body in traffic injury. FEM is also helpful for the forensic investigation in traffic injury. This paper reviews the development of the finite element models and analysis of brain, cervical spine, chest and abdomen, pelvis, limbs at home and aboard in traffic injury in recent years. Copyright© by the Editorial Department of Journal of Forensic Medicine.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hovel, Harold; Prettyman, Kevin
A side-by-side analysis was done on then currently available technology, along with roadmaps to push each particular option forward. Variations in turnkey line processes can and do result in finished solar device performance. Together with variations in starting material quality, the result is a distribution of effciencies. Forensic analysis and characterization of each crystalline Si based technology will determine the most promising approach with respect to cost, efficiency and reliability. Forensic analysis will also shed light on the causes of binning variations. Si solar cells were forensically analyzed from each turn key supplier using a host of techniques
Bornik, Alexander; Urschler, Martin; Schmalstieg, Dieter; Bischof, Horst; Krauskopf, Astrid; Schwark, Thorsten; Scheurer, Eva; Yen, Kathrin
2018-06-01
Three-dimensional (3D) crime scene documentation using 3D scanners and medical imaging modalities like computed tomography (CT) and magnetic resonance imaging (MRI) are increasingly applied in forensic casework. Together with digital photography, these modalities enable comprehensive and non-invasive recording of forensically relevant information regarding injuries/pathologies inside the body and on its surface. Furthermore, it is possible to capture traces and items at crime scenes. Such digitally secured evidence has the potential to similarly increase case understanding by forensic experts and non-experts in court. Unlike photographs and 3D surface models, images from CT and MRI are not self-explanatory. Their interpretation and understanding requires radiological knowledge. Findings in tomography data must not only be revealed, but should also be jointly studied with all the 2D and 3D data available in order to clarify spatial interrelations and to optimally exploit the data at hand. This is technically challenging due to the heterogeneous data representations including volumetric data, polygonal 3D models, and images. This paper presents a novel computer-aided forensic toolbox providing tools to support the analysis, documentation, annotation, and illustration of forensic cases using heterogeneous digital data. Conjoint visualization of data from different modalities in their native form and efficient tools to visually extract and emphasize findings help experts to reveal unrecognized correlations and thereby enhance their case understanding. Moreover, the 3D case illustrations created for case analysis represent an efficient means to convey the insights gained from case analysis to forensic non-experts involved in court proceedings like jurists and laymen. The capability of the presented approach in the context of case analysis, its potential to speed up legal procedures and to ultimately enhance legal certainty is demonstrated by introducing a number of representative forensic cases. Copyright © 2018 The Author(s). Published by Elsevier B.V. All rights reserved.
Rhee, Chang-Hoon; Shin, Sang Min; Choi, Yong-Seok; Yamaguchi, Tetsutaro; Maki, Koutaro; Kim, Yong-Il; Kim, Seong-Sik; Park, Soo-Byung; Son, Woo-Sung
2015-12-01
From computed tomographic images, the dentocentral synchondrosis can be identified in the second cervical vertebra. This can demarcate the border between the odontoid process and the body of the 2nd cervical vertebra and serve as a good model for the prediction of bone and forensic age. Nevertheless, until now, there has been no application of the 2nd cervical vertebra based on the dentocentral synchondrosis. In this study, statistical shape analysis was used to build bone and forensic age estimation regression models. Following the principles of statistical shape analysis and principal components analysis, we used cone-beam computed tomography (CBCT) to evaluate a Japanese population (35 males and 45 females, from 5 to 19 years old). The narrowest prediction intervals among the multivariate regression models were 19.63 for bone age and 2.99 for forensic age. There was no significant difference between form space and shape space in the bone and forensic age estimation models. However, for gender comparison, the bone and forensic age estimation models for males had the higher explanatory power. This study derived an improved objective and quantitative method for bone and forensic age estimation based on only the 2nd, 3rd and 4th cervical vertebral shapes. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.
Grassberger, M; Gehl, A; Püschel, K; Turk, E E
2011-04-15
When requested to evaluate surviving victims of blunt head trauma the forensic expert has to draw mainly on medical documentation from the time of hospital admission. In many cases these consist of written clinical records, radiographs and in some cases photographic documentation of the injuries. We report two cases of survived severe blunt head trauma where CT images, which had primarily been obtained for clinical diagnostic purposes, were used for forensic assessment. 3D reconstructions of the clinical CT-images yielded valuable information regarding the sequence, number and direction of the impacts to the head, their gross morphology and the inflicting weapon. We conclude that computed tomography and related imaging methods, along with their 3D reconstruction capabilities, provide a useful tool to approach questions in clinical forensic casework. Copyright © 2010 Elsevier Ireland Ltd. All rights reserved.
The forensic holodeck: an immersive display for forensic crime scene reconstructions.
Ebert, Lars C; Nguyen, Tuan T; Breitbeck, Robert; Braun, Marcel; Thali, Michael J; Ross, Steffen
2014-12-01
In forensic investigations, crime scene reconstructions are created based on a variety of three-dimensional image modalities. Although the data gathered are three-dimensional, their presentation on computer screens and paper is two-dimensional, which incurs a loss of information. By applying immersive virtual reality (VR) techniques, we propose a system that allows a crime scene to be viewed as if the investigator were present at the scene. We used a low-cost VR headset originally developed for computer gaming in our system. The headset offers a large viewing volume and tracks the user's head orientation in real-time, and an optical tracker is used for positional information. In addition, we created a crime scene reconstruction to demonstrate the system. In this article, we present a low-cost system that allows immersive, three-dimensional and interactive visualization of forensic incident scene reconstructions.
Gotsmy, Walther; Lombardo, Paolo; Jackowski, Christian; Brencicova, Eva; Zech, Wolf-Dieter
2018-04-24
In forensic autopsy, the analysis of stomach contents is important when investigating drowning cases. Three-layering of stomach contents may be interpreted as a diagnostic hint to drowning due to swallowing of larger amounts of water or other drowning media. The authors experienced frequent discrepancies of numbers of stomach content layering in drowning cases between post-mortem computed tomography (PMCT) and autopsy in forensic casework. Therefore, the goal of this study was to compare layering of stomach contents in drowning cases between PMCT and forensic autopsy. Drowning cases (n = 55; 40 male, 15 female, mean age 45.3 years; mean amount of stomach content 223 ml) that received PMCT prior to forensic autopsy were retrospectively analyzed by a forensic pathologist and a radiologist. Number of layers of stomach content in PMCT were compared to number of layers at forensic autopsy. In 28 of the 55 evaluated drowning cases, a discrepancy between layering of stomach contents at autopsy compared to PMCT was observed: 1 layer at autopsy (n = 28): 50% discrepancy to PMCT, 2 layers (n = 20): 45% discrepancy, and 3 layers (n = 7): 71.4% discrepancy. Sensitivity of correctly determining layering (as observed at forensic autopsy) in PMCT was 52% (positive predictive value 44.8%). Specificity was 46.6% (negative predictive value 53.8%). In a control group (n = 35) of non-drowning cases, three-layering of stomach contents was not observed. Discrepancies of observed numbers of stomach content layers between PMCT and forensic autopsy are a frequent finding possibly due to stomach content sampling technique at autopsy and movement of the corpse prior to PMCT and autopsy. Three-layering in PMCT, if indeed present, may be interpreted as a hint to drowning.
Nuclear and Radiological Forensics and Attribution Overview
DOE Office of Scientific and Technical Information (OSTI.GOV)
Smith, D K; Niemeyer, S
2005-11-04
The goal of the U.S. Department of Homeland Security (DHS) Nuclear and Radiological Forensics and Attribution Program is to develop the technical capability for the nation to rapidly, accurately, and credibly attribute the origins and pathways of interdicted or collected materials, intact nuclear devices, and radiological dispersal devices. A robust attribution capability contributes to threat assessment, prevention, and deterrence of nuclear terrorism; it also supports the Federal Bureau of Investigation (FBI) in its investigative mission to prevent and respond to nuclear terrorism. Development of the capability involves two major elements: (1) the ability to collect evidence and make forensic measurements,more » and (2) the ability to interpret the forensic data. The Program leverages the existing capability throughout the U.S. Department of Energy (DOE) national laboratory complex in a way that meets the requirements of the FBI and other government users. At the same time the capability is being developed, the Program also conducts investigations for a variety of sponsors using the current capability. The combination of operations and R&D in one program helps to ensure a strong linkage between the needs of the user community and the scientific development.« less
The New Zealand Hacker Case: A Post Mortem
DOE Office of Scientific and Technical Information (OSTI.GOV)
Popovsky, Barbara; Ryan, Daniel J.; Frincke, Deborah A.
2005-10-01
A typical incident response pits technicians against networks that aren't prepared forensically. [1, 2] If practitioners do consider collecting network forensic data, they face a choice between expending extraordinary effort (time and money) collecting forensically sound data, or simply restoring the network as quickly as possible. In this context, the concept of organizational network forensic readiness has emerged. The following is a discussion of selected computer crime cases, using publically available information, spanning a period of time of several years, that together demonstrate the need for a preventive and proactive response to malicious intrusion over a reactive one. It concludesmore » with recommendations for how to "operationalize" organizational network forensic readiness.« less
Identification of Bodies by Unique Serial Numbers on Implanted Medical Devices.
Blessing, Melissa M; Lin, Peter T
2018-05-01
Visual identification is the most common identification method used by medical examiners but is not always possible. Alternative methods include X-ray, fingerprint, or DNA comparison, but these methods require additional resources. Comparison of serial numbers on implanted medical devices is a rapid and definitive method of identification. To assess the practicality of using this method, we reviewed 608 consecutive forensic autopsies performed at a regional medical examiner office. Of these, 56 cases required an alternative method of identification due to decomposition (n = 35), gunshot wound (n = 9), blunt trauma (n = 6), or charring (n = 6). Of these 56 cases, eight (14.3%) were known to have an implanted medical device. Of these eight cases, five (63%) could be positively identified by comparing serial numbers. If an implanted medical device is known to be present, and medical records are available, identification by medical device serial number should be a first-line method. © 2017 American Academy of Forensic Sciences.
Analysis of metallic medical devices after cremation: The importance in identification.
De Angelis, Danilo; Collini, Federica; Muccino, Enrico; Cappella, Annalisa; Sguazza, Emanuela; Mazzucchi, Alessandra; Cattaneo, Cristina
2017-03-01
The recovery of a charred cadaver raises many issues concerning personal identification; the presence of prosthetic materials may provide very important and decisive information. Who is involved in the recovery of a charred body or of burnt human fragments, should therefore be able to recognize medical devices even if modified by fire effects. Metallic residues (585kg) that came from 2785 cremations were studied. Medical devices were then divided by type and material in order to esteem the representativeness of each typology. The study illustrates the great presence of metal medical devices that could be of great help in identifying bodies and underlines that metallic medical devices types and morphology should be known by forensic practitioner involved in identification cases and that this kind of material can still be identified by physician and dentists, even if exposed to very high temperatures. Copyright © 2016 The Chartered Society of Forensic Sciences. Published by Elsevier B.V. All rights reserved.
[The possibility of using a laser stereolithography method in forensic medicine].
Abramov, S S; Boldyrev, N N; Evseev, A V; Kotsiuba, E V; Novikov, M M; Panchenko, V Ia; Semeshin, N M; Iakunin, V P
1998-01-01
The data of computer-aided tomography are proposed to be used in forensic medical diagnostic and identification studies. The technology of making hard copies of objects by laser stereolithography on the basis of tomography data is described.
[Current macro-diagnostic trends of forensic medicine in the Czech Republic].
Frišhons, Jan; Kučerová, Štěpánka; Jurda, Mikoláš; Sokol, Miloš; Vojtíšek, Tomáš; Hejna, Petr
2017-01-01
Over the last few years, advanced diagnostic methods have penetrated in the realm of forensic medicine in addition to standard autopsy techniques supported by traditional X-ray examination and macro-diagnostic laboratory tests. Despite the progress of imaging methods, the conventional autopsy has remained basic and essential diagnostic tool in forensic medicine. Postmortem computed tomography and magnetic resonance imaging are far the most progressive modern radio diagnostic methods setting the current trend of virtual autopsies all over the world. Up to now, only two institutes of forensic medicine have available postmortem computed tomography for routine diagnostic purposes in the Czech Republic. Postmortem magnetic resonance is currently unattainable for routine diagnostic use and was employed only for experimental purposes. Photogrammetry is digital method focused primarily on body surface imaging. Recently, the most fruitful results have been yielded from the interdisciplinary cooperation between forensic medicine and forensic anthropology with the implementation of body scanning techniques and 3D printing. Non-invasive and mini-invasive investigative methods such as postmortem sonography and postmortem endoscopy was unsystematically tested for diagnostic performance with good outcomes despite of limitations of these methods in postmortem application. Other futuristic methods, such as the use of a drone to inspect the crime scene are still experimental tools. The authors of the article present a basic overview of the both routinely and experimentally used investigative methods and current macro-diagnostic trends of the forensic medicine in the Czech Republic.
Ehler, Edvard; Vanek, Daniel
2017-05-01
Isolated populations present a constant threat to the correctness of forensic genetic casework. In this review article we present several examples of how analyzing samples from isolated populations can bias the results of the forensic statistics and analyses. We select our examples from isolated populations from central and southeastern Europe, namely the Valachs and the European Roma. We also provide the reader with general strategies and principles to improve the laboratory practice (best practice) and reporting of samples from supposedly isolated populations. These include reporting the precise population data used for computing the forensic statistics, using the appropriate θ correction factor for calculating allele frequencies, typing ancestry informative markers in samples of unknown or uncertain ethnicity and establishing ethnic-specific forensic databases. Copyright © 2017 Elsevier Ltd and Faculty of Forensic and Legal Medicine. All rights reserved.
Imaging techniques in digital forensic investigation: a study using neural networks
NASA Astrophysics Data System (ADS)
Williams, Godfried
2006-09-01
Imaging techniques have been applied to a number of applications, such as translation and classification problems in medicine and defence. This paper examines the application of imaging techniques in digital forensics investigation using neural networks. A review of applications of digital image processing is presented, whiles a Pedagogical analysis of computer forensics is also highlighted. A data set describing selected images in different forms are used in the simulation and experimentation.
Home - Virginia Department of Forensic Science
Procedure Manuals Training Manuals Digital & Multimedia Evidence Computer Analysis Video Analysis Procedure Manual Training Manual FAQ Updates Firearms & Toolmarks Procedure Manuals Training Manuals Forensic Biology Procedure Manuals Training Manuals Familial Searches Post-Conviction DNA Issues FAQ
Into the decomposed body-forensic digital autopsy using multislice-computed tomography.
Thali, M J; Yen, K; Schweitzer, W; Vock, P; Ozdoba, C; Dirnhofer, R
2003-07-08
It is impossible to obtain a representative anatomical documentation of an entire body using classical X-ray methods, they subsume three-dimensional bodies into a two-dimensional level. We used the novel multislice-computed tomography (MSCT) technique in order to evaluate a case of homicide with putrefaction of the corpse before performing a classical forensic autopsy. This non-invasive method showed gaseous distension of the decomposing organs and tissues in detail as well as a complex fracture of the calvarium. MSCT also proved useful in screening for foreign matter in decomposing bodies, and full-body scanning took only a few minutes. In conclusion, we believe postmortem MSCT imaging is an excellent vizualisation tool with great potential for forensic documentation and evaluation of decomposed bodies.
Perceptual expertise in forensic facial image comparison
White, David; Phillips, P. Jonathon; Hahn, Carina A.; Hill, Matthew; O'Toole, Alice J.
2015-01-01
Forensic facial identification examiners are required to match the identity of faces in images that vary substantially, owing to changes in viewing conditions and in a person's appearance. These identifications affect the course and outcome of criminal investigations and convictions. Despite calls for research on sources of human error in forensic examination, existing scientific knowledge of face matching accuracy is based, almost exclusively, on people without formal training. Here, we administered three challenging face matching tests to a group of forensic examiners with many years' experience of comparing face images for law enforcement and government agencies. Examiners outperformed untrained participants and computer algorithms, thereby providing the first evidence that these examiners are experts at this task. Notably, computationally fusing responses of multiple experts produced near-perfect performance. Results also revealed qualitative differences between expert and non-expert performance. First, examiners' superiority was greatest at longer exposure durations, suggestive of more entailed comparison in forensic examiners. Second, experts were less impaired by image inversion than non-expert students, contrasting with face memory studies that show larger face inversion effects in high performers. We conclude that expertise in matching identity across unfamiliar face images is supported by processes that differ qualitatively from those supporting memory for individual faces. PMID:26336174
Digital forensics: an analytical crime scene procedure model (ACSPM).
Bulbul, Halil Ibrahim; Yavuzcan, H Guclu; Ozel, Mesut
2013-12-10
In order to ensure that digital evidence is collected, preserved, examined, or transferred in a manner safeguarding the accuracy and reliability of the evidence, law enforcement and digital forensic units must establish and maintain an effective quality assurance system. The very first part of this system is standard operating procedures (SOP's) and/or models, conforming chain of custody requirements, those rely on digital forensics "process-phase-procedure-task-subtask" sequence. An acceptable and thorough Digital Forensics (DF) process depends on the sequential DF phases, and each phase depends on sequential DF procedures, respectively each procedure depends on tasks and subtasks. There are numerous amounts of DF Process Models that define DF phases in the literature, but no DF model that defines the phase-based sequential procedures for crime scene identified. An analytical crime scene procedure model (ACSPM) that we suggest in this paper is supposed to fill in this gap. The proposed analytical procedure model for digital investigations at a crime scene is developed and defined for crime scene practitioners; with main focus on crime scene digital forensic procedures, other than that of whole digital investigation process and phases that ends up in a court. When reviewing the relevant literature and interrogating with the law enforcement agencies, only device based charts specific to a particular device and/or more general perspective approaches to digital evidence management models from crime scene to courts are found. After analyzing the needs of law enforcement organizations and realizing the absence of crime scene digital investigation procedure model for crime scene activities we decided to inspect the relevant literature in an analytical way. The outcome of this inspection is our suggested model explained here, which is supposed to provide guidance for thorough and secure implementation of digital forensic procedures at a crime scene. In digital forensic investigations each case is unique and needs special examination, it is not possible to cover every aspect of crime scene digital forensics, but the proposed procedure model is supposed to be a general guideline for practitioners. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.
Schmidt, Eduardo Morgado; Franco, Marcos Fernando; Cuelbas, Claudio José; Zacca, Jorge Jardim; de Carvalho Rocha, Werickson Fortunato; Borges, Rodrigo; de Souza, Wanderley; Sawaya, Alexandra Christine Helena Frankland; Eberlin, Marcos Nogueira; Correa, Deleon Nascimento
2015-09-01
Using Brazilian banknotes as a test case, forensic examination and identification of Rhodamine B dye anti-theft device (ATD) staining on banknotes were performed. Easy ambient sonic spray ionization mass spectrometry (EASI-MS) was used since it allows fast and simple analysis with no sample preparation providing molecular screening of the surface with direct desorption and ionization of the security dye. For a more accurate molecular characterization of the ATD dye, Q Exactive Orbitrap™ Fourier transform (tandem) mass spectrometry using eletrospray ionization (ESI-HRMS/MS) was also applied. Copyright © 2015 The Chartered Society of Forensic Sciences. Published by Elsevier Ireland Ltd. All rights reserved.
High Performance Proactive Digital Forensics
NASA Astrophysics Data System (ADS)
Alharbi, Soltan; Moa, Belaid; Weber-Jahnke, Jens; Traore, Issa
2012-10-01
With the increase in the number of digital crimes and in their sophistication, High Performance Computing (HPC) is becoming a must in Digital Forensics (DF). According to the FBI annual report, the size of data processed during the 2010 fiscal year reached 3,086 TB (compared to 2,334 TB in 2009) and the number of agencies that requested Regional Computer Forensics Laboratory assistance increasing from 689 in 2009 to 722 in 2010. Since most investigation tools are both I/O and CPU bound, the next-generation DF tools are required to be distributed and offer HPC capabilities. The need for HPC is even more evident in investigating crimes on clouds or when proactive DF analysis and on-site investigation, requiring semi-real time processing, are performed. Although overcoming the performance challenge is a major goal in DF, as far as we know, there is almost no research on HPC-DF except for few papers. As such, in this work, we extend our work on the need of a proactive system and present a high performance automated proactive digital forensic system. The most expensive phase of the system, namely proactive analysis and detection, uses a parallel extension of the iterative z algorithm. It also implements new parallel information-based outlier detection algorithms to proactively and forensically handle suspicious activities. To analyse a large number of targets and events and continuously do so (to capture the dynamics of the system), we rely on a multi-resolution approach to explore the digital forensic space. Data set from the Honeynet Forensic Challenge in 2001 is used to evaluate the system from DF and HPC perspectives.
Willaume, Thibault; Farrugia, Audrey; Kieffer, Estelle-Marie; Charton, Jeanne; Geraut, Annie; Berthelon, Laurent; Bierry, Guillaume; Raul, Jean-Sébastien
2018-05-01
Nowadays, post-mortem computed tomography (PMCT) has become an integral part of Forensic practice. The purpose of the study was to determine PMCT impact on diagnosis of the cause of death within the context of the external examination of the body, when autopsy has, at first, not been requested. We reviewed the records of 145 cases for which unenhanced PMCT was performed in addition to the external examination of the body from January 2014 to July 2015 at the Institute of Forensic medicine in Strasbourg (France). We confronted final reports from forensic pathologist to the corresponding PMCT reports. Data were collected in a contingency table and the impact of PMCT on the final conclusions of the forensic pathologist was evaluated via a Chi 2 test. PMCT results significantly impact the final conclusions of forensic pathologist (p<0,001). In some cases, PMCT permits etiological diagnosis by revealing a cause of death hidden from external examination (mainly natural death) or by supporting the clinical findings of the forensic pathologist. In other cases (traumatic death), PMCT enables fast and exhaustive lesion assessment. Lastly, there are situations where PMCT may be ineffective (intoxication, hanging or some natural deaths). Performing PMCT within the context of the external examination of the body when autopsy has, at first, not been requested could bring significant benefits in diagnosing the cause of death. The impact of PMCT varies depending on the circumstances of death. Copyright © 2018 Elsevier B.V. All rights reserved.
Forbes, Thomas P; Sisco, Edward
2014-08-05
We demonstrate the coupling of desorption electro-flow focusing ionization (DEFFI) with in-source collision induced dissociation (CID) for the mass spectrometric (MS) detection and imaging of explosive device components, including both inorganic and organic explosives and energetic materials. We utilize in-source CID to enhance ion collisions with atmospheric gas, thereby reducing adducts and minimizing organic contaminants. Optimization of the MS signal response as a function of in-source CID potential demonstrated contrasting trends for the detection of inorganic and organic explosive device components. DEFFI-MS and in-source CID enabled isotopic and molecular speciation of inorganic components, providing further physicochemical information. The developed system facilitated the direct detection and chemical mapping of trace analytes collected with Nomex swabs and spatially resolved distributions within artificial fingerprints from forensic lift tape. The results presented here provide the forensic and security sectors a powerful tool for the detection, chemical imaging, and inorganic speciation of explosives device signatures.
International Data on Radiological Sources
DOE Office of Scientific and Technical Information (OSTI.GOV)
Martha Finck; Margaret Goldberg
2010-07-01
ABSTRACT The mission of radiological dispersal device (RDD) nuclear forensics is to identify the provenance of nuclear and radiological materials used in RDDs and to aid law enforcement in tracking nuclear materials and routes. The application of databases to radiological forensics is to match RDD source material to a source model in the database, provide guidance regarding a possible second device, and aid the FBI by providing a short list of manufacturers and distributors, and ultimately to the last legal owner of the source. The Argonne/Idaho National Laboratory RDD attribution database is a powerful technical tool in radiological forensics. Themore » database (1267 unique vendors) includes all sealed sources and a device registered in the U.S., is complemented by data from the IAEA Catalogue, and is supported by rigorous in-lab characterization of selected sealed sources regarding physical form, radiochemical composition, and age-dating profiles. Close working relationships with global partners in the commercial sealed sources industry provide invaluable technical information and expertise in the development of signature profiles. These profiles are critical to the down-selection of potential candidates in either pre- or post- event RDD attribution. The down-selection process includes a match between an interdicted (or detonated) source and a model in the database linked to one or more manufacturers and distributors.« less
Can clinical CT data improve forensic reconstruction?
Schuh, P; Scheurer, E; Fritz, K; Pavlic, M; Hassler, E; Rienmüller, R; Yen, K
2013-05-01
In accidents resulting in severe injuries, a clinical forensic examination is generally abandoned in the initial phase due to high-priority clinical needs. However, in many cases, data from clinical computed tomography (CT) examinations are available. The goals of this prospective study were (a) to evaluate clinical CT data as a basis for forensic reconstruction of the sequence of events, (b) to assess if forensic radiological follow-up reading improves the forensic diagnostic benefit compared to the written clinical radiological reports, and (c) to evaluate if full data storage including additional reconstructed 0.6-mm slices enhances forensic analysis. Clinical CT data of 15 living individuals with imaging of at least the head, thorax, and abdomen following polytrauma were examined regarding the forensic evaluation of the sequence of events. Additionally, 0.6-mm slices and 3D images were reconstructed for forensic purposes and used for the evaluation. At the forensic radiological readings, additional traumatic findings were observed in ten of the 15 patients. The main weakness of the clinical reports was that they were not detailed enough, particularly regarding the localization of injuries and description of wound morphology. In seven cases, however, forensic conclusions were possible on the basis of the written clinical reports, whereas in five cases forensic reconstruction required specific follow-up reading. The additional 0.6-mm slices were easily available and with improved 3D image quality and forensic diagnostics. In conclusion, the use of clinical CT data can considerably support forensic expertise regarding reconstruction issues. Forensic follow-up reading as well as the use of additional thin slices for 3D analysis can further improve its benefit for forensic reconstruction purposes.
Introduction to Forensics and the Use of the Helix Free Forensic Tool
2012-01-01
computer system belongs to and his personal activities, interests, and hobbies. An example presented in the paper was that pedophiles might keep...digital records like pictures or video of their delinquent activities. As we mentioned before, we must keep an accurate record of our investigation
Moskała, Artur; Woźniak, Krzysztof; Kluza, Piotr; Romaszko, Karol; Lopatin, Oleksiy
2017-01-01
Aim of the study: Deaths of in-vehicle victims (drivers and passengers) of road accidents represent a significant group of issues addressed by forensic medicine. Expressing opinions in this regard involves first of all the determination of the cause of death and the forensic pathologist's participation in the process of road accident reconstruction through defining the mechanism of bodily harm. The scope of the opinion as well as its accuracy and degree of detail largely depend on the scope of forensic autopsy. In this context, techniques that broaden the capabilities of standard autopsy are of particular importance. This paper compares the results of post mortem computed tomography (PMCT) of road accident victims (drivers and passengers) against the results of standard examination in order to determine the scope to which PMCT significantly enhances autopsy capabilities. Material and methods: The analysis covers 118 in-vehicle victims (drivers and passengers) examined from 2012 to 2014. In each case, post-mortem examination was preceded by PMCT examination using Somatom Emotion 16 (Siemens AG, Germany). Results: The results are presented in a tabular form. Conclusions: In most road accident victims (drivers and passengers), post mortem computed tomography significantly increases the results' degree of detail, particularly with regard to injuries of bones and gas collections.
Chatzaraki, Vasiliki; Thali, Michael J; Ampanozi, Garyfalia; Schweitzer, Wolf
2018-06-01
Fatal car-to-pedestrian collisions regularly appear in the forensic pathologist's routine, particularly in places of extended urbanization. Postmortem computed tomography has gained an exceptional role to supplement autopsy worldwide, giving information that is supplementary or complimentary to conventional autopsy. In this retrospective study, a total number of 320 findings in a series of 21 pedestrians fatally hit by cars and trucks of both postmortem computed tomography and autopsy were correlated. According to our results, it is best to combine both methods to give well-founded answers to questions pertaining to both collision reconstruction and cause of death.
Viel, Guido; Schröder, Ann Sophie; Püschel, Klaus; Braun, Christian
2009-05-30
Captive-bolt guns or slaughterer's guns are devices widely used in meat industry and private farmer households for slaughtering animal stocks. They consist of a simple cylindrical metal tube (barrel) with a metal bolt placed in their centre (around 9-15cm long and 1-1.5cm wide). The bolt is actuated by a trigger pull and is propelled forward by compressed air or by the discharge of a blank powder gun cartridge. Violent deaths inflicted by captive-bolt guns are rarely encountered in forensic practice and are predominantly suicidal events. We report an unusual complex suicide by hanging and self-shooting with a slaughterer's gun in a 21-year-old boy. The victim after putting a ceiling fixed rope around his neck shot himself in the head (occipital region) with a Kerner captive-bolt gun. He used two mirrors (a cosmetic mirror and a man-sized one) in order to properly visualize his back and to target the occipital region of his head. Radiological data (computed tomography with three dimensional reconstruction) and autopsy findings are discussed according to the clinical and forensic literature. A brief review on planned complex suicides is also given.
Perceptual expertise in forensic facial image comparison.
White, David; Phillips, P Jonathon; Hahn, Carina A; Hill, Matthew; O'Toole, Alice J
2015-09-07
Forensic facial identification examiners are required to match the identity of faces in images that vary substantially, owing to changes in viewing conditions and in a person's appearance. These identifications affect the course and outcome of criminal investigations and convictions. Despite calls for research on sources of human error in forensic examination, existing scientific knowledge of face matching accuracy is based, almost exclusively, on people without formal training. Here, we administered three challenging face matching tests to a group of forensic examiners with many years' experience of comparing face images for law enforcement and government agencies. Examiners outperformed untrained participants and computer algorithms, thereby providing the first evidence that these examiners are experts at this task. Notably, computationally fusing responses of multiple experts produced near-perfect performance. Results also revealed qualitative differences between expert and non-expert performance. First, examiners' superiority was greatest at longer exposure durations, suggestive of more entailed comparison in forensic examiners. Second, experts were less impaired by image inversion than non-expert students, contrasting with face memory studies that show larger face inversion effects in high performers. We conclude that expertise in matching identity across unfamiliar face images is supported by processes that differ qualitatively from those supporting memory for individual faces. © 2015 The Author(s).
[Progress in Application of Measuring Skeleton by CT in Forensic Anthropology Research].
Miao, C Y; Xu, L; Wang, N; Zhang, M; Li, Y S; Lü, J X
2017-02-01
Individual identification by measuring the human skeleton is an important research in the field of forensic anthropology. Computed tomography (CT) technology can provide high-resolution image of skeleton. Skeleton image can be reformed by software in the post-processing workstation. Different skeleton measurement indexes of anthropology, such as diameter, angle, area and volume, can be measured on section and reformative images. Measurement process is barely affected by human factors. This paper reviews the literatures at home and abroad about the application of measuring skeleton by CT in forensic anthropology research for individual identification in four aspects, including sex determination, height infer, facial soft tissue thickness measurement and age estimation. The major technology and the application of CT in forensic anthropology research are compared and discussed, respectively. Copyright© by the Editorial Department of Journal of Forensic Medicine.
Machado, Helena; Santos, Filipe; Silva, Susana
2011-07-15
In this paper we aim to discuss how Portuguese prisoners know and what they feel about surveillance mechanisms related to the inclusion and deletion of the DNA profiles of convicted criminals in the national forensic database. Through a set of interviews with individuals currently imprisoned we focus on the ways this group perceives forensic DNA technologies. While the institutional and political discourses maintain that the restricted use and application of DNA profiles within the national forensic database protects individuals' rights, the prisoners claim that police misuse of such technologies potentially makes it difficult to escape from surveillance and acts as a mean of reinforcing the stigma of delinquency. The prisoners also argue that additional intensive and extensive use of surveillance devices might be more protective of their own individual rights and might possibly increase potential for exoneration. Crown Copyright © 2011. Published by Elsevier Ireland Ltd. All rights reserved.
DOT National Transportation Integrated Search
1979-01-01
The Giles and Elliot discriminant functions diagnosing sex and race from cranial measurements were tested on a series of forensically examined crania of known sex and race. Of 52 crania of known sex, 46 (88%) were correctly diagnosed. Racial diagnose...
Badam, Raj Kumar; Sownetha, Triekan; Babu, D B Gandhi; Waghray, Shefali; Reddy, Lavanya; Garlapati, Komali; Chavva, Sunanda
2017-01-01
The word "autopsy" denotes "to see with own eyes." Autopsy (postmortem) is a process that includes a thorough examination of a corpse noting everything related to anatomization, surface wounds, histological and culture studies. Virtopsy is a term extracted from two words "virtual" and "autopsy." It employs imaging methods that are routinely used in clinical medicine such as computed tomography and magnetic resonance imaging in the field of autopsy, to find the reason for death. Virtopsy is a multi-disciplinary technology that combines forensic medicine and pathology, roentgenology, computer graphics, biomechanics, and physics. It is rapidly gaining importance in the field of forensics. This approach has been recently used by forensic odontologists, but yet to make its own mark in the field. This article mainly deals with "virtopsy" where in various articles were web searched, relevant data was selected, extracted, and summarized here.
Digital Stratigraphy: Contextual Analysis of File System Traces in Forensic Science.
Casey, Eoghan
2017-12-28
This work introduces novel methods for conducting forensic analysis of file allocation traces, collectively called digital stratigraphy. These in-depth forensic analysis methods can provide insight into the origin, composition, distribution, and time frame of strata within storage media. Using case examples and empirical studies, this paper illuminates the successes, challenges, and limitations of digital stratigraphy. This study also shows how understanding file allocation methods can provide insight into concealment activities and how real-world computer usage can complicate digital stratigraphy. Furthermore, this work explains how forensic analysts have misinterpreted traces of normal file system behavior as indications of concealment activities. This work raises awareness of the value of taking the overall context into account when analyzing file system traces. This work calls for further research in this area and for forensic tools to provide necessary information for such contextual analysis, such as highlighting mass deletion, mass copying, and potential backdating. © 2017 American Academy of Forensic Sciences.
3D-MSCT imaging of bullet trajectory in 3D crime scene reconstruction: two case reports.
Colard, T; Delannoy, Y; Bresson, F; Marechal, C; Raul, J S; Hedouin, V
2013-11-01
Postmortem investigations are increasingly assisted by three-dimensional multi-slice computed tomography (3D-MSCT) and have become more available to forensic pathologists over the past 20years. In cases of ballistic wounds, 3D-MSCT can provide an accurate description of the bullet location, bone fractures and, more interestingly, a clear visual of the intracorporeal trajectory (bullet track). These forensic medical examinations can be combined with tridimensional bullet trajectory reconstructions created by forensic ballistic experts. These case reports present the implementation of tridimensional methods and the results of 3D crime scene reconstruction in two cases. The authors highlight the value of collaborations between police forensic experts and forensic medicine institutes through the incorporation of 3D-MSCT data in a crime scene reconstruction, which is of great interest in forensic science as a clear visual communication tool between experts and the court. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.
Reverse engineering--rapid prototyping of the skull in forensic trauma analysis.
Kettner, Mattias; Schmidt, Peter; Potente, Stefan; Ramsthaler, Frank; Schrodt, Michael
2011-07-01
Rapid prototyping (RP) comprises a variety of automated manufacturing techniques such as selective laser sintering (SLS), stereolithography, and three-dimensional printing (3DP), which use virtual 3D data sets to fabricate solid forms in a layer-by-layer technique. Despite a growing demand for (virtual) reconstruction models in daily forensic casework, maceration of the skull is frequently assigned to ensure haptic evidence presentation in the courtroom. Owing to the progress in the field of forensic radiology, 3D data sets of relevant cases are usually available to the forensic expert. Here, we present a first application of RP in forensic medicine using computed tomography scans for the fabrication of an SLS skull model in a case of fatal hammer impacts to the head. The report is intended to show that this method fully respects the dignity of the deceased and is consistent with medical ethics but nevertheless provides an excellent 3D impression of anatomical structures and injuries. © 2011 American Academy of Forensic Sciences.
Digitized forensics: retaining a link between physical and digital crime scene traces using QR-codes
NASA Astrophysics Data System (ADS)
Hildebrandt, Mario; Kiltz, Stefan; Dittmann, Jana
2013-03-01
The digitization of physical traces from crime scenes in forensic investigations in effect creates a digital chain-of-custody and entrains the challenge of creating a link between the two or more representations of the same trace. In order to be forensically sound, especially the two security aspects of integrity and authenticity need to be maintained at all times. Especially the adherence to the authenticity using technical means proves to be a challenge at the boundary between the physical object and its digital representations. In this article we propose a new method of linking physical objects with its digital counterparts using two-dimensional bar codes and additional meta-data accompanying the acquired data for integration in the conventional documentation of collection of items of evidence (bagging and tagging process). Using the exemplary chosen QR-code as particular implementation of a bar code and a model of the forensic process, we also supply a means to integrate our suggested approach into forensically sound proceedings as described by Holder et al.1 We use the example of the digital dactyloscopy as a forensic discipline, where currently progress is being made by digitizing some of the processing steps. We show an exemplary demonstrator of the suggested approach using a smartphone as a mobile device for the verification of the physical trace to extend the chain-of-custody from the physical to the digital domain. Our evaluation of the demonstrator is performed towards the readability and the verification of its contents. We can read the bar code despite its limited size of 42 x 42 mm and rather large amount of embedded data using various devices. Furthermore, the QR-code's error correction features help to recover contents of damaged codes. Subsequently, our appended digital signature allows for detecting malicious manipulations of the embedded data.
Separation and sequence detection of overlapped fingerprints: experiments and first results
NASA Astrophysics Data System (ADS)
Kärgel, Rainer; Giebel, Sascha; Leich, Marcus; Dittmann, Jana
2011-11-01
Latent fingerprints provide vital information in modern crime scene investigation. On frequently touched surfaces the fingerprints may overlap which poses a major problem for forensic analysis. In order to make such overlapping fingerprints available for analysis, they have to be separated. An additional evaluation of the sequence in which the fingerprints were brought onto the surface can help to reconstruct the progression of events. Advances in both tasks can considerably aid crime investigation agencies and are the subject of this work. Here, a statistical approach, initially devised for the separation of overlapping text patterns by Tonazzini et al.,1 is employed to separate overlapping fingerprints. The method involves a maximum a posteriori estimation of the single fingerprints and the mixing coefficients, computed by an expectation-maximization algorithm. A fingerprint age determination feature based on corrosion is evaluated for sequence estimation. The approaches are evaluated using 30 samples of overlapping latent fingerprints on two different substrates. The fingerprint images are acquired with a non-destructive chromatic white light surface measurement device, each sample containing exactly two fingerprints that overlap in the center of the image. Since forensic investigations rely on manual assessment of acquired fingerprints by forensics experts, a subjective scale ranging from 0 to 8 is used to rate the separation results. Our results indicate that the chosen method can separate overlapped fingerprints which exhibit strong differences in contrast, since results gradually improve with the growing contrast difference of the overlapping fingerprints. Investigating the effects of corrosion leads to a reliable determination of the fingerprints' sequence as the timespan between their leaving increases.
Preventing Stress Disorders for Law Enforcement Officers Exposed to Disturbing Media
2016-09-01
soldiers suffering from post- traumatic stress disorder (PTSD), including group therapy, cognitive behavioral therapy, and service dogs. Further research...child pornography, child exploitation, group therapy, counterintelligence analyst, computer forensics, forensic examiner 15. NUMBER OF PAGES...from post-traumatic stress disorder (PTSD), including group therapy, cognitive behavioral therapy, and service dogs. Further research should be
Inexpensive portable drug detector
NASA Technical Reports Server (NTRS)
Dimeff, J.; Heimbuch, A. H.; Parker, J. A.
1977-01-01
Inexpensive, easy-to-use, self-scanning, self-calibrating, portable unit automatically graphs fluorescence spectrum of drug sample. Device also measures rate of movement through chromatographic column for forensic and medical testing.
Structure Sensor for mobile markerless augmented reality
NASA Astrophysics Data System (ADS)
Kilgus, T.; Bux, R.; Franz, A. M.; Johnen, W.; Heim, E.; Fangerau, M.; Müller, M.; Yen, K.; Maier-Hein, L.
2016-03-01
3D Visualization of anatomical data is an integral part of diagnostics and treatment in many medical disciplines, such as radiology, surgery and forensic medicine. To enable intuitive interaction with the data, we recently proposed a new concept for on-patient visualization of medical data which involves rendering of subsurface structures on a mobile display that can be moved along the human body. The data fusion is achieved with a range imaging device attached to the display. The range data is used to register static 3D medical imaging data with the patient body based on a surface matching algorithm. However, our previous prototype was based on the Microsoft Kinect camera and thus required a cable connection to acquire color and depth data. The contribution of this paper is two-fold. Firstly, we replace the Kinect with the Structure Sensor - a novel cable-free range imaging device - to improve handling and user experience and show that the resulting accuracy (target registration error: 4.8+/-1.5 mm) is comparable to that achieved with the Kinect. Secondly, a new approach to visualizing complex 3D anatomy based on this device, as well as 3D printed models of anatomical surfaces, is presented. We demonstrate that our concept can be applied to in vivo data and to a 3D printed skull of a forensic case. Our new device is the next step towards clinical integration and shows that the concept cannot only be applied during autopsy but also for presentation of forensic data to laypeople in court or medical education.
Nuclear Forensics and Radiochemistry: Fission
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rundberg, Robert S.
Radiochemistry has been used to study fission since it’ discovery. Radiochemical methods are used to determine cumulative mass yields. These measurements have led to the two-mode fission hypothesis to model the neutron energy dependence of fission product yields. Fission product yields can be used for the nuclear forensics of nuclear explosions. The mass yield curve depends on both the fuel and the neutron spectrum of a device. Recent studies have shown that the nuclear structure of the compound nucleus can affect the mass yield distribution.
Badam, Raj Kumar; Sownetha, Triekan; Babu, D. B. Gandhi; Waghray, Shefali; Reddy, Lavanya; Garlapati, Komali; Chavva, Sunanda
2017-01-01
The word “autopsy” denotes “to see with own eyes.” Autopsy (postmortem) is a process that includes a thorough examination of a corpse noting everything related to anatomization, surface wounds, histological and culture studies. Virtopsy is a term extracted from two words “virtual” and “autopsy.” It employs imaging methods that are routinely used in clinical medicine such as computed tomography and magnetic resonance imaging in the field of autopsy, to find the reason for death. Virtopsy is a multi-disciplinary technology that combines forensic medicine and pathology, roentgenology, computer graphics, biomechanics, and physics. It is rapidly gaining importance in the field of forensics. This approach has been recently used by forensic odontologists, but yet to make its own mark in the field. This article mainly deals with “virtopsy” where in various articles were web searched, relevant data was selected, extracted, and summarized here. PMID:28584475
Blurriness in Live Forensics: An Introduction
NASA Astrophysics Data System (ADS)
Savoldi, Antonio; Gubian, Paolo
The Live Forensics discipline aims at answering basic questions related to a digital crime, which usually involves a computer-based system. The investigation should be carried out with the very goal to establish which processes were running, when they were started and by whom, what specific activities those processes were doing and the state of active network connections. Besides, a set of tools needs to be launched on the running system by altering, as a consequence of the Locard’s exchange principle [2], the system’s memory. All the methodologies for the live forensics field proposed until now have a basic, albeit important, weakness, which is the inability to quantify the perturbation, or blurriness, of the system’s memory of the investigated computer. This is the very last goal of this paper: to provide a set of guidelines which can be effectively used for measuring the uncertainty of the collected volatile memory on a live system being investigated.
The Research on Linux Memory Forensics
NASA Astrophysics Data System (ADS)
Zhang, Jun; Che, ShengBing
2018-03-01
Memory forensics is a branch of computer forensics. It does not depend on the operating system API, and analyzes operating system information from binary memory data. Based on the 64-bit Linux operating system, it analyzes system process and thread information from physical memory data. Using ELF file debugging information and propose a method for locating kernel structure member variable, it can be applied to different versions of the Linux operating system. The experimental results show that the method can successfully obtain the sytem process information from physical memory data, and can be compatible with multiple versions of the Linux kernel.
Applications of a digital darkroom in the forensic laboratory
NASA Astrophysics Data System (ADS)
Bullard, Barry D.; Birge, Brian
1997-02-01
Through a joint agreement with the Indiana-Marion County Forensic Laboratory Services Agency, the Institute for Forensic Imaging conducted a pilot program to investigate crime lab applications of a digital darkroom. IFI installed and staffed a state-of-the-art digital darkroom in the photography laboratory of the Indianapolis-Marion County crime lab located at Indianapolis, Indiana. The darkroom consisted of several high resolution color digital cameras, image processing computer, dye sublimation continuous tone digital printers, and CD-ROM writer. This paper describes the use of the digital darkroom in several crime lab investigations conducted during the program.
Methodological approach to crime scene investigation: the dangers of technology
NASA Astrophysics Data System (ADS)
Barnett, Peter D.
1997-02-01
The visitor to any modern forensic science laboratory is confronted with equipment and processes that did not exist even 10 years ago: thermocyclers to allow genetic typing of nanogram amounts of DNA isolated from a few spermatozoa; scanning electron microscopes that can nearly automatically detect submicrometer sized particles of molten lead, barium and antimony produced by the discharge of a firearm and deposited on the hands of the shooter; and computers that can compare an image of a latent fingerprint with millions of fingerprints stored in the computer memory. Analysis of populations of physical evidence has permitted statistically minded forensic scientists to use Bayesian inference to draw conclusions based on a priori assumptions which are often poorly understood, irrelevant, or misleading. National commissions who are studying quality control in DNA analysis propose that people with barely relevant graduate degrees and little forensic science experience be placed in charge of forensic DNA laboratories. It is undeniable that high- tech has reversed some miscarriages of justice by establishing the innocence of a number of people who were imprisoned for years for crimes that they did not commit. However, this papers deals with the dangers of technology in criminal investigations.
RADIOLOGICAL SEALED SOURCE LIBRARY: A NUCLEAR FORENSICS TOOL
DOE Office of Scientific and Technical Information (OSTI.GOV)
Canaday, Jodi; Chamberlain, David; Finck, Martha
If a terrorist were to obtain and possibly detonate a device that contained radiological material, radiological forensic analysis of the material and source capsule could provide law enforcement with valuable clues about the origin of the radiological material; this information could then provide further leads on where the material and sealed source was obtained, and the loss of control point. This information could potentially be utilized for attribution and prosecution. Analyses of nuclear forensic signatures for radiological materials are generally understood to include isotopic ratios, trace element concentrations, the time since irradiation or purification, and morphology. Radiological forensic signatures formore » sealed sources provide additional information that leverages information on the physical design and chemical composition of the source capsule and containers, physical markings indicative of an owner or manufacturer. Argonne National Laboratory (Argonne), in collaboration with Idaho National Laboratory (INL), has been working since 2003 to understand signatures that could be used to identify specific source manufacturers. These signatures include the materials from which the capsule is constructed, dimensions, weld details, elemental composition, and isotopic abundances of the radioactive material. These signatures have been compiled in a library known as the Argonne/INL Radiological Sealed Source Library. Data collected for the library has included open-source information from vendor catalogs and web pages; discussions with source manufacturers and touring of production facilities (both protected through non-disclosure agreements); technical publications; and government registries such as the U.S. Nuclear Regulatory Commission’s Sealed Source and Device Registry.« less
Speech watermarking: an approach for the forensic analysis of digital telephonic recordings.
Faundez-Zanuy, Marcos; Lucena-Molina, Jose J; Hagmüller, Martin
2010-07-01
In this article, the authors discuss the problem of forensic authentication of digital audio recordings. Although forensic audio has been addressed in several articles, the existing approaches are focused on analog magnetic recordings, which are less prevalent because of the large amount of digital recorders available on the market (optical, solid state, hard disks, etc.). An approach based on digital signal processing that consists of spread spectrum techniques for speech watermarking is presented. This approach presents the advantage that the authentication is based on the signal itself rather than the recording format. Thus, it is valid for usual recording devices in police-controlled telephone intercepts. In addition, our proposal allows for the introduction of relevant information such as the recording date and time and all the relevant data (this is not always possible with classical systems). Our experimental results reveal that the speech watermarking procedure does not interfere in a significant way with the posterior forensic speaker identification.
Zimmerman, Heather A; Meizel-Lambert, Cayli J; Schultz, John J; Sigman, Michael E
2015-03-01
Forensic anthropologists are generally able to identify skeletal materials (bone and tooth) using gross anatomical features; however, highly fragmented or taphonomically altered materials may be problematic to identify. Several chemical analysis techniques have been shown to be reliable laboratory methods that can be used to determine if questionable fragments are osseous, dental, or non-skeletal in nature. The purpose of this review is to provide a detailed background of chemical analysis techniques focusing on elemental compositions that have been assessed for use in differentiating osseous, dental, and non-skeletal materials. More recently, chemical analysis studies have also focused on using the elemental composition of osseous/dental materials to evaluate species and provide individual discrimination, but have generally been successful only in small, closed groups, limiting their use forensically. Despite significant advances incorporating a variety of instruments, including handheld devices, further research is necessary to address issues in standardization, error rates, and sample size/diversity. Copyright © 2014 Forensic Science Society. Published by Elsevier Ireland Ltd. All rights reserved.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jared Stimson
FORENSIC ANALYSIS OF WINDOW’S® VIRTUAL MEMORY INCORPORATING THE SYSTEM’S PAGEFILE Computer Forensics is concerned with the use of computer investigation and analysis techniques in order to collect evidence suitable for presentation in court. The examination of volatile memory is a relatively new but important area in computer forensics. More recently criminals are becoming more forensically aware and are now able to compromise computers without accessing the hard disk of the target computer. This means that traditional incident response practice of pulling the plug will destroy the only evidence of the crime. While some techniques are available for acquiring the contentsmore » of main memory, few exist which can analyze these data in a meaningful way. One reason for this is how memory is managed by the operating system. Data belonging to one process can be distributed arbitrarily across physical memory or the hard disk, making it very difficult to recover useful information. This report will focus on how these disparate sources of information can be combined to give a single, contiguous address space for each process. Using address translation a tool is developed to reconstruct the virtual address space of a process by combining a physical memory dump with the page-file on the hard disk. COUNTERINTELLIGENCE THROUGH MALICIOUS CODE ANALYSIS As computer network technology continues to grow so does the reliance on this technology for everyday business functionality. To appeal to customers and employees alike, businesses are seeking an increased online prescience, and to increase productivity the same businesses are computerizing their day-to-day operations. The combination of a publicly accessible interface to the businesses network, and the increase in the amount of intellectual property present on these networks presents serious risks. All of this intellectual property now faces constant attacks from a wide variety of malicious software that is intended to uncover company and government secrets. Every year billions of dollars are invested in preventing and recovering from the introduction of malicious code into a system. However, there is little research being done on leveraging these attacks for counterintelligence opportunities. With the ever-increasing number of vulnerable computers on the Internet the task of attributing these attacks to an organization or a single person is a daunting one. This thesis will demonstrate the idea of intentionally running a piece of malicious code in a secure environment in order to gain counterintelligence on an attacker.« less
Improved JPEG anti-forensics with better image visual quality and forensic undetectability.
Singh, Gurinder; Singh, Kulbir
2017-08-01
There is an immediate need to validate the authenticity of digital images due to the availability of powerful image processing tools that can easily manipulate the digital image information without leaving any traces. The digital image forensics most often employs the tampering detectors based on JPEG compression. Therefore, to evaluate the competency of the JPEG forensic detectors, an anti-forensic technique is required. In this paper, two improved JPEG anti-forensic techniques are proposed to remove the blocking artifacts left by the JPEG compression in both spatial and DCT domain. In the proposed framework, the grainy noise left by the perceptual histogram smoothing in DCT domain can be reduced significantly by applying the proposed de-noising operation. Two types of denoising algorithms are proposed, one is based on the constrained minimization problem of total variation of energy and other on the normalized weighted function. Subsequently, an improved TV based deblocking operation is proposed to eliminate the blocking artifacts in the spatial domain. Then, a decalibration operation is applied to bring the processed image statistics back to its standard position. The experimental results show that the proposed anti-forensic approaches outperform the existing state-of-the-art techniques in achieving enhanced tradeoff between image visual quality and forensic undetectability, but with high computational cost. Copyright © 2017 Elsevier B.V. All rights reserved.
Dedouit, Fabrice; Saint-Martin, Pauline; Mokrane, Fatima-Zohra; Savall, Frédéric; Rousseau, Hervé; Crubézy, Eric; Rougé, Daniel; Telmon, Norbert
2015-09-01
Virtual anthropology consists of the introduction of modern slice imaging to biological and forensic anthropology. Thanks to this non-invasive scientific revolution, some classifications and staging systems, first based on dry bone analysis, can be applied to cadavers with no need for specific preparation, as well as to living persons. Estimation of bone and dental age is one of the possibilities offered by radiology. Biological age can be estimated in clinical forensic medicine as well as in living persons. Virtual anthropology may also help the forensic pathologist to estimate a deceased person's age at death, which together with sex, geographical origin and stature, is one of the important features determining a biological profile used in reconstructive identification. For this forensic purpose, the radiological tools used are multislice computed tomography and, more recently, X-ray free imaging techniques such as magnetic resonance imaging and ultrasound investigations. We present and discuss the value of these investigations for age estimation in anthropology.
Challenge Paper: Validation of Forensic Techniques for Criminal Prosecution
DOE Office of Scientific and Technical Information (OSTI.GOV)
Erbacher, Robert F.; Endicott-Popovsky, Barbara E.; Frincke, Deborah A.
2007-04-10
Abstract: As in many domains, there is increasing agreement in the user and research community that digital forensics analysts would benefit from the extension, development and application of advanced techniques in performing large scale and heterogeneous data analysis. Modern digital forensics analysis of cyber-crimes and cyber-enabled crimes often requires scrutiny of massive amounts of data. For example, a case involving network compromise across multiple enterprises might require forensic analysis of numerous sets of network logs and computer hard drives, potentially involving 100?s of gigabytes of heterogeneous data, or even terabytes or petabytes of data. Also, the goal for forensic analysismore » is to not only determine whether the illicit activity being considered is taking place, but also to identify the source of the activity and the full extent of the compromise or impact on the local network. Even after this analysis, there remains the challenge of using the results in subsequent criminal and civil processes.« less
Application of automation and information systems to forensic genetic specimen processing.
Leclair, Benoît; Scholl, Tom
2005-03-01
During the last 10 years, the introduction of PCR-based DNA typing technologies in forensic applications has been highly successful. This technology has become pervasive throughout forensic laboratories and it continues to grow in prevalence. For many criminal cases, it provides the most probative evidence. Criminal genotype data banking and victim identification initiatives that follow mass-fatality incidents have benefited the most from the introduction of automation for sample processing and data analysis. Attributes of offender specimens including large numbers, high quality and identical collection and processing are ideal for the application of laboratory automation. The magnitude of kinship analysis required by mass-fatality incidents necessitates the application of computing solutions to automate the task. More recently, the development activities of many forensic laboratories are focused on leveraging experience from these two applications to casework sample processing. The trend toward increased prevalence of forensic genetic analysis will continue to drive additional innovations in high-throughput laboratory automation and information systems.
Research in Computer Forensics
2002-06-01
systems and how they can aid in the recovery of digital evidence in a forensic analysis. Exposures to hacking techniques and tools in CS3675—Internet...cryptography, access control, authentication, biometrics, actions to be taken during an attack and case studies of hacking and information warfare. 11...chat, surfing, instant messaging and hacking with powerful access control and filter capabilities. The monitor can operates in a Prevention mode to
Mobile markerless augmented reality and its application in forensic medicine.
Kilgus, Thomas; Heim, Eric; Haase, Sven; Prüfer, Sabine; Müller, Michael; Seitel, Alexander; Fangerau, Markus; Wiebe, Tamara; Iszatt, Justin; Schlemmer, Heinz-Peter; Hornegger, Joachim; Yen, Kathrin; Maier-Hein, Lena
2015-05-01
During autopsy, forensic pathologists today mostly rely on visible indication, tactile perception and experience to determine the cause of death. Although computed tomography (CT) data is often available for the bodies under examination, these data are rarely used due to the lack of radiological workstations in the pathological suite. The data may prevent the forensic pathologist from damaging evidence by allowing him to associate, for example, external wounds to internal injuries. To facilitate this, we propose a new multimodal approach for intuitive visualization of forensic data and evaluate its feasibility. A range camera is mounted on a tablet computer and positioned in a way such that the camera simultaneously captures depth and color information of the body. A server estimates the camera pose based on surface registration of CT and depth data to allow for augmented reality visualization of the internal anatomy directly on the tablet. Additionally, projection of color information onto the CT surface is implemented. We validated the system in a postmortem pilot study using fiducials attached to the skin for quantification of a mean target registration error of [Formula: see text] mm. The system is mobile, markerless, intuitive and real-time capable with sufficient accuracy. It can support the forensic pathologist during autopsy with augmented reality and textured surfaces. Furthermore, the system enables multimodal documentation for presentation in court. Despite its preliminary prototype status, it has high potential due to its low price and simplicity.
An evolution of image source camera attribution approaches.
Jahanirad, Mehdi; Wahab, Ainuddin Wahid Abdul; Anuar, Nor Badrul
2016-05-01
Camera attribution plays an important role in digital image forensics by providing the evidence and distinguishing characteristics of the origin of the digital image. It allows the forensic analyser to find the possible source camera which captured the image under investigation. However, in real-world applications, these approaches have faced many challenges due to the large set of multimedia data publicly available through photo sharing and social network sites, captured with uncontrolled conditions and undergone variety of hardware and software post-processing operations. Moreover, the legal system only accepts the forensic analysis of the digital image evidence if the applied camera attribution techniques are unbiased, reliable, nondestructive and widely accepted by the experts in the field. The aim of this paper is to investigate the evolutionary trend of image source camera attribution approaches from fundamental to practice, in particular, with the application of image processing and data mining techniques. Extracting implicit knowledge from images using intrinsic image artifacts for source camera attribution requires a structured image mining process. In this paper, we attempt to provide an introductory tutorial on the image processing pipeline, to determine the general classification of the features corresponding to different components for source camera attribution. The article also reviews techniques of the source camera attribution more comprehensively in the domain of the image forensics in conjunction with the presentation of classifying ongoing developments within the specified area. The classification of the existing source camera attribution approaches is presented based on the specific parameters, such as colour image processing pipeline, hardware- and software-related artifacts and the methods to extract such artifacts. The more recent source camera attribution approaches, which have not yet gained sufficient attention among image forensics researchers, are also critically analysed and further categorised into four different classes, namely, optical aberrations based, sensor camera fingerprints based, processing statistics based and processing regularities based, to present a classification. Furthermore, this paper aims to investigate the challenging problems, and the proposed strategies of such schemes based on the suggested taxonomy to plot an evolution of the source camera attribution approaches with respect to the subjective optimisation criteria over the last decade. The optimisation criteria were determined based on the strategies proposed to increase the detection accuracy, robustness and computational efficiency of source camera brand, model or device attribution. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
Microbiome Tools for Forensic Science.
Metcalf, Jessica L; Xu, Zhenjiang Z; Bouslimani, Amina; Dorrestein, Pieter; Carter, David O; Knight, Rob
2017-09-01
Microbes are present at every crime scene and have been used as physical evidence for over a century. Advances in DNA sequencing and computational approaches have led to recent breakthroughs in the use of microbiome approaches for forensic science, particularly in the areas of estimating postmortem intervals (PMIs), locating clandestine graves, and obtaining soil and skin trace evidence. Low-cost, high-throughput technologies allow us to accumulate molecular data quickly and to apply sophisticated machine-learning algorithms, building generalizable predictive models that will be useful in the criminal justice system. In particular, integrating microbiome and metabolomic data has excellent potential to advance microbial forensics. Copyright © 2017. Published by Elsevier Ltd.
[The procedure for documentation of digital images in forensic medical histology].
Putintsev, V A; Bogomolov, D V; Fedulova, M V; Gribunov, Iu P; Kul'bitskiĭ, B N
2012-01-01
This paper is devoted to the novel computer technologies employed in the studies of histological preparations. These technologies allow to visualize digital images, structurize the data obtained and store the results in computer memory. The authors emphasize the necessity to properly document digital images obtained during forensic-histological studies and propose the procedure for the formulation of electronic documents in conformity with the relevant technical and legal requirements. It is concluded that the use of digital images as a new study object permits to obviate the drawbacks inherent in the work with the traditional preparations and pass from descriptive microscopy to their quantitative analysis.
A first proposal for a general description model of forensic traces
NASA Astrophysics Data System (ADS)
Lindauer, Ina; Schäler, Martin; Vielhauer, Claus; Saake, Gunter; Hildebrandt, Mario
2012-06-01
In recent years, the amount of digitally captured traces at crime scenes increased rapidly. There are various kinds of such traces, like pick marks on locks, latent fingerprints on various surfaces as well as different micro traces. Those traces are different from each other not only in kind but also in which information they provide. Every kind of trace has its own properties (e.g., minutiae for fingerprints, or raking traces for locks) but there are also large amounts of metadata which all traces have in common like location, time and other additional information in relation to crime scenes. For selected types of crime scene traces, type-specific databases already exist, such as the ViCLAS for sexual offences, the IBIS for ballistic forensics or the AFIS for fingerprints. These existing forensic databases strongly differ in the trace description models. For forensic experts it would be beneficial to work with only one database capable of handling all possible forensic traces acquired at a crime scene. This is especially the case when different kinds of traces are interrelated (e.g., fingerprints and ballistic marks on a bullet casing). Unfortunately, current research on interrelated traces as well as general forensic data models and structures is not mature enough to build such an encompassing forensic database. Nevertheless, recent advances in the field of contact-less scanning make it possible to acquire different kinds of traces with the same device. Therefore the data of these traces is structured similarly what simplifies the design of a general forensic data model for different kinds of traces. In this paper we introduce a first common description model for different forensic trace types. Furthermore, we apply for selected trace types from the well established database schema development process the phases of transferring expert knowledge in the corresponding forensic fields into an extendible, database-driven, generalised forensic description model. The trace types considered here are fingerprint traces, traces at locks, micro traces and ballistic traces. Based on these basic trace types, also combined traces (multiple or overlapped fingerprints, fingerprints on bullet casings, etc) and partial traces are considered.
GrigoraSNPs: Optimized Analysis of SNPs for DNA Forensics.
Ricke, Darrell O; Shcherbina, Anna; Michaleas, Adam; Fremont-Smith, Philip
2018-04-16
High-throughput sequencing (HTS) of single nucleotide polymorphisms (SNPs) enables additional DNA forensic capabilities not attainable using traditional STR panels. However, the inclusion of sets of loci selected for mixture analysis, extended kinship, phenotype, biogeographic ancestry prediction, etc., can result in large panel sizes that are difficult to analyze in a rapid fashion. GrigoraSNP was developed to address the allele-calling bottleneck that was encountered when analyzing SNP panels with more than 5000 loci using HTS. GrigoraSNPs uses a MapReduce parallel data processing on multiple computational threads plus a novel locus-identification hashing strategy leveraging target sequence tags. This tool optimizes the SNP calling module of the DNA analysis pipeline with runtimes that scale linearly with the number of HTS reads. Results are compared with SNP analysis pipelines implemented with SAMtools and GATK. GrigoraSNPs removes a computational bottleneck for processing forensic samples with large HTS SNP panels. Published 2018. This article is a U.S. Government work and is in the public domain in the USA.
Postmortem computed tomography (PMCT) and disaster victim identification.
Brough, A L; Morgan, B; Rutty, G N
2015-09-01
Radiography has been used for identification since 1927, and established a role in mass fatality investigations in 1949. More recently, postmortem computed tomography (PMCT) has been used for disaster victim identification (DVI). PMCT offers several advantages compared with fluoroscopy, plain film and dental X-rays, including: speed, reducing the number of on-site personnel and imaging modalities required, making it potentially more efficient. However, there are limitations that inhibit the international adoption of PMCT into routine practice. One particular problem is that due to the fact that forensic radiology is a relatively new sub-speciality, there are no internationally established standards for image acquisition, image interpretation and archiving. This is reflected by the current INTERPOL DVI form, which does not contain a PMCT section. The DVI working group of the International Society of Forensic Radiology and Imaging supports the use of imaging in mass fatality response and has published positional statements in this area. This review will discuss forensic radiology, PMCT, and its role in disaster victim identification.
Moskała, Artur; Woźniak, Krzysztof; Kluza, Piotr; Romaszko, Karol; Lopatin, Oleksij
2016-01-01
Since traffic accidents are an important problem in forensic medicine, there is a constant search for new solutions to help with an investigation process in such cases. In recent years there was a rapid development of post-mortem imaging techniques, especially post-mortem computed tomography (PMCT). In our work we concentrated on a potential advantage of PMCT in cases of motorcycle accident fatalities. The results of forensic autopsy were compared with combined results of the autopsy and PMCT to check in which areas use of these two techniques gives statistically important increase in number of findings. The hypothesis was confirmed in case of pneumothorax and fractures of skull, spine, clavicle, scapula, lower leg bones. As for majority of other bone fractures locations and brain injures there were single cases with pathologies visible only in PMCT, but too few to reach expected level of p-value. In case of injuries of solid organs and soft tissues statistical analysis did not confirmed any advantage of unenhanced PMCT use. On the whole it has been shown that PMCT used as an adjunct to forensic autopsy can cause an increase in information about vitally important regions in case of motorcycle accident fatalities. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.
Crouse, Cecelia A; Yeung, Stephanie; Greenspoon, Susan; McGuckian, Amy; Sikorsky, Julie; Ban, Jeff; Mathies, Richard
2005-08-01
To present validation studies performed for the implementation of existing and new technologies to increase the efficiency in the forensic DNA Section of the Palm Beach County Sheriff's Office (PBSO) Crime Laboratory. Using federally funded grants, internal support, and an external Process Mapping Team, the PBSO collaborated with forensic vendors, universities, and other forensic laboratories to enhance DNA testing procedures, including validation of the DNA IQ magnetic bead extraction system, robotic DNA extraction using the BioMek2000, the ABI7000 Sequence Detection System, and is currently evaluating a micro Capillary Array Electrophoresis device. The PBSO successfully validated and implemented both manual and automated Promega DNA IQ magnetic bead extractions system, which have increased DNA profile results from samples with low DNA template concentrations. The Beckman BioMek2000 DNA robotic workstation has been validated for blood, tissue, bone, hair, epithelial cells (touch evidence), and mixed stains such as semen. There has been a dramatic increase in the number of samples tested per case since implementation of the robotic extraction protocols. The validation of the ABI7000 real-time quantitative polymerase chain reaction (qPCR) technology and the single multiplex short tandem repeat (STR) PowerPlex16 BIO amplification system has provided both a time and a financial benefit. In addition, the qPCR system allows more accurate DNA concentration data and the PowerPlex 16 BIO multiplex generates DNA profiles data in half the time when compared to PowerPlex1.1 and PowerPlex2.1 STR systems. The PBSO's future efficiency requirements are being addressed through collaboration with the University of California at Berkeley and the Virginia Division of Forensic Science to validate microcapillary array electrophoresis instrumentation. Initial data demonstrated the electrophoresis of 96 samples in less than twenty minutes. The PBSO demonstrated, through the validation of more efficient extraction and quantification technology, an increase in the number of evidence samples tested using robotic/DNA IQ magnetic bead DNA extraction, a decrease in the number of negative samples amplified due to qPCR and implementation of a single multiplex amplification system. In addition, initial studies show the microcapillary array electrophoresis device (microCAE) evaluation results provide greater sensitivity and faster STR analysis output than current platforms.
Gascho, Dominic; Morf, Nadja V; Thali, Michael J; Schaerli, Sarah
2017-05-01
Clear identification of soft tissue remains as being of non-human origin may be visually difficult in some cases e.g. due to decomposition. Thus, an additional examination is required. The use of an immunochromatographic rapid tests (IRT) device can be an easy solution with the additional advantage to be used directly at the site of discovery. The use of these test devices for detecting human blood at crime scenes is a common method. However, the IRT is specific not only for blood but also for differentiation between human and non-human soft tissue remains. In the following this method is discussed and validated by means of two forensic cases and several samples of various animals. Copyright © 2017 The Chartered Society of Forensic Sciences. Published by Elsevier B.V. All rights reserved.
Ahmed, Abdulghani Ali; Xue Li, Chua
2018-01-01
Cloud storage service allows users to store their data online, so that they can remotely access, maintain, manage, and back up data from anywhere via the Internet. Although helpful, this storage creates a challenge to digital forensic investigators and practitioners in collecting, identifying, acquiring, and preserving evidential data. This study proposes an investigation scheme for analyzing data remnants and determining probative artifacts in a cloud environment. Using pCloud as a case study, this research collected the data remnants available on end-user device storage following the storing, uploading, and accessing of data in the cloud storage. Data remnants are collected from several sources, including client software files, directory listing, prefetch, registry, network PCAP, browser, and memory and link files. Results demonstrate that the collected remnants data are beneficial in determining a sufficient number of artifacts about the investigated cybercrime. © 2017 American Academy of Forensic Sciences.
Humphrey, Caitlin; Kumaratilake, Jaliya; Henneberg, Maciej
2016-05-01
Knife attacks are commonly seen in Australia and other countries. During forensic investigations the force with which a wound was inflicted is often questioned. The ability to examine resultant trauma and particular weapons at different forces with an experimental device may lead to better interpretations of knife wounds. The objective of this study is to design, construct and test a device to analyse the characteristics and forces involved in knife attacks, particularly incised wounds. The mechanical variables (e.g. force, angle, knife geometry) involved in knife attacks have been considered to design and construct a suitable device which allows these variables to be systematically controlled and varied. A device was designed and constructed from mild steel. This included a pivoting arm and instrumented knife holder. The arm has adjustable angle and weight so that knives can be operated at different calculated forces. A device was successfully constructed and the repeatability of incised knife trauma and its characteristics in skeletal tissues were investigated. A device which allows reproducible and controlled experiments with knife wounds will be advantageous to forensic investigations. In particular, in determining forces and types of weapons associated with particular wounds, identifying or eliminating suspected weapons and more accurately answering the common question: How much force would be required to cause that particular wound. This could help to characterise the perpetrator. The device can be altered to be used in the future to investigate trauma caused by other weapons. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
Nuclear Forensics for High School Science
NASA Astrophysics Data System (ADS)
Mader, Catherine; Doss, Heide; Plisch, Monica; Isola, Drew; Mirakovitz, Kathy
2011-04-01
We developed an education module on nuclear forensics, designed for high school science classrooms. The lessons include a mix of hands-on activities, computer simulations, and written exercises. Students are presented with realistic scenarios designed to develop their knowledge of nuclear science and its application to nuclear forensics. A two-day teacher workshop offered at Hope College attracted 20 teachers. They were loaned kits to implement activities with their students, and each teacher spent 3--7 days on the lessons. All who reported back said they would do it again and would share the lessons with colleagues. Many said that access to equipment and ready-made lessons enabled them to expand what they taught about nuclear science and introduce nuclear forensics. A few teachers invited guest speakers to their classroom, which provided an excellent opportunity to share career information with students. We acknowledge generous support from the Department of Homeland Security and the AIP Meggars Award.
Accreditation standards for undergraduate forensic science programs
NASA Astrophysics Data System (ADS)
Miller, Marilyn Tebbs
Undergraduate forensic science programs are experiencing unprecedented growth in numbers of programs offered and, as a result, student enrollments are increasing. Currently, however, these programs are not subject to professional specialized accreditation. This study sought to identify desirable student outcome measures for undergraduate forensic science programs that should be incorporated into such an accreditation process. To determine desirable student outcomes, three types of data were collected and analyzed. All the existing undergraduate forensic science programs in the United States were examined with regard to the input measures of degree requirements and curriculum content, and for the output measures of mission statements and student competencies. Accreditation procedures and guidelines for three other science-based disciplines, computer science, dietetics, and nursing, were examined to provide guidance on accreditation processes for forensic science education programs. Expert opinion on outcomes for program graduates was solicited from the major stakeholders of undergraduate forensic science programs-forensic science educators, crime laboratory directors, and recent graduates. Opinions were gathered by using a structured Internet-based survey; the total response rate was 48%. Examination of the existing undergraduate forensic science programs revealed that these programs do not use outcome measures. Of the accreditation processes for other science-based programs, nursing education provided the best model for forensic science education, due primarily to the balance between the generality and the specificity of the outcome measures. From the analysis of the questionnaire data, preliminary student outcomes, both general and discipline-specific, suitable for use in the accreditation of undergraduate forensic science programs were determined. The preliminary results were reviewed by a panel of experts and, based on their recommendations, the outcomes identified were revised and refined. The results of this study were used to identify student outcomes and to suggest accreditation standards and an accreditation process for undergraduate forensic science programs based on those outcomes.
Aboud, Maurice J; Gassmann, Marcus; McCord, Bruce
2015-09-01
There are situations in which it is important to quickly and positively identify an individual. Examples include suspects detained in the neighborhood of a bombing or terrorist incident, individuals detained attempting to enter or leave the country, and victims of mass disasters. Systems utilized for these purposes must be fast, portable, and easy to maintain. DNA typing methods provide the best biometric information yielding identity, kinship, and geographical origin, but they are not portable and rapid. This study details the development of a portable short-channel microfluidic device based on a modified Agilent 2100 bioanalyzer for applications in forensic genomics. The system utilizes a denaturing polymer matrix with dual-channel laser-induced fluorescence and is capable of producing a genotype in 80 sec. The device was tested for precision and resolution using an allelic ladder created from 6 short tandem repeat (STR) loci and a sex marker (amelogenin). The results demonstrated a precision of 0.09-0.21 bp over the entire size range and resolution values from 2.5 to 4.1 bp. Overall, the results demonstrate the chip provides a portable, rapid, and precise method for screening amplified short tandem repeats and human identification screening. © 2015 American Academy of Forensic Sciences.
Polish forensic medicine A.D. 2016 - report of the National Consultant.
Teresiński, Grzegorz
2016-01-01
The aim of the study was to present the current state and basis of functioning of an academic model of forensic expert activities in Poland and perspectives of their further development. The study material included information obtained from a preliminary survey among regional consultants within the ongoing activities of the national consultant team. The recently completed period of research infrastructure support within the policy of coherence of the European Union contributed to significant advances in scientific-educational potential of the majority of university forensic medicine centres. However, the improved educational base and purchases of new diagnostic devices were not associated with a considerable increase in staff resources of individual units, which finally decides about the renown of the entire discipline. It is necessary to undertake initiatives to highlight the importance of forensic medicine as a separate medical field and to increase the number of physicians starting specialist trainings. A highly profiled nature of the speciality necessitates cooperation with other centres and receptiveness to clinical fields. The establishment of various forms of cooperation is a measure of optimal use of equipment and stimulation of multi-centre research.
Analysis of dental injuries with clinical implications: A forensic case report.
Tan, Si-Lei; Peng, Shu-Ya; Wan, Lei; Chen, Jie-Min; Xia, Wen-Tao
2018-01-01
Dental injuries, especially of the incisors, caused by punches in violent criminal attacks could be seen in daily forensic casework involving the identification of injuries to a living body. Sometimes, when there is neither circumstantial evidence nor information about the surrounding circumstances, it is difficult to discern the cause of these injuries and the manner in which they were inflicted. As an example of clinical forensic medicine, we present the case of a 58-year-old woman whose teeth were injured when fighting with her son-in-law over household affairs with no witnesses present. The two parties had conflicting stories about the cause of the woman's injury. The woman claimed that her teeth were lost while she was being beaten by her son-in-law, and the man argued that the damage to his mother-in-law's teeth was self-inflicted when she bit his fingers. The police attending the crime called for a forensic examination. Forensic practitioners analysed the mechanism of the tooth loss using multi-slice spiral computed tomography (MSCT) and imaging reconstruction technology. Local alveolar bone (medial alveolar) fracture and a small area of alveolar bone loss were found on MSCT. Thus, forensic medical experts speculated that the woman's lower central and lateral incisors were lost as a result of a violent attack and were not self-inflicted. Finally, forensic practitioners helped police in avoiding a miscarriage of justice and wrongful conviction.
Thali, M J; Dirnhofer, R; Becker, R; Oliver, W; Potter, K
2004-10-01
The study aimed to validate magnetic resonance microscopy (MRM) studies of forensic tissue specimens (skin samples with electric injury patterns) against the results from routine histology. Computed tomography and magnetic resonance imaging are fast becoming important tools in clinical and forensic pathology. This study is the first forensic application of MRM to the analysis of electric injury patterns in human skin. Three-dimensional high-resolution MRM images of fixed skin specimens provided a complete 3D view of the damaged tissues at the site of an electric injury as well as in neighboring tissues, consistent with histologic findings. The image intensity of the dermal layer in T2-weighted MRM images was reduced in the central zone due to carbonization or coagulation necrosis and increased in the intermediate zone because of dermal edema. A subjacent blood vessel with an intravascular occlusion supports the hypothesis that current traveled through the vascular system before arcing to ground. High-resolution imaging offers a noninvasive alternative to conventional histology in forensic wound analysis and can be used to perform 3D virtual histology.
Ahmed, Anthony O; Hunter, Kristin M; Goodrum, Nada M; Batten, Nancy-Jane; Birgenheir, Denis; Hardison, Erik; Dixon, Thaddeus; Buckley, Peter F
2015-09-01
Cognitive remediation has proven efficacy for improving neurocognition in people with schizophrenia. The current study evaluated the benefits of cognitive remediation on neurocognition, functioning, psychotic symptoms, and aggression in a sample of forensic and mental health patients. Care recipients with schizophrenia or schizoaffective disorder (N = 78) receiving services in the forensic and mental health units of a state hospital were randomized to participate in cognitive remediation versus computer games control activities. Participants' neurocognition, functional capacity, experiential recovery, psychotic symptoms, and aggression incidents were assessed at baseline and posttreatment. Cognitive remediation was associated with improvements in several neurocognitive domains and circumscribed domains of functional capacity. People assigned to cognitive remediation experiences greater reductions in negative symptoms, agitation/excitement, and verbal and physical aggression. In addition to improving neurocognition in long-term hospitalized forensic and mental health patients, cognitive remediation may enhance efforts at reducing negative symptoms, emotion dysregulation, and aggression incidents. Forensic settings may represent a new frontier for the clinical dissemination of cognitive remediation. Copyright © 2015 Elsevier Ltd. All rights reserved.
Who Did It? Using International Forensics to Detect and Deter Nuclear Terrorism
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dunlop, W H; Smith, H P
On February 2, the ''New York Times'' reported that the Pentagon has formed a nuclear forensics team tasked with identifying the terrorist attackers should the United States be hit with a nuclear bomb. Adapting nuclear technology to the forensics of exploded nuclear weapons is an old but rapidly evolving field. It dates back to at least 1949, when analysis of airborne debris, retrieved at high altitude off the coast of China, convinced President Harry Truman that the Soviet Union had exploded a nuclear device on the steppes of central Asia. The technology is neither new nor has it been particularlymore » secret, but the formation of a national nuclear forensics team was newsworthy and a useful development. An international team, however, would be even better. Although Washington has naturally focused on preventing a nuclear terrorism attack in the United States, a U.S. city is not necessarily the most likely target for nuclear terrorists. It is doubtful that a terrorist organization would be able to acquire a U.S. nuclear device and even more doubtful that it would acquire one on U.S. soil. Accordingly, if a terrorist organization does get its hands on a fission device, it is likely that it will do so on foreign territory. At that point, the terrorists will have an enormously valuable political weapon in their hands and will be loath to risk losing that asset. Given the risks associated with getting the device into the United States, the rational choice would be to deploy the device abroad against much softer targets. For Islamist terrorists, a major ''Christian'' capital such as London, Rome, or Moscow might offer a more suitable target. Among these, Moscow perhaps presents the most compelling case for international cooperation on post-detonation nuclear forensics. Russia has the largest stockpile of poorly secured nuclear devices in the world. It also has porous borders and poor internal security, and it continues to be a potential source of contraband nuclear material and weapons, despite the best efforts of the Cooperative Threat Reduction (CTR) program. If terrorists obtained the nuclear material in Russia and set Moscow as their target, they would not have to risk transporting the weapon, stolen or makeshift, across international borders. Attacks by Chechen terrorists in Beslan and the Dubrovka Theater in Moscow offer ample proof that a willingness to commit mass murder for fanatical reasons rests within Russian borders, and a foreign source of operatives, particularly from the neighboring Islamic states to the south, is by no means inconceivable. Moscow is also a predominantly Christian city where local authorities routinely discriminate against Muslim minorities. Furthermore, extremists might conclude that a nuclear blast in Moscow could inflict damage well beyond those directly stemming from the attack. The Soviet generation that came to power during the Cold War retained a memory of the United States as an ally in the Great Patriotic War. The present Russian generation has no such remembrance but seems to have retained the animosities and suspicions that were a part of the nuclear standoff. Hence, nuclear terrorists may well believe that they could cause another East-West cold war or even encourage Russia to retaliate against the United States. After all, the sinking of the Kursk was believed by some influential Russians to be the result of American action. How much more likely would be such a view if the Kremlin were destroyed? As long as the world is filled with suspicion and conflict, such reactions are to be expected and, more importantly, anticipated. One has only to remember the early reactions and suspicions in the United States following the 1996 TWA Flight 800 airline disaster. Because the United States is the technological leader in nuclear forensics, its capability will certainly be offered and probably demanded no matter what foreign city is subjected to the devastation of a nuclear explosion. The entire world, not just Americans, will live in fear of a second or third nuclear explosion, and forensics could play a vital role in removing or at least narrowing that fear. Because of such worldwide dread, there will be an international aspect to nuclear forensics regardless of where the explosion takes place. It would be better to be prepared in advance for such contingencies than to delve into the arcane world of nuclear weapons and radiochemistry on the fly.« less
NASA Astrophysics Data System (ADS)
Merkel, Ronny; Breuhan, Andy; Hildebrandt, Mario; Vielhauer, Claus; Bräutigam, Anja
2012-06-01
In the field of crime scene forensics, current methods of evidence collection, such as the acquisition of shoe-marks, tireimpressions, palm-prints or fingerprints are in most cases still performed in an analogue way. For example, fingerprints are captured by powdering and sticky tape lifting, ninhydrine bathing or cyanoacrylate fuming and subsequent photographing. Images of the evidence are then further processed by forensic experts. With the upcoming use of new multimedia systems for the digital capturing and processing of crime scene traces in forensics, higher resolutions can be achieved, leading to a much better quality of forensic images. Furthermore, the fast and mostly automated preprocessing of such data using digital signal processing techniques is an emerging field. Also, by the optical and non-destructive lifting of forensic evidence, traces are not destroyed and therefore can be re-captured, e.g. by creating time series of a trace, to extract its aging behavior and maybe determine the time the trace was left. However, such new methods and tools face different challenges, which need to be addressed before a practical application in the field. Based on the example of fingerprint age determination, which is an unresolved research challenge to forensic experts since decades, we evaluate the influences of different environmental conditions as well as different types of sweating and their implications to the capturing sensory, preprocessing methods and feature extraction. We use a Chromatic White Light (CWL) sensor to exemplary represent such a new optical and contactless measurement device and investigate the influence of 16 different environmental conditions, 8 different sweat types and 11 different preprocessing methods on the aging behavior of 48 fingerprint time series (2592 fingerprint scans in total). We show the challenges that arise for such new multimedia systems capturing and processing forensic evidence
DOE Office of Scientific and Technical Information (OSTI.GOV)
Harrison, Richard Karl; Martin, Jeffrey B.; Wiemann, Dora K.
We developed new detector technologies to identify the presence of radioactive materials for nuclear forensics applications. First, we investigated an optical radiation detection technique based on imaging nitrogen fluorescence excited by ionizing radiation. We demonstrated optical detection in air under indoor and outdoor conditions for alpha particles and gamma radiation at distances up to 75 meters. We also contributed to the development of next generation systems and concepts that could enable remote detection at distances greater than 1 km, and originated a concept that could enable daytime operation of the technique. A second area of research was the development ofmore » room-temperature graphene-based sensors for radiation detection and measurement. In this project, we observed tunable optical and charged particle detection, and developed improved devices. With further development, the advancements described in this report could enable new capabilities for nuclear forensics applications.« less
Hird, H J; Brown, M K
2017-11-01
The identification of samples at a crime scene which require forensic DNA typing has been the focus of recent research interest. We propose a simple, but sensitive analysis system which can be deployed at a crime scene to identify crime scene stains as human or non-human. The proposed system uses the isothermal amplification of DNA in a rapid assay format, which returns results in as little as 30min from sampling. The assay system runs on the Genie II device, a proven in-field detection system which could be deployed at a crime scene. The results presented here demonstrate that the system was sufficiently specific and sensitive and was able to detect the presence of human blood, semen and saliva on mock forensic samples. Copyright © 2017. Published by Elsevier B.V.
Automatic Molar Extraction from Dental Panoramic Radiographs for Forensic Personal Identification
NASA Astrophysics Data System (ADS)
Samopa, Febriliyan; Asano, Akira; Taguchi, Akira
Measurement of an individual molar provides rich information for forensic personal identification. We propose a computer-based system for extracting an individual molar from dental panoramic radiographs. A molar is obtained by extracting the region-of-interest, separating the maxilla and mandible, and extracting the boundaries between teeth. The proposed system is almost fully automatic; all that the user has to do is clicking three points on the boundary between the maxilla and the mandible.
Torimitsu, Suguru; Makino, Yohsuke; Saitoh, Hisako; Sakuma, Ayaka; Ishii, Namiko; Yajima, Daisuke; Inokuchi, Go; Motomura, Ayumi; Chiba, Fumiko; Yamaguchi, Rutsuko; Hashimoto, Mari; Hoshioka, Yumi; Iwase, Hirotaro
2015-12-01
Sex estimation of decomposed or skeletal remains is clearly important in forensic contexts. Recently, contemporary population-specific data has been obtained using multidetector computed tomography (MDCT) scanning. The main purpose of this study was to investigate skeletal pelvic dimorphism in a contemporary Japanese forensic sample and to quantify the accuracy of sex estimation using various pelvic measurements obtained from three-dimensional (3D) CT images. This study used a total of 208 cadavers (104 males, 104 females) of which postmortem CT scanning and subsequent forensic autopsy were conducted between December 2011 and August 2014. Eleven measurements of each pelvis were obtained from 3D CT reconstructed images that extracted only bone data. The measurements were analyzed using descriptive statistics and discriminant function analyses. All except one measurement were dimorphic in terms of sex differences. Univariate discriminant function analyses using these measurements provided sex classification accuracy rates of 62.0-98.1%. The subpubic angle was found to contribute most significantly to accurate sex estimation. Multivariate discriminant functions yielded sex prediction accuracy rates of 63.9-98.1%. In conclusion, the pelvic measurements obtained from 3D CT images of a contemporary Japanese population successfully demonstrated sexual dimorphism and may be useful for the estimation of skeletal sex in the field of forensic anthropology. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.
Forensic Analysis of Compromised Computers
NASA Technical Reports Server (NTRS)
Wolfe, Thomas
2004-01-01
Directory Tree Analysis File Generator is a Practical Extraction and Reporting Language (PERL) script that simplifies and automates the collection of information for forensic analysis of compromised computer systems. During such an analysis, it is sometimes necessary to collect and analyze information about files on a specific directory tree. Directory Tree Analysis File Generator collects information of this type (except information about directories) and writes it to a text file. In particular, the script asks the user for the root of the directory tree to be processed, the name of the output file, and the number of subtree levels to process. The script then processes the directory tree and puts out the aforementioned text file. The format of the text file is designed to enable the submission of the file as input to a spreadsheet program, wherein the forensic analysis is performed. The analysis usually consists of sorting files and examination of such characteristics of files as ownership, time of creation, and time of most recent access, all of which characteristics are among the data included in the text file.
Bailey, Sarah F; Scheible, Melissa K; Williams, Christopher; Silva, Deborah S B S; Hoggan, Marina; Eichman, Christopher; Faith, Seth A
2017-11-01
Next-generation Sequencing (NGS) is a rapidly evolving technology with demonstrated benefits for forensic genetic applications, and the strategies to analyze and manage the massive NGS datasets are currently in development. Here, the computing, data storage, connectivity, and security resources of the Cloud were evaluated as a model for forensic laboratory systems that produce NGS data. A complete front-to-end Cloud system was developed to upload, process, and interpret raw NGS data using a web browser dashboard. The system was extensible, demonstrating analysis capabilities of autosomal and Y-STRs from a variety of NGS instrumentation (Illumina MiniSeq and MiSeq, and Oxford Nanopore MinION). NGS data for STRs were concordant with standard reference materials previously characterized with capillary electrophoresis and Sanger sequencing. The computing power of the Cloud was implemented with on-demand auto-scaling to allow multiple file analysis in tandem. The system was designed to store resulting data in a relational database, amenable to downstream sample interpretations and databasing applications following the most recent guidelines in nomenclature for sequenced alleles. Lastly, a multi-layered Cloud security architecture was tested and showed that industry standards for securing data and computing resources were readily applied to the NGS system without disadvantageous effects for bioinformatic analysis, connectivity or data storage/retrieval. The results of this study demonstrate the feasibility of using Cloud-based systems for secured NGS data analysis, storage, databasing, and multi-user distributed connectivity. Copyright © 2017 Elsevier B.V. All rights reserved.
Face recognition accuracy of forensic examiners, superrecognizers, and face recognition algorithms.
Phillips, P Jonathon; Yates, Amy N; Hu, Ying; Hahn, Carina A; Noyes, Eilidh; Jackson, Kelsey; Cavazos, Jacqueline G; Jeckeln, Géraldine; Ranjan, Rajeev; Sankaranarayanan, Swami; Chen, Jun-Cheng; Castillo, Carlos D; Chellappa, Rama; White, David; O'Toole, Alice J
2018-06-12
Achieving the upper limits of face identification accuracy in forensic applications can minimize errors that have profound social and personal consequences. Although forensic examiners identify faces in these applications, systematic tests of their accuracy are rare. How can we achieve the most accurate face identification: using people and/or machines working alone or in collaboration? In a comprehensive comparison of face identification by humans and computers, we found that forensic facial examiners, facial reviewers, and superrecognizers were more accurate than fingerprint examiners and students on a challenging face identification test. Individual performance on the test varied widely. On the same test, four deep convolutional neural networks (DCNNs), developed between 2015 and 2017, identified faces within the range of human accuracy. Accuracy of the algorithms increased steadily over time, with the most recent DCNN scoring above the median of the forensic facial examiners. Using crowd-sourcing methods, we fused the judgments of multiple forensic facial examiners by averaging their rating-based identity judgments. Accuracy was substantially better for fused judgments than for individuals working alone. Fusion also served to stabilize performance, boosting the scores of lower-performing individuals and decreasing variability. Single forensic facial examiners fused with the best algorithm were more accurate than the combination of two examiners. Therefore, collaboration among humans and between humans and machines offers tangible benefits to face identification accuracy in important applications. These results offer an evidence-based roadmap for achieving the most accurate face identification possible. Copyright © 2018 the Author(s). Published by PNAS.
Application of forensic image analysis in accident investigations.
Verolme, Ellen; Mieremet, Arjan
2017-09-01
Forensic investigations are primarily meant to obtain objective answers that can be used for criminal prosecution. Accident analyses are usually performed to learn from incidents and to prevent similar events from occurring in the future. Although the primary goal may be different, the steps in which information is gathered, interpreted and weighed are similar in both types of investigations, implying that forensic techniques can be of use in accident investigations as well. The use in accident investigations usually means that more information can be obtained from the available information than when used in criminal investigations, since the latter require a higher evidence level. In this paper, we demonstrate the applicability of forensic techniques for accident investigations by presenting a number of cases from one specific field of expertise: image analysis. With the rapid spread of digital devices and new media, a wealth of image material and other digital information has become available for accident investigators. We show that much information can be distilled from footage by using forensic image analysis techniques. These applications show that image analysis provides information that is crucial for obtaining the sequence of events and the two- and three-dimensional geometry of an accident. Since accident investigation focuses primarily on learning from accidents and prevention of future accidents, and less on the blame that is crucial for criminal investigations, the field of application of these forensic tools may be broader than would be the case in purely legal sense. This is an important notion for future accident investigations. Copyright © 2017 Elsevier B.V. All rights reserved.
Modular robotic system for forensic investigation support
NASA Astrophysics Data System (ADS)
Kowalski, Grzegorz; Główka, Jakub; Maciaś, Mateusz; Puchalski, Sławomir
2017-10-01
Forensic investigation on the crime scene is an activity that requires not only knowledge about the ways of searching for evidence, collecting and processing them. In some cases the area of operation might not be properly secured and poses threat to human health or life. Some devices or materials may be left intentionally or not to injure potential investigators. Besides conventional explosives, threats can be in form of CBRN materials, which have not only immediate effect on the exposed personnel, but can contaminate further people, when being transferred for example on clothes or unsecured equipment. In this case a risk evaluation should be performed, that can lead to conclusions that it is too dangerous for investigators to work. In that kind of situation remote devices, which are able to examine the crime scene and secure samples, can be used. In the course of R&D activities PIAP developed a system, which is based on small UGV capable of carrying out inspection of suspicious places and securing evidence, when needed. The system consists of remotely controlled mobile robot, its control console and a set of various inspection and support tools, that enable detection of CBRN threats as well as revelation, documentation and securing of the evidence. This paper will present main features of the system, like mission adjustment possibilities and communication aspects, and also examples of the forensic accessories.
Tridico, Silvana R; Murray, Dáithí C; Addison, Jayne; Kirkbride, Kenneth P; Bunce, Michael
2014-01-01
Mammalian hairs are one of the most ubiquitous types of trace evidence collected in the course of forensic investigations. However, hairs that are naturally shed or that lack roots are problematic substrates for DNA profiling; these hair types often contain insufficient nuclear DNA to yield short tandem repeat (STR) profiles. Whilst there have been a number of initial investigations evaluating the value of metagenomics analyses for forensic applications (e.g. examination of computer keyboards), there have been no metagenomic evaluations of human hairs-a substrate commonly encountered during forensic practice. This present study attempts to address this forensic capability gap, by conducting a qualitative assessment into the applicability of metagenomic analyses of human scalp and pubic hair. Forty-two DNA extracts obtained from human scalp and pubic hairs generated a total of 79,766 reads, yielding 39,814 reads post control and abundance filtering. The results revealed the presence of unique combinations of microbial taxa that can enable discrimination between individuals and signature taxa indigenous to female pubic hairs. Microbial data from a single co-habiting couple added an extra dimension to the study by suggesting that metagenomic analyses might be of evidentiary value in sexual assault cases when other associative evidence is not present. Of all the data generated in this study, the next-generation sequencing (NGS) data generated from pubic hair held the most potential for forensic applications. Metagenomic analyses of human hairs may provide independent data to augment other forensic results and possibly provide association between victims of sexual assault and offender when other associative evidence is absent. Based on results garnered in the present study, we believe that with further development, bacterial profiling of hair will become a valuable addition to the forensic toolkit.
Image counter-forensics based on feature injection
NASA Astrophysics Data System (ADS)
Iuliani, M.; Rossetto, S.; Bianchi, T.; De Rosa, Alessia; Piva, A.; Barni, M.
2014-02-01
Starting from the concept that many image forensic tools are based on the detection of some features revealing a particular aspect of the history of an image, in this work we model the counter-forensic attack as the injection of a specific fake feature pointing to the same history of an authentic reference image. We propose a general attack strategy that does not rely on a specific detector structure. Given a source image x and a target image y, the adversary processes x in the pixel domain producing an attacked image ~x, perceptually similar to x, whose feature f(~x) is as close as possible to f(y) computed on y. Our proposed counter-forensic attack consists in the constrained minimization of the feature distance Φ(z) =│ f(z) - f(y)│ through iterative methods based on gradient descent. To solve the intrinsic limit due to the numerical estimation of the gradient on large images, we propose the application of a feature decomposition process, that allows the problem to be reduced into many subproblems on the blocks the image is partitioned into. The proposed strategy has been tested by attacking three different features and its performance has been compared to state-of-the-art counter-forensic methods.
Verna, Emeline; Piercecchi-Marti, Marie-Dominique; Chaumoitre, Kathia; Bartoli, Christophe; Leonetti, Georges; Adalian, Pascal
2013-05-01
During forensic anthropological investigation, biological profile is determined by age, sex, ancestry, and stature. However, several individuals may share the same profile. Observation of discrete traits can yield useful information and contribute to identification. This research establishes the frequency of discrete traits of the sternum and ribs in a modern population in southern France, using 500 computer tomography (CT) scans of individuals aged 15-60 years. Only discrete traits with a frequency lower than 10% according to the literature were considered, a total of eight traits. All scans examined were three-dimensional (3D) volume renderings from DICOM images. In our population, the frequency of all the discrete traits was lower than 5%. None were associated with sex or age, with the exception of a single trait, the end of the xiphoid process. Our findings can usefully be applied for identification purposes in forensic anthropology and medicine. © 2013 American Academy of Forensic Sciences.
Trochesset, Denise A; Serchuk, Richard B; Colosi, Dan C
2014-03-01
Identification of unknown individuals using dental comparison is well established in the forensic setting. The identification technique can be time and resource consuming if many individuals need to be identified at once. Medical CT (MDCT) for dental profiling has had limited success, mostly due to artifact from metal-containing dental restorations and implants. The authors describe a CBCT reformatting technique that creates images, which closely approximate conventional dental images. Using a i-CAT Platinum CBCT unit and standard issue i-CAT Vision software, a protocol is developed to reproducibly and reliably reformat CBCT volumes. The reformatted images are presented with conventional digital images from the same anatomic area for comparison. The authors conclude that images derived from CBCT volumes following this protocol are similar enough to conventional dental radiographs to allow for dental forensic comparison/identification and that CBCT offers a superior option over MDCT for this purpose. © 2013 American Academy of Forensic Sciences.
Glinn, Michele; Adatsi, Felix; Curtis, Perry
2011-11-01
The State of Michigan uses the Datamaster as an evidential breath testing device. The newest version, the DMT, will replace current instruments in the field as they are retired from service. The Michigan State Police conducted comparison studies to test the analytical properties of the new instrument and to evaluate its response to conditions commonly cited in court defenses. The effects of mouth alcohol, objects in the mouth, and radiofrequency interference on paired samples from drinking subjects were assessed on the DMT. The effects of sample duration and chemical interferents were assessed on both instruments, using drinking subjects and wet-bath simulators, respectively. Our testing shows that Datamaster and DMT results are essentially identical; the DMT gave accurate readings as compared with measurements made using simulators containing standard ethanol solutions and that the DMT did not give falsely elevated breath alcohol results from any of the influences tested. © 2011 American Academy of Forensic Sciences.
Burned bodies: post-mortem computed tomography, an essential tool for modern forensic medicine.
Coty, J-B; Nedelcu, C; Yahya, S; Dupont, V; Rougé-Maillart, C; Verschoore, M; Ridereau Zins, C; Aubé, C
2018-06-07
Currently, post-mortem computed tomography (PMCT) has become an accessible and contemporary tool for forensic investigations. In the case of burn victims, it provides specific semiologies requiring a prudent understanding to differentiate between the normal post-mortem changes from heat-related changes. The aim of this pictorial essay is to provide to the radiologist the keys to establish complete and focused reports in cases of PMCT of burn victims. Thus, the radiologist must discern all the contextual divergences with the forensic history, and must be able to report all the relevant elements to answer to the forensic pathologist the following questions: Are there tomographic features that could help to identify the victim? Is there evidence of remains of biological fluids in liquid form available for toxicological analysis and DNA sampling? Is there another obvious cause of death than heat-related lesions, especially metallic foreign bodies of ballistic origin? Finally, what are the characteristic burn-related injuries seen on the corpse that should be sought during the autopsy? • CT is highly useful to find features permitting the identification of a severely burned body. • PMCT is a major asset in gunshot injuries to depict ballistic foreign bodies in the burned cadavers. • CT is able to recognise accessible blood for tests versus heat clot (air-crescent sign). • Heat-related fractures are easily differentiated from traumatic fractures. • Epidural collections with a subdural appearance are typical heat-related head lesions.
A cyber infrastructure for the SKA Telescope Manager
NASA Astrophysics Data System (ADS)
Barbosa, Domingos; Barraca, João. P.; Carvalho, Bruno; Maia, Dalmiro; Gupta, Yashwant; Natarajan, Swaminathan; Le Roux, Gerhard; Swart, Paul
2016-07-01
The Square Kilometre Array Telescope Manager (SKA TM) will be responsible for assisting the SKA Operations and Observation Management, carrying out System diagnosis and collecting Monitoring and Control data from the SKA subsystems and components. To provide adequate compute resources, scalability, operation continuity and high availability, as well as strict Quality of Service, the TM cyber-infrastructure (embodied in the Local Infrastructure - LINFRA) consists of COTS hardware and infrastructural software (for example: server monitoring software, host operating system, virtualization software, device firmware), providing a specially tailored Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) solution. The TM infrastructure provides services in the form of computational power, software defined networking, power, storage abstractions, and high level, state of the art IaaS and PaaS management interfaces. This cyber platform will be tailored to each of the two SKA Phase 1 telescopes (SKA_MID in South Africa and SKA_LOW in Australia) instances, each presenting different computational and storage infrastructures and conditioned by location. This cyber platform will provide a compute model enabling TM to manage the deployment and execution of its multiple components (observation scheduler, proposal submission tools, MandC components, Forensic tools and several Databases, etc). In this sense, the TM LINFRA is primarily focused towards the provision of isolated instances, mostly resorting to virtualization technologies, while defaulting to bare hardware if specifically required due to performance, security, availability, or other requirement.
X-ray computed tomography datasets for forensic analysis of vertebrate fossils.
Rowe, Timothy B; Luo, Zhe-Xi; Ketcham, Richard A; Maisano, Jessica A; Colbert, Matthew W
2016-06-07
We describe X-ray computed tomography (CT) datasets from three specimens recovered from Early Cretaceous lakebeds of China that illustrate the forensic interpretation of CT imagery for paleontology. Fossil vertebrates from thinly bedded sediments often shatter upon discovery and are commonly repaired as amalgamated mosaics grouted to a solid backing slab of rock or plaster. Such methods are prone to inadvertent error and willful forgery, and once required potentially destructive methods to identify mistakes in reconstruction. CT is an efficient, nondestructive alternative that can disclose many clues about how a specimen was handled and repaired. These annotated datasets illustrate the power of CT in documenting specimen integrity and are intended as a reference in applying CT more broadly to evaluating the authenticity of comparable fossils.
X-ray computed tomography datasets for forensic analysis of vertebrate fossils
Rowe, Timothy B.; Luo, Zhe-Xi; Ketcham, Richard A.; Maisano, Jessica A.; Colbert, Matthew W.
2016-01-01
We describe X-ray computed tomography (CT) datasets from three specimens recovered from Early Cretaceous lakebeds of China that illustrate the forensic interpretation of CT imagery for paleontology. Fossil vertebrates from thinly bedded sediments often shatter upon discovery and are commonly repaired as amalgamated mosaics grouted to a solid backing slab of rock or plaster. Such methods are prone to inadvertent error and willful forgery, and once required potentially destructive methods to identify mistakes in reconstruction. CT is an efficient, nondestructive alternative that can disclose many clues about how a specimen was handled and repaired. These annotated datasets illustrate the power of CT in documenting specimen integrity and are intended as a reference in applying CT more broadly to evaluating the authenticity of comparable fossils. PMID:27272251
Franckenberg, Sabine; Binder, Thomas; Bolliger, Stephan; Thali, Michael J; Ross, Steffen G
2016-09-01
Cross-sectional imaging, such as computed tomography, has been increasingly implemented in both historic and recent postmortem forensic investigations. It aids in determining cause and manner of death as well as in correlating injuries to possible weapons. This study illuminates the feasibility of reconstructing guns in computed tomography and gives a distinct overview of historic and recent Swiss Army guns.
NASA Astrophysics Data System (ADS)
Suzuki, Mototsugu; Akiba, Norimitsu; Kurosawa, Kenji; Kuroki, Kenro; Akao, Yoshinori; Higashikawa, Yoshiyasu
2016-01-01
We applied a wide-field time-resolved luminescence (TRL) method with a pulsed laser and a gated intensified charge coupled device (ICCD) for deciphering obliterated documents for use in forensic science. The TRL method can nondestructively measure the dynamics of luminescence, including fluorescence and phosphorescence lifetimes, which prove to be useful parameters for image detection. First, we measured the TRL spectra of four brands of black porous-tip pen inks on paper to estimate their luminescence lifetimes. Next, we acquired the TRL images of 12 obliterated documents at various delay times and gate times of the ICCD. The obliterated contents were revealed in the TRL images because of the difference in the luminescence lifetimes of the inks. This method requires no pretreatment, is nondestructive, and has the advantage of wide-field imaging, which makes it is easy to control the gate timing. This demonstration proves that TRL imaging and spectroscopy are powerful tools for forensic document examination.
Technological Imperatives: Using Computers in Academic Debate.
ERIC Educational Resources Information Center
Ticku, Ravinder; Phelps, Greg
Intended for forensic educators and debate teams, this document details how one university debate team, at the University of Iowa, makes use of computer resources on campus to facilitate storage and retrieval of information useful to debaters. The introduction notes the problem of storing and retrieving the amount of information required by debate…
ERIC Educational Resources Information Center
Janniro, Michael J.
1993-01-01
Describes a study conducted by the Department of Defense Polygraph Institute for their forensic science curriculum that investigated the effects of computer-based instruction on student learning of psychophysiological detection of deception test question formulation. Treatment of the experimental and control group is explained and posttest scores…
NASA Astrophysics Data System (ADS)
Gloe, Thomas; Borowka, Karsten; Winkler, Antje
2010-01-01
The analysis of lateral chromatic aberration forms another ingredient for a well equipped toolbox of an image forensic investigator. Previous work proposed its application to forgery detection1 and image source identification.2 This paper takes a closer look on the current state-of-the-art method to analyse lateral chromatic aberration and presents a new approach to estimate lateral chromatic aberration in a runtime-efficient way. Employing a set of 11 different camera models including 43 devices, the characteristic of lateral chromatic aberration is investigated in a large-scale. The reported results point to general difficulties that have to be considered in real world investigations.
Digital Forensics Using Local Signal Statistics
ERIC Educational Resources Information Center
Pan, Xunyu
2011-01-01
With the rapid growth of the Internet and the popularity of digital imaging devices, digital imagery has become our major information source. Meanwhile, the development of digital manipulation techniques employed by most image editing software brings new challenges to the credibility of photographic images as the definite records of events. We…
Determining the optimal forensic DNA analysis procedure following investigation of sample quality.
Hedell, Ronny; Hedman, Johannes; Mostad, Petter
2018-07-01
Crime scene traces of various types are routinely sent to forensic laboratories for analysis, generally with the aim of addressing questions about the source of the trace. The laboratory may choose to analyse the samples in different ways depending on the type and quality of the sample, the importance of the case and the cost and performance of the available analysis methods. Theoretically well-founded guidelines for the choice of analysis method are, however, lacking in most situations. In this paper, it is shown how such guidelines can be created using Bayesian decision theory. The theory is applied to forensic DNA analysis, showing how the information from the initial qPCR analysis can be utilized. It is assumed the alternatives for analysis are using a standard short tandem repeat (STR) DNA analysis assay, using the standard assay and a complementary assay, or the analysis may be cancelled following quantification. The decision is based on information about the DNA amount and level of DNA degradation of the forensic sample, as well as case circumstances and the cost for analysis. Semi-continuous electropherogram models are used for simulation of DNA profiles and for computation of likelihood ratios. It is shown how tables and graphs, prepared beforehand, can be used to quickly find the optimal decision in forensic casework.
Binary constructs of forensic psychiatric nursing: a pilot study.
Mason, T; Dulson, J; King, L
2009-03-01
The aim was to develop an Information Gathering Schedule (IGS) relevant to forensic psychiatric nursing in order to establish the perceived differences in the three levels of security, high, medium and low. Perceived differences in the role constructs of forensic psychiatric nursing is said to exist but the evidence is qualitative or anecdotal. This paper sets out a pilot study beginning in 2004 relating to the development of two rating scales for inclusion into an IGS to acquire data on the role constructs of nurses working in these environments. Following a thematic analysis from the literature two sets of binary frameworks were constructed and a number of questions/statements relating to them were tested. The Thurstone Scaling test was applied to compute medians resulting in a reduction to 48 and 20 items for each respective framework. Two 7-point Likert scales were constructed and test-retest procedures were applied on a sample population of forensic psychiatric nurses. Student's t-test was conducted on the data and the results suggest that the IGS is now suitable for application on a larger study. The IGS was piloted on a small sample of forensic psychiatric nurses. The two scales were validated to coefficient values ranging from 0.7 to 0.9. Amendments were made and the IGS was considered acceptable.
Cantürk, İsmail; Özyılmaz, Lale
2018-07-01
This paper presents an approach to postmortem interval (PMI) estimation, which is a very debated and complicated area of forensic science. Most of the reported methods to determine PMI in the literature are not practical because of the need for skilled persons and significant amounts of time, and give unsatisfactory results. Additionally, the error margin of PMI estimation increases proportionally with elapsed time after death. It is crucial to develop practical PMI estimation methods for forensic science. In this study, a computational system is developed to determine the PMI of human subjects by investigating postmortem opacity development of the eye. Relevant features from the eye images were extracted using image processing techniques to reflect gradual opacity development. The features were then investigated to predict the time after death using machine learning methods. The experimental results prove that the development of opacity can be utilized as a practical computational tool to determine PMI for human subjects. Copyright © 2018 Elsevier Ltd. All rights reserved.
Optimising crime scene temperature collection for forensic entomology casework.
Hofer, Ines M J; Hart, Andrew J; Martín-Vega, Daniel; Hall, Martin J R
2017-01-01
The value of minimum post-mortem interval (minPMI) estimations in suspicious death investigations from insect evidence using temperature modelling is indisputable. In order to investigate the reliability of the collected temperature data used for modelling minPMI, it is necessary to study the effects of data logger location on the accuracy and precision of measurements. Digital data logging devices are the most commonly used temperature measuring devices in forensic entomology, however, the relationship between ambient temperatures (measured by loggers) and body temperatures has been little studied. The placement of loggers in this study in three locations (two outdoors, one indoors) had measurable effects when compared with actual body temperature measurements (simulated with pig heads), some more significant than others depending on season, exposure to the environment and logger location. Overall, the study demonstrated the complexity of the question of optimal logger placement at a crime scene and the potential impact of inaccurate temperature data on minPMI estimations, showing the importance of further research in this area and development of a standard protocol. Initial recommendations are provided for data logger placement (within a Stevenson Screen where practical), situations to avoid (e.g. placement of logger in front of windows when measuring indoor temperatures), and a baseline for further research into producing standard guidelines for logger placement, to increase the accuracy of minPMI estimations and, thereby, the reliability of forensic entomology evidence in court. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
Advancing crime scene computer forensics techniques
NASA Astrophysics Data System (ADS)
Hosmer, Chet; Feldman, John; Giordano, Joe
1999-02-01
Computers and network technology have become inexpensive and powerful tools that can be applied to a wide range of criminal activity. Computers have changed the world's view of evidence because computers are used more and more as tools in committing `traditional crimes' such as embezzlements, thefts, extortion and murder. This paper will focus on reviewing the current state-of-the-art of the data recovery and evidence construction tools used in both the field and laboratory for prosection purposes.
Image manipulation: Fraudulence in digital dental records: Study and review
Chowdhry, Aman; Sircar, Keya; Popli, Deepika Bablani; Tandon, Ankita
2014-01-01
Introduction: In present-day times, freely available software allows dentists to tweak their digital records as never before. But, there is a fine line between acceptable enhancements and scientific delinquency. Aims and Objective: To manipulate digital images (used in forensic dentistry) of casts, lip prints, and bite marks in order to highlight tampering techniques and methods of detecting and preventing manipulation of digital images. Materials and Methods: Digital image records of forensic data (casts, lip prints, and bite marks photographed using Samsung Techwin L77 digital camera) were manipulated using freely available software. Results: Fake digital images can be created either by merging two or more digital images, or by altering an existing image. Discussion and Conclusion: Retouched digital images can be used for fraudulent purposes in forensic investigations. However, tools are available to detect such digital frauds, which are extremely difficult to assess visually. Thus, all digital content should mandatorily have attached metadata and preferably watermarking in order to avert their malicious re-use. Also, computer alertness, especially about imaging software's, should be promoted among forensic odontologists/dental professionals. PMID:24696587
Cost-effective forensic image enhancement
NASA Astrophysics Data System (ADS)
Dalrymple, Brian E.
1998-12-01
In 1977, a paper was presented at the SPIE conference in Reston, Virginia, detailing the computer enhancement of the Zapruder film. The forensic value of this examination in a major homicide investigation was apparent to the viewer. Equally clear was the potential for extracting evidence which is beyond the reach of conventional detection techniques. The cost of this technology in 1976, however, was prohibitive, and well beyond the means of most police agencies. Twenty-two years later, a highly efficient means of image enhancement is easily within the grasp of most police agencies, not only for homicides but for any case application. A PC workstation combined with an enhancement software package allows a forensic investigator to fully exploit digital technology. The goal of this approach is the optimization of the signal to noise ratio in images. Obstructive backgrounds may be diminished or eliminated while weak signals are optimized by the use of algorithms including Fast Fourier Transform, Histogram Equalization and Image Subtraction. An added benefit is the speed with which these processes are completed and the results known. The efficacy of forensic image enhancement is illustrated through case applications.
Podcast: The Electronic Crimes Division
Sept 26, 2016. Chris Lukas, the Special Agent in Charge of the Electronic Crimes Division within the OIG's Office of Investigations talks about computer forensics, cybercrime in the EPA and his division's role in criminal investigations.
NASA Astrophysics Data System (ADS)
Stock, Michala K.; Stull, Kyra E.; Garvin, Heather M.; Klales, Alexandra R.
2016-10-01
Forensic anthropologists are routinely asked to estimate a biological profile (i.e., age, sex, ancestry and stature) from a set of unidentified remains. In contrast to the abundance of collections and techniques associated with adult skeletons, there is a paucity of modern, documented subadult skeletal material, which limits the creation and validation of appropriate forensic standards. Many are forced to use antiquated methods derived from small sample sizes, which given documented secular changes in the growth and development of children, are not appropriate for application in the medico-legal setting. Therefore, the aim of this project is to use multi-slice computed tomography (MSCT) data from a large, diverse sample of modern subadults to develop new methods to estimate subadult age and sex for practical forensic applications. The research sample will consist of over 1,500 full-body MSCT scans of modern subadult individuals (aged birth to 20 years) obtained from two U.S. medical examiner's offices. Statistical analysis of epiphyseal union scores, long bone osteometrics, and os coxae landmark data will be used to develop modern subadult age and sex estimation standards. This project will result in a database of information gathered from the MSCT scans, as well as the creation of modern, statistically rigorous standards for skeletal age and sex estimation in subadults. Furthermore, the research and methods developed in this project will be applicable to dry bone specimens, MSCT scans, and radiographic images, thus providing both tools and continued access to data for forensic practitioners in a variety of settings.
Reynolds, L M; Davies, J P; Mann, B; Tulloch, S; Nidsjo, A; Hodge, P; Maiden, N; Simpson, A
2017-05-01
WHAT IS KNOWN ON THE SUBJECT?: Serious gaming can support learning and development. The use of serious games for skills development and the rehearsal of the management of events that cannot be replicated in real life is well established. Few serious games have been used in mental health services, and none in forensic mental health care. WHAT THIS PAPER ADDS TO EXISTING KNOWLEDGE?: How a serious game may be coproduced by forensic mental health service users and game developers The acceptability of the therapeutic use of serious gaming by forensic mental health service users and providers. WHAT ARE THE IMPLICATIONS FOR PRACTICE?: Computer games may be used by practitioners in their therapeutic work with forensic mental health service users. Mental health nurses to use serious games to creatively and safely bridge the gap for service users between receiving care in controlled environments and living more independent in the community. Introduction Assessment of users' skills and confidence to safely respond to risky community-based situations underpins discharge planning. Serious games have been used for skills development, and this study trialled their use in forensic mental health services. Aim The aim was to develop and test the acceptability and usability of an innovative serious game to support forensic mental health service users' preparation for discharge. Method A prototype serious game was developed by service users and researchers. Acceptability and usability testing was undertaken and service providers interviewed about the acceptability of serious gaming for forensic mental health services. Result A prototype game was produced and successfully trialled by service users. However, both service users and providers identified that work needed to be done to develop and test a game with greater complexity. Discussion The acceptability and usability of using serious games to support service users to develop skills needed for successful discharge was demonstrated. Implications for practice Mental health practitioners may use gaming to support their practice and work innovatively with other professions such as game developers to create new ways of working in forensic mental health services. © 2016 John Wiley & Sons Ltd.
Nuclear Forensics: A Capability at Risk (Abbreviated Version)
DOE Office of Scientific and Technical Information (OSTI.GOV)
National Research Council of the National Academies
Nuclear forensics is important to our national security. Actions, including provision of appropriate funding, are needed now to sustain and improve the nation's nuclear forensics capabilities. The Department of Homeland Security (DHS), working with cooperating agencies and national laboratories, should plan and implement a sustainable, effective nuclear forensics program. Nuclear forensics is the examination and evaluation of discovered or seized nuclear materials and devices or, in cases of nuclear explosions or radiological dispersals, of detonation signals and post-detonation debris. Nuclear forensic evidence helps law enforcement and intelligence agencies work toward preventing, mitigating, and attributing a nuclear or radiological incident. Thismore » report, requested by DHS, the National Nuclear Security Administration, and the Department of Defense, makes recommendations on how to sustain and improve U.S. nuclear forensics capabilities. The United States has developed a nuclear forensics capability that has been demonstrated in real-world incidents of interdicted materials and in exercises of actions required after a nuclear detonation. The committee, however, has concerns about the program and finds that without strong leadership, careful planning, and additional funds, these capabilities will decline. Major areas of concern include: Organization. The responsibility for nuclear forensics is shared by several agencies without central authority and with no consensus on strategic requirements to guide the program. This organizational complexity hampers the program and could prove to be a major hindrance operationally. Sustainability. The nation's current nuclear forensics capabilities are available primarily because the system of laboratories, equipment, and personnel upon which they depend was developed and funded by the nuclear weapons program. However, the weapons program's funds are declining. Workforce and Infrastructure. Personnel skilled in nuclear forensics are too few and are spread too thinly. Some key facilities are in need of replacement because they are old, outdated, and not built to modern environmental, health, and safety standards. Procedures and Tools. Most nuclear forensics techniques were developed to carry out Cold War missions and to satisfy a different, less restrictive set of environmental, health, and safety standards. Some of the equipment also does not reflect today's technical capabilities. The Executive Office of the President established the National Technical Nuclear Forensics Center under the direction of the Secretary of Homeland Security, to coordinate nuclear forensics in the United States. DHS's responsibility can only be carried out with the cooperation and support of the other agencies involved. The committee recommends that DHS and the other cooperating agencies should: 1. Streamline the organizational structure, aligning authority and responsibility; and develop and issue appropriate requirements documents. 2. Issue a coordinated and integrated implementation plan for fulfilling the requirements and sustaining and improving the program's capabilities. This plan would form the basis for the agencies' multi-year program budget requests. 3. Implement a plan to build and maintain an appropriately sized and composed nuclear forensics workforce, ensuring sufficient staffing at the national laboratories and support for university research, training programs, and collaborative relationships among the national laboratories and other organizations. 4. Adapt nuclear forensics to the challenges of real emergency situations, including, for example, conducting more realistic exercises that are unannounced and that challenge regulations and procedures followed in the normal work environment, and implementing lessons learned. The national laboratories should: 5. Optimize procedures and equipment through R&D to meet program requirements. Modeling and simulation should play an increased role in research, development, and planning. The nuclear forensics community should: 6. Develop standards and procedures for nuclear forensics that are rooted in the same underlying principles that have been recommended to guide modern forensic science. DHS and the other cooperating agencies should: 7. Devise and implement a plan that enables access to relevant information in databases including classified and proprietary databases for nuclear forensics missions. The Executive Office of the President and the Department of State, working with the community of nuclear forensics experts, should: 8. Determine the classes of data and methods that are to be shared internationally and explore mechanisms to accomplish that sharing.« less
Oxygen Assessments Ensure Safer Medical Devices
NASA Technical Reports Server (NTRS)
2013-01-01
A team at White Sands Test Facility developed a test method to evaluate fire hazards in oxygen-enriched environments. Wendell Hull and Associates, located in Las Cruces, New Mexico, entered a Space Act Agreement with NASA and now provides services including fire and explosion investigations, oxygen testing and training, and accident reconstruction and forensic engineering.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Steeb, Jennifer L.; Mertz, Carol J.; Finck, Martha R.
X-ray fluorescence (XRF) is an attractive technique for nuclear forensics applications. We evaluated a handheld, portable XRF device by applying an external radiation field (10 mR/h to 17 R/h) using two types of radiography sources: a 60Co radiography camera to observe effects from high-energy gamma emissions and an 192Ir radiography camera to observe effects from several low-energy gamma (0.604, 0.468, and 0.317 MeV) and decay daughter x-ray emissions. External radiation tests proved that radiation, in general, has a significant effect on the dead time or background at dose rates over 1 R/hr for both the 192Ir and 60Co sources.
Decomposed Photo Response Non-Uniformity for Digital Forensic Analysis
NASA Astrophysics Data System (ADS)
Li, Yue; Li, Chang-Tsun
The last few years have seen the applications of Photo Response Non-Uniformity noise (PRNU) - a unique stochastic fingerprint of image sensors, to various types of digital forensic investigations such as source device identification and integrity verification. In this work we proposed a new way of extracting PRNU noise pattern, called Decomposed PRNU (DPRNU), by exploiting the difference between the physical andartificial color components of the photos taken by digital cameras that use a Color Filter Array for interpolating artificial components from physical ones. Experimental results presented in this work have shown the superiority of the proposed DPRNU to the commonly used version. We also proposed a new performance metrics, Corrected Positive Rate (CPR) to evaluate the performance of the common PRNU and the proposed DPRNU.
Heinrich, Andreas; Güttler, Felix; Wendt, Sebastian; Schenkl, Sebastian; Hubig, Michael; Wagner, Rebecca; Mall, Gita; Teichgräber, Ulf
2018-06-18
In forensic odontology the comparison between antemortem and postmortem panoramic radiographs (PRs) is a reliable method for person identification. The purpose of this study was to improve and automate identification of unknown people by comparison between antemortem and postmortem PR using computer vision. The study includes 43 467 PRs from 24 545 patients (46 % females/54 % males). All PRs were filtered and evaluated with Matlab R2014b including the toolboxes image processing and computer vision system. The matching process used the SURF feature to find the corresponding points between two PRs (unknown person and database entry) out of the whole database. From 40 randomly selected persons, 34 persons (85 %) could be reliably identified by corresponding PR matching points between an already existing scan in the database and the most recent PR. The systematic matching yielded a maximum of 259 points for a successful identification between two different PRs of the same person and a maximum of 12 corresponding matching points for other non-identical persons in the database. Hence 12 matching points are the threshold for reliable assignment. Operating with an automatic PR system and computer vision could be a successful and reliable tool for identification purposes. The applied method distinguishes itself by virtue of its fast and reliable identification of persons by PR. This Identification method is suitable even if dental characteristics were removed or added in the past. The system seems to be robust for large amounts of data. · Computer vision allows an automated antemortem and postmortem comparison of panoramic radiographs (PRs) for person identification.. · The present method is able to find identical matching partners among huge datasets (big data) in a short computing time.. · The identification method is suitable even if dental characteristics were removed or added.. · Heinrich A, Güttler F, Wendt S et al. Forensic Odontology: Automatic Identification of Persons Comparing Antemortem and Postmortem Panoramic Radiographs Using Computer Vision. Fortschr Röntgenstr 2018; DOI: 10.1055/a-0632-4744. © Georg Thieme Verlag KG Stuttgart · New York.
Getting in touch--3D printing in forensic imaging.
Ebert, Lars Chr; Thali, Michael J; Ross, Steffen
2011-09-10
With the increasing use of medical imaging in forensics, as well as the technological advances in rapid prototyping, we suggest combining these techniques to generate displays of forensic findings. We used computed tomography (CT), CT angiography, magnetic resonance imaging (MRI) and surface scanning with photogrammetry in conjunction with segmentation techniques to generate 3D polygon meshes. Based on these data sets, a 3D printer created colored models of the anatomical structures. Using this technique, we could create models of bone fractures, vessels, cardiac infarctions, ruptured organs as well as bitemark wounds. The final models are anatomically accurate, fully colored representations of bones, vessels and soft tissue, and they demonstrate radiologically visible pathologies. The models are more easily understood by laypersons than volume rendering or 2D reconstructions. Therefore, they are suitable for presentations in courtrooms and for educational purposes. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.
[Application of computed tomography (CT) examination for forensic medicine].
Urbanik, Andrzej; Chrzan, Robert
2013-01-01
The aim of the study is to present a own experiences in usage of post mortem CT examination for forensic medicine. With the help of 16-slice CT scanner 181 corpses were examined. Obtained during acquisition imaging data are later developed with dedicated programmes. Analyzed images were extracted from axial sections, multiplanar reconstructions as well as 3D reconstructions. Gained information helped greatly when classical autopsy was performed by making it more accurate. A CT scan images recorded digitally enable to evaluate corpses at any time, despite processes of putrefaction or cremation. If possible CT examination should precede classical autopsy.
Diegoli, Toni Marie; Rohde, Heinrich; Borowski, Stefan; Krawczak, Michael; Coble, Michael D; Nothnagel, Michael
2016-11-01
Typing of X chromosomal short tandem repeat (X STR) markers has become a standard element of human forensic genetic analysis. Joint consideration of many X STR markers at a time increases their discriminatory power but, owing to physical linkage, requires inter-marker recombination rates to be accurately known. We estimated the recombination rates between 15 well established X STR markers using genotype data from 158 families (1041 individuals) and following a previously proposed likelihood-based approach that allows for single-step mutations. To meet the computational requirements of this family-based type of analysis, we modified a previous implementation so as to allow multi-core parallelization on a high-performance computing system. While we obtained recombination rate estimates larger than zero for all but one pair of adjacent markers within the four previously proposed linkage groups, none of the three X STR pairs defining the junctions of these groups yielded a recombination rate estimate of 0.50. Corroborating previous studies, our results therefore argue against a simple model of independent X chromosomal linkage groups. Moreover, the refined recombination fraction estimates obtained in our study will facilitate the appropriate joint consideration of all 15 investigated markers in forensic analysis. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
Optical 3D surface digitizing in forensic medicine: 3D documentation of skin and bone injuries.
Thali, Michael J; Braun, Marcel; Dirnhofer, Richard
2003-11-26
Photography process reduces a three-dimensional (3D) wound to a two-dimensional level. If there is a need for a high-resolution 3D dataset of an object, it needs to be three-dimensionally scanned. No-contact optical 3D digitizing surface scanners can be used as a powerful tool for wound and injury-causing instrument analysis in trauma cases. The 3D skin wound and a bone injury documentation using the optical scanner Advanced TOpometric Sensor (ATOS II, GOM International, Switzerland) will be demonstrated using two illustrative cases. Using this 3D optical digitizing method the wounds (the virtual 3D computer model of the skin and the bone injuries) and the virtual 3D model of the injury-causing tool are graphically documented in 3D in real-life size and shape and can be rotated in the CAD program on the computer screen. In addition, the virtual 3D models of the bone injuries and tool can now be compared in a 3D CAD program against one another in virtual space, to see if there are matching areas. Further steps in forensic medicine will be a full 3D surface documentation of the human body and all the forensic relevant injuries using optical 3D scanners.
National Software Reference Library (NSRL)
National Institute of Standards and Technology Data Gateway
National Software Reference Library (NSRL) (PC database for purchase) A collaboration of the National Institute of Standards and Technology (NIST), the National Institute of Justice (NIJ), the Federal Bureau of Investigation (FBI), the Defense Computer Forensics Laboratory (DCFL),the U.S. Customs Service, software vendors, and state and local law enforement organizations, the NSRL is a tool to assist in fighting crime involving computers.
Analyzing forensic evidence based on density with magnetic levitation.
Lockett, Matthew R; Mirica, Katherine A; Mace, Charles R; Blackledge, Robert D; Whitesides, George M
2013-01-01
This paper describes a method for determining the density of contact trace objects with magnetic levitation (MagLev). MagLev measurements accurately determine the density (± 0.0002 g/cm(3) ) of a diamagnetic object and are compatible with objects that are nonuniform in shape and size. The MagLev device (composed of two permanent magnets with like poles facing) and the method described provide a means of accurately determining the density of trace objects. This method is inexpensive, rapid, and verifiable and provides numerical values--independent of the specific apparatus or analyst--that correspond to the absolute density of the sample that may be entered into a searchable database. We discuss the feasibility of MagLev as a possible means of characterizing forensic-related evidence and demonstrate the ability of MagLev to (i) determine the density of samples of glitter and gunpowder, (ii) separate glitter particles of different densities, and (iii) determine the density of a glitter sample that was removed from a complex sample matrix. © 2012 American Academy of Forensic Sciences.
An unusual method of forensic human identification: use of selfie photographs.
Miranda, Geraldo Elias; Freitas, Sílvia Guzella de; Maia, Luiza Valéria de Abreu; Melani, Rodolfo Francisco Haltenhoff
2016-06-01
As with other methods of identification, in forensic odontology, antemortem data are compared with postmortem findings. In the absence of dental documentation, photographs of the smile play an important role in this comparison. As yet, there are no reports of the use of the selfie photograph for identification purposes. Owing to advancements in technology, electronic devices, and social networks, this type of photograph has become increasingly common. This paper describes a case in which selfie photographs were used to identify a carbonized body, by using the smile line and image superimposition. This low-cost, rapid, and easy to analyze technique provides highly reliable results. Nevertheless, there are disadvantages, such as the limited number of teeth that are visible in a photograph, low image quality, possibility of morphological changes in the teeth after the antemortem image was taken, and difficulty of making comparisons depending on the orientation of the photo. In forensic odontology, new methods of identification must be sought to accompany technological evolution, particularly when no traditional methods of comparison, such as clinical record charts or radiographs, are available. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
Marquis, Raymond; Biedermann, Alex; Cadola, Liv; Champod, Christophe; Gueissaz, Line; Massonnet, Geneviève; Mazzella, Williams David; Taroni, Franco; Hicks, Tacha
2016-09-01
In a recently published guideline for evaluative reporting in forensic science, the European Network of Forensic Science Institutes (ENFSI) recommended the use of the likelihood ratio for the measurement of the value of forensic results. As a device to communicate the probative value of the results, the ENFSI guideline mentions the possibility to define and use a verbal scale, which should be unified within a forensic institution. This paper summarizes discussions held between scientists of our institution to develop and implement such a verbal scale. It intends to contribute to general discussions likely to be faced by any forensic institution that engages in continuous monitoring and improving of their evaluation and reporting format. We first present published arguments in favour of the use of such verbal qualifiers. We emphasise that verbal qualifiers do not replace the use of numbers to evaluate forensic findings, but are useful to communicate the probative value, since the weight of evidence in terms of likelihood ratio are still apprehended with difficulty by both the forensic scientists, especially in the absence of hard data, and the recipient of information. We further present arguments that support the development of the verbal scale that we propose. Recognising the limits of the use of such a verbal scale, we then discuss its disadvantages: it may lead to the spurious view according to which the value of the observations made in a given case is relative to other cases. Verbal qualifiers are also prone to misunderstandings and cannot be coherently combined with other evidence. We therefore recommend not using the verbal qualifier alone in a written statement. While scientists should only report on the probability of the findings - and not on the probability of the propositions, which are the duty of the Court - we suggest showing examples to let the recipient of information understand how the scientific evidence affects the probabilities of the propositions. To avoid misunderstandings, we also advise to mention in the statement what the results do not mean. Finally, we are of the opinion that if experts were able to coherently articulate numbers, and if recipients of information could properly handle such numbers, then verbal qualifiers could be abandoned completely. At that time, numerical expressions of probative value will be appropriately understood, as other numerical measures that most of us understand without the need of any further explanation, such as expressions for length or temperature. Copyright © 2016 The Chartered Society of Forensic Sciences. Published by Elsevier Ireland Ltd. All rights reserved.
Forensic Uncertainty Quantification of Explosive Dispersal of Particles
NASA Astrophysics Data System (ADS)
Hughes, Kyle; Park, Chanyoung; Haftka, Raphael; Kim, Nam-Ho
2017-06-01
In addition to the numerical challenges of simulating the explosive dispersal of particles, validation of the simulation is often plagued with poor knowledge of the experimental conditions. The level of experimental detail required for validation is beyond what is usually included in the literature. This presentation proposes the use of forensic uncertainty quantification (UQ) to investigate validation-quality experiments to discover possible sources of uncertainty that may have been missed in initial design of experiments or under-reported. The current experience of the authors has found that by making an analogy to crime scene investigation when looking at validation experiments, valuable insights may be gained. One examines all the data and documentation provided by the validation experimentalists, corroborates evidence, and quantifies large sources of uncertainty a posteriori with empirical measurements. In addition, it is proposed that forensic UQ may benefit from an independent investigator to help remove possible implicit biases and increases the likelihood of discovering unrecognized uncertainty. Forensic UQ concepts will be discussed and then applied to a set of validation experiments performed at Eglin Air Force Base. This work was supported in part by the U.S. Department of Energy, National Nuclear Security Administration, Advanced Simulation and Computing Program.
The role of 3DCT for the evaluation of chop injuries in clinical forensic medicine.
Wittschieber, Daniel; Beck, Laura; Vieth, Volker; Hahnemann, Maria L
2016-09-01
As hatchet blows to the human head frequently cause fatal injuries, the forensic examination of survivors with cranial chop injuries is a rare phenomenon in forensic casework. Besides evaluation of clinical records, photographs, and medico-legal physical examination, the analysis and 3-dimensional reconstruction of pre-treatment computed tomography data (3DCT) must be considered an important and indispensable tool for the assessment of those cases because the characteristics of chopping trauma often appear masked or changed by clinical treatment. In the present article, the role of 3DCT for the evaluation of chop wounds in clinical forensic medicine is demonstrated by an illustrative case report of a young man who was attacked with a hatchet. 3DCT provides additional possibilities for supplementing missing information, such as number and direction of blows as well as weapon identification. Furthermore, 3DCT facilitates demonstration in court and understanding of medical lay people. We conclude that 3DCT is of particular value for the evaluation of survivors of life-threatening head and face injury. An increasing significance of this technique may be expected. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
Bolliger, Stephan A; Thali, Michael J; Ross, Steffen; Buck, Ursula; Naether, Silvio; Vock, Peter
2008-02-01
The transdisciplinary research project Virtopsy is dedicated to implementing modern imaging techniques into forensic medicine and pathology in order to augment current examination techniques or even to offer alternative methods. Our project relies on three pillars: three-dimensional (3D) surface scanning for the documentation of body surfaces, and both multislice computed tomography (MSCT) and magnetic resonance imaging (MRI) to visualise the internal body. Three-dimensional surface scanning has delivered remarkable results in the past in the 3D documentation of patterned injuries and of objects of forensic interest as well as whole crime scenes. Imaging of the interior of corpses is performed using MSCT and/or MRI. MRI, in addition, is also well suited to the examination of surviving victims of assault, especially choking, and helps visualise internal injuries not seen at external examination of the victim. Apart from the accuracy and three-dimensionality that conventional documentations lack, these techniques allow for the re-examination of the corpse and the crime scene even decades later, after burial of the corpse and liberation of the crime scene. We believe that this virtual, non-invasive or minimally invasive approach will improve forensic medicine in the near future.
Thali, Michael J; Taubenreuther, Ulrike; Karolczak, Marek; Braun, Marcel; Brueschweiler, Walter; Kalender, Willi A; Dirnhofer, Richard
2003-11-01
When a knife is stabbed in bone, it leaves an impression in the bone. The characteristics (shape, size, etc.) may indicate the type of tool used to produce the patterned injury in bone. Until now it has been impossible in forensic sciences to document such damage precisely and non-destructively. Micro-computed tomography (Micro-CT) offers an opportunity to analyze patterned injuries of tool marks made in bone. Using high-resolution Micro-CT and computer software, detailed analysis of three-dimensional (3D) architecture has recently become feasible and allows microstructural 3D bone information to be collected. With adequate viewing software, data from 2D slice of an arbitrary plane can be extracted from 3D datasets. Using such software as a "digital virtual knife," the examiner can interactively section and analyze the 3D sample. Analysis of the bone injury revealed that Micro-CT provides an opportunity to correlate a bone injury to an injury-causing instrument. Even broken knife tips can be graphically and non-destructively assigned to a suspect weapon.
Optofluidic platforms based on surface-enhanced Raman scattering.
Lim, Chaesung; Hong, Jongin; Chung, Bong Geun; deMello, Andrew J; Choo, Jaebum
2010-05-01
We report recent progress in the development of surface-enhanced Raman scattering (SERS)-based optofluidic platforms for the fast and sensitive detection of chemical and biological analytes. In the current context, a SERS-based optofluidic platform is defined as an integrated analytical device composed of a microfluidic element and a sensitive Raman spectrometer. Optofluidic devices for SERS detection normally involve nanocolloid-based microfluidic systems or metal nanostructure-embedded microfluidic systems. In the current review, recent advances in both approaches are surveyed and assessed. Additionally, integrated real-time sensing systems that combine portable Raman spectrometers with microfluidic devices are also reviewed. Such real-time sensing systems have significant utility in environmental monitoring, forensic science and homeland defense applications.
Introducing the Forensic Research/Reference on Genetics knowledge base, FROG-kb.
Rajeevan, Haseena; Soundararajan, Usha; Pakstis, Andrew J; Kidd, Kenneth K
2012-09-01
Online tools and databases based on multi-allelic short tandem repeat polymorphisms (STRPs) are actively used in forensic teaching, research, and investigations. The Fst value of each CODIS marker tends to be low across the populations of the world and most populations typically have all the common STRP alleles present diminishing the ability of these systems to discriminate ethnicity. Recently, considerable research is being conducted on single nucleotide polymorphisms (SNPs) to be considered for human identification and description. However, online tools and databases that can be used for forensic research and investigation are limited. The back end DBMS (Database Management System) for FROG-kb is Oracle version 10. The front end is implemented with specific code using technologies such as Java, Java Servlet, JSP, JQuery, and GoogleCharts. We present an open access web application, FROG-kb (Forensic Research/Reference on Genetics-knowledge base, http://frog.med.yale.edu), that is useful for teaching and research relevant to forensics and can serve as a tool facilitating forensic practice. The underlying data for FROG-kb are provided by the already extensively used and referenced ALlele FREquency Database, ALFRED (http://alfred.med.yale.edu). In addition to displaying data in an organized manner, computational tools that use the underlying allele frequencies with user-provided data are implemented in FROG-kb. These tools are organized by the different published SNP/marker panels available. This web tool currently has implemented general functions possible for two types of SNP panels, individual identification and ancestry inference, and a prediction function specific to a phenotype informative panel for eye color. The current online version of FROG-kb already provides new and useful functionality. We expect FROG-kb to grow and expand in capabilities and welcome input from the forensic community in identifying datasets and functionalities that will be most helpful and useful. Thus, the structure and functionality of FROG-kb will be revised in an ongoing process of improvement. This paper describes the state as of early June 2012.
Approach of forensic medicine to gossypiboma.
Karakaya, M Arif; Koç, Okay; Ekiz, Feza; Ağaçhan, A Feran
2015-01-01
The aim of this study was to assess the risk factors and preventive measures for gossypibomas and their medico-legal implications in forensic medicine in the Turkish legal system. This study involved a retrospective analysis of the records of 39 patients with gossypiboma. Records were available from the Istanbul Forensic Medicine Institution and were surveyed for faulty treatment between 2008 and 2012. Parameters such as distribution of the cases according to specializations, elective and emergency procedures, surgical procedures, radio-opaque sponge and fluoroscopy availability, routine sponge and instrument counting, number of nurses for counting, and control of the operative field by a second surgeon were investigated. All cases were evaluated by the Istanbul Forensic Medicine Institute 3rd Expertise Committee. This committee comprised of specialists from the departments of forensic medicine, orthopedics and traumatology, general surgery, neurology, internal medicine, pediatrics, chest disease, and infectious diseases. All cases were considered as poor medical practice (malpractice) and surgeons were found to be responsible. In 16 of these 39 cases (41%) emergency procedures were performed. No unexpected event was reported in any procedure. In 16 cases (41%), sponge count was performed and was reported to be complete. Operation notes were available in 16 (41%) cases. Control of the operative field was performed by 1 surgeon, and sponge and instrument count was performed by 1 scrub nurse. Radio-opaque sponge and fluoroscopy were available in 9 (23%) centers in these cases. Gossypiboma can be prevented not only with surgeons' care but also with adequate support of medical device and material. However, it is considered as a poor medical practice. Presence of only 1 general surgeon in the expertise committee and ignorance of the working conditions by the surgeons should be questioned.
Canetta, Elisabetta; Adya, Ashok K
2011-07-15
Pressure sensitive adhesive (PSA), such as those used in packaging and adhesive tapes, are very often encountered in forensic investigations. In criminal activities, packaging tapes may be used for sealing packets containing drugs, explosive devices, or questioned documents, while adhesive and electrical tapes are used occasionally in kidnapping cases. In this work, the potential of using atomic force microscopy (AFM) in both imaging and force mapping (FM) modes to derive additional analytical information from PSAs is demonstrated. AFM has been used to illustrate differences in the ultrastructural and nanomechanical properties of three visually distinguishable commercial PSAs to first test the feasibility of using this technique. Subsequently, AFM was used to detect nanoscopic differences between three visually indistinguishable PSAs. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.
The journey from forensic to predictive materials science using density functional theory
Schultz, Peter A.
2017-09-12
Approximate methods for electronic structure, implemented in sophisticated computer codes and married to ever-more powerful computing platforms, have become invaluable in chemistry and materials science. The maturing and consolidation of quantum chemistry codes since the 1980s, based upon explicitly correlated electronic wave functions, has made them a staple of modern molecular chemistry. Here, the impact of first principles electronic structure in physics and materials science had lagged owing to the extra formal and computational demands of bulk calculations.
The journey from forensic to predictive materials science using density functional theory
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schultz, Peter A.
Approximate methods for electronic structure, implemented in sophisticated computer codes and married to ever-more powerful computing platforms, have become invaluable in chemistry and materials science. The maturing and consolidation of quantum chemistry codes since the 1980s, based upon explicitly correlated electronic wave functions, has made them a staple of modern molecular chemistry. Here, the impact of first principles electronic structure in physics and materials science had lagged owing to the extra formal and computational demands of bulk calculations.
Bibliography: Citations Obtained through the National Library of Medicine's MEDLARS Program.
ERIC Educational Resources Information Center
Journal of Medical Education, 1979
1979-01-01
Approximately 370 references are cited in the following areas of medical education: accreditation, computers, continuing education, curriculum, educational measurement, research and evaluation, faculty, foreign graduates, forensic medicine, history, minority groups, foreign education, specialties, teaching methods, etc. (LBH)
ERIC Educational Resources Information Center
McMahon, Brian T., Ed.
1983-01-01
Discusses the expanding role of the rehabilitation counselor into private sector rehabilitation in the seven articles of this special issue. Topics cover private rehabilitation in an insurance context including forensics issues, computer applications, recent trends, services in a multiprogram private clinic, and rehabilitation counselor training.…
Bibliography. Citations Obtained Through the National Library of Medicine's MEDLARS Program
ERIC Educational Resources Information Center
Journal of Medical Education, 1978
1978-01-01
Approximately 200 MEDLARS references are cited dealing with: accreditation and licensure; computers; continuing education; curriculum; educational measurement, and research and development; forensic medicine; graduate education; history; internship and residency; foreign medical education; minority groups; schools; specialism; students; teaching…
Elliptical Fourier analysis: fundamentals, applications, and value for forensic anthropology.
Caple, Jodi; Byrd, John; Stephan, Carl N
2017-11-01
The numerical description of skeletal morphology enables forensic anthropologists to conduct objective, reproducible, and structured tests, with the added capability of verifying morphoscopic-based analyses. One technique that permits comprehensive quantification of outline shape is elliptical Fourier analysis. This curve fitting technique allows a form's outline to be approximated via the sum of multiple sine and cosine waves, permitting the profile perimeter of an object to be described in a dense (continuous) manner at a user-defined level of precision. A large amount of shape information (the entire perimeter) can thereby be collected in contrast to other methods relying on sparsely located landmarks where information falling in between the landmarks fails to be acquired. First published in 1982, elliptical Fourier analysis employment in forensic anthropology from 2000 onwards reflects a slow uptake despite large computing power that makes its calculations easy to conduct. Without hurdles arising from calculation speed or quantity, the slow uptake may partly reside with the underlying mathematics that on first glance is extensive and potentially intimidating. In this paper, we aim to bridge this gap by pictorially illustrating how elliptical Fourier harmonics work in a simple step-by-step visual fashion to facilitate universal understanding and as geared towards increased use in forensic anthropology. We additionally provide a short review of the method's utility for osteology, a summary of past uses in forensic anthropology, and software options for calculations that largely save the user the trouble of coding customized routines.
Postmortem CT versus forensic autopsy: frequent discrepancies of tracheobronchial content findings.
Zech, Wolf-Dieter; Jackowski, Christian; Schwendener, Nicole; Brencicova, Eva; Schuster, Frederick; Lombardo, Paolo
2016-01-01
In their daily forensic casework, the authors experienced discrepancies of tracheobronchial content findings between postmortem computed tomography (PMCT) and autopsy to an extent previously unnoticed in the literature. The goal of this study was to evaluate such discrepancies in routine forensic cases. A total of 327 cases that underwent PMCT prior to routine forensic autopsy were retrospectively evaluated for tracheal and bronchial contents according to PMCT and autopsy findings. Hounsfield unit (HU) values of tracheobronchial contents, causes of death, and presence of pulmonary edema were assessed in mismatching and matching cases. Comparing contents in PMCT and autopsy in each of the separately evaluated compartments of the respiratory tract low positive predictive values were assessed (trachea, 38.2%; main bronchi, 40%; peripheral bronchi, 69.1%) indicating high discrepancy rates. The majority of tracheobronchial contents were viscous stomach contents in matching cases and low radiodensity materials (i.e., HU < 30) in mismatching cases. The majority of causes of death were cardiac related in the matching cases and skull/brain trauma in the mismatching cases. In mismatching cases, frequency of pulmonary edema was significantly higher than in matching cases. It can be concluded that discrepancies in tracheobronchial contents observed between PMCT and routine forensic autopsy occur in a considerable number of cases. Discrepancies may be explained by the runoff of contents via nose and mouth during external examination and the flow back of tracheal and main bronchial contents into the lungs caused by upright movement of the respiratory tract at autopsy.
Lefèvre, Thomas; Lepresle, Aude; Chariot, Patrick
2015-09-01
The search for complex, nonlinear relationships and causality in data is hindered by the availability of techniques in many domains, including forensic science. Linear multivariable techniques are useful but present some shortcomings. In the past decade, Bayesian approaches have been introduced in forensic science. To date, authors have mainly focused on providing an alternative to classical techniques for quantifying effects and dealing with uncertainty. Causal networks, including Bayesian networks, can help detangle complex relationships in data. A Bayesian network estimates the joint probability distribution of data and graphically displays dependencies between variables and the circulation of information between these variables. In this study, we illustrate the interest in utilizing Bayesian networks for dealing with complex data through an application in clinical forensic science. Evaluating the functional impairment of assault survivors is a complex task for which few determinants are known. As routinely estimated in France, the duration of this impairment can be quantified by days of 'Total Incapacity to Work' ('Incapacité totale de travail,' ITT). In this study, we used a Bayesian network approach to identify the injury type, victim category and time to evaluation as the main determinants of the 'Total Incapacity to Work' (TIW). We computed the conditional probabilities associated with the TIW node and its parents. We compared this approach with a multivariable analysis, and the results of both techniques were converging. Thus, Bayesian networks should be considered a reliable means to detangle complex relationships in data.
ERIC Educational Resources Information Center
Battin, David B.; Ceci, Stephen J.; Lust, Barbara C.
2012-01-01
This study compared younger (M = 53 months) and older (M = 90 months) children's use of linguistic referential devices to make a positive identification. Children were shown a 4-minute video that concluded with a wrongful act. They were interviewed 24 hours later and asked to identify the perpetrator of the wrongful act with open-ended and…
Oral mark in the application of an individual identification: From ashes to truth.
Chugh, Anshul; Narwal, Anumeha
2017-01-01
Forensic odontology is the branch of dentistry which deals with the proper handling, examination, evaluation and presentation of dental findings in the interest of justice. After major disasters and perimortem assaults such as earthquakes, fires, severe head and neck trauma or gross decomposition, accurate and early identification of dead and injured becomes important. In the absence of other records in such cases, identification is based on restorations, missing teeth and prosthetic devices such as partial and complete removable/fixed prosthesis or implant retained devices. This brings out the major role of prosthodontics to investigate the identity of suspects in the criminal cases as well as the deceased human beings in traumatic injuries or in disasters. Denture identification systems are being used as means of postmortem identification of edentulous persons which has evolved from the inclusion of some form of printed label in a denture to more high-tech methods. The provision of implant retained complete lower denture, antemortem, and postmortem radiographs of edentulous persons and correlation of bite marks using special impression techniques provide another potential source of evidence for human identification. Hence, this literature review throws some light on the role played by prosthodontist in forensic odontology.
Álvarez, Ángela; Yáñez, Jorge; Contreras, David; Saavedra, Renato; Sáez, Pedro; Amarasiriwardena, Dulasiri
2017-11-01
The use of propellant for making improvised explosive devices (IED) is an incipient criminal practice. Propellant can be used as initiator in explosive mixtures along with other components such as coal, ammonium nitrate, sulfur, etc. The identification of the propellant's brand used in homemade explosives can provide additional forensic information of this evidence. In this work, four of the most common propellant brands were characterized by Fourier-transform infrared photoacoustic spectroscopy (FTIR-PAS) which is a non-destructive micro-analytical technique. Spectra shows characteristic signals of typical compounds in the propellants, such as nitrocellulose, nitroglycerin, guanidine, diphenylamine, etc. The differentiation of propellant components was achieved by using FTIR-PAS combined with chemometric methods of classification. Principal component analysis (PCA) and soft independent modelling of class analogy (SIMCA) were used to achieve an effective differentiation and classification (100%) of propellant brands. Furthermore, propellant brand differentiation was also assessed using partial least squares discriminant analyses (PLS-DA) by leave one out cross (∼97%) and external (∼100%) validation method. Our results show the ability of FTIR-PAS combined with chemometric analysis to identify and differentiate propellant brands in different explosive formulations of IED. Copyright © 2017 Elsevier B.V. All rights reserved.
Bibliography: Citations Obtained through the National Library of Medicine's MEDLARS Program.
ERIC Educational Resources Information Center
Journal of Medical Education, 1979
1979-01-01
Among the approximately 480 references on medical education, the following topics are covered: accreditation and certification, computers, continuing education, curriculum, educational measurement, research and evaluation, foreign graduates, forensic medicine, graduate education, history, internships, foreign education, schools, minority groups,…
Bibliography: Citations Obtained Through the National Library of Medicine's MEDLARS Program
ERIC Educational Resources Information Center
Journal of Medical Education, 1978
1978-01-01
Approximately 130 references obtained through MEDLARS are cited, dealing with such topics as accreditation, computers, continuing education, curriculum, educational measurement, faculty, foreign graduates, forensic medicine, graduate education, history, minority groups, medical schools, specialism, students, teaching hospitals, teaching methods,…
Collection of post mortem data: DVI protocols and quality assurance.
Kvaal, Sigrid I
2006-05-15
In many countries forensic odontologists are members of the Disaster Victim Identification (DVI) team. As part of their post mortem (PM) tasks work on the incident site may include securing and preserving the dental material and evidence before transport to the mortuary. In the autopsy room the main aim is to register the PM dental status. Photographs and radiographs are essential documentations in addition to a conventional registration of the dental status. Abbreviations in the registration may be used if agreed with the ante mortem (AM) team. Dental age estimation may be an aid in the sorting process and especially in victims without previous dental treatment. Interpol has a form set as part of their DVI manual. Forensic odontologists working in pairs and checking each other will act as quality assurance (QA) as suggested by International Organization for Forensic Odonto-Stomatology (IOFOS). Direct entry into the computer program as part of the registration in the autopsy room may save time and manpower.
Acharya, Ashith B
2014-05-01
Dentin translucency measurement is an easy yet relatively accurate approach to postmortem age estimation. Translucency area represents a two-dimensional change and may reflect age variations better than length. Manually measuring area is challenging and this paper proposes a new digital method using commercially available computer hardware and software. Area and length were measured on 100 tooth sections (age range, 19-82 years) of 250 μm thickness. Regression analysis revealed lower standard error of estimate and higher correlation with age for length than for area (R = 0.62 vs. 0.60). However, test of regression formulae on a control sample (n = 33, 21-85 years) showed smaller mean absolute difference (8.3 vs. 8.8 years) and greater frequency of smaller errors (73% vs. 67% age estimates ≤ ± 10 years) for area than for length. These suggest that digital area measurements of root translucency may be used as an alternative to length in forensic age estimation. © 2014 American Academy of Forensic Sciences.
Caple, Jodi; Stephan, Carl N
2017-05-01
Graphic exemplars of cranial sex and ancestry are essential to forensic anthropology for standardizing casework, training analysts, and communicating group trends. To date, graphic exemplars have comprised hand-drawn sketches, or photographs of individual specimens, which risks bias/subjectivity. Here, we performed quantitative analysis of photographic data to generate new photo-realistic and objective exemplars of skull form. Standardized anterior and left lateral photographs of skulls for each sex were analyzed in the computer graphics program Psychomorph for the following groups: South African Blacks, South African Whites, American Blacks, American Whites, and Japanese. The average cranial form was calculated for each photographic view, before the color information for every individual was warped to the average form and combined to produce statistical averages. These mathematically derived exemplars-and their statistical exaggerations or extremes-retain the high-resolution detail of the original photographic dataset, making them the ideal casework and training reference standards. © 2016 American Academy of Forensic Sciences.
The use of clinical CCT images in the forensic examination of closed head injuries.
Bauer, M; Polzin, S; Patzelt, D
2004-04-01
The forensic evaluation of clinical cranial computed tomographies (CCT) frequently is the only reliable source of morphological evidence in head injuries when the injured individual survives or when death is delayed and autopsy findings are characterized by secondary changes. We have reviewed 21 cases where clinical CCT examinations were used to establish a medico-legal diagnosis. In 18 cases falls (n = 13) could be distinguished from blows (n = 5) due to the presence and/or absence of coup and contrecoup lesions and linear or depressed skull fractures. In two cases the striking object could be identified by digital superimposition. The minimum number of blows could be determined in 1 case. Only in 3 remaining cases the results were inconclusive. In our experience, CCT scans provide an important source of information for the forensic expert. To have unbiased access to these information, it is useful to evaluate the CT scans personally which requires a basic knowledge of traumatic changes found on radiographs.
The Power of Exclusion using Automated Osteometric Sorting: Pair-Matching.
Lynch, Jeffrey James; Byrd, John; LeGarde, Carrie B
2018-03-01
This study compares the original pair-matching osteometric sorting model (J Forensic Sci 2003;48:717) against two new models providing validation and performance testing across three samples. The samples include the Forensic Data Bank, USS Oklahoma, and the osteometric sorting reference used within the Defense POW/MIA Accounting Agency. A computer science solution to generating dynamic statistical models across a commingled assemblage is presented. The issue of normality is investigated showing the relative robustness against non-normality and a data transformation to control for normality. A case study is provided showing the relative exclusion power of all three models from an active commingled case within the Defense POW/MIA Accounting Agency. In total, 14,357,220 osteometric t-tests were conducted. The results indicate that osteometric sorting performs as expected despite reference samples deviating from normality. The two new models outperform the original, and one of those is recommended to supersede the original for future osteometric sorting work. © 2017 American Academy of Forensic Sciences.
NASA Astrophysics Data System (ADS)
McFall, Steve
1994-03-01
With the increase in business automation and the widespread availability and low cost of computer systems, law enforcement agencies have seen a corresponding increase in criminal acts involving computers. The examination of computer evidence is a new field of forensic science with numerous opportunities for research and development. Research is needed to develop new software utilities to examine computer storage media, expert systems capable of finding criminal activity in large amounts of data, and to find methods of recovering data from chemically and physically damaged computer storage media. In addition, defeating encryption and password protection of computer files is also a topic requiring more research and development.
[The application of X-ray imaging in forensic medicine].
Kučerová, Stěpánka; Safr, Miroslav; Ublová, Michaela; Urbanová, Petra; Hejna, Petr
2014-07-01
X-ray is the most common, basic and essential imaging method used in forensic medicine. It serves to display and localize the foreign objects in the body and helps to detect various traumatic and pathological changes. X-ray imaging is valuable in anthropological assessment of an individual. X-ray allows non-invasive evaluation of important findings before the autopsy and thus selection of the optimal strategy for dissection. Basic indications for postmortem X-ray imaging in forensic medicine include gunshot and explosive fatalities (identification and localization of projectiles or other components of ammunition, visualization of secondary missiles), sharp force injuries (air embolism, identification of the weapon) and motor vehicle related deaths. The method is also helpful for complex injury evaluation in abused victims or in persons where abuse is suspected. Finally, X-ray imaging still remains the gold standard method for identification of unknown deceased. With time modern imaging methods, especially computed tomography and magnetic resonance imaging, are more and more applied in forensic medicine. Their application extends possibilities of the visualization the bony structures toward a more detailed imaging of soft tissues and internal organs. The application of modern imaging methods in postmortem body investigation is known as digital or virtual autopsy. At present digital postmortem imaging is considered as a bloodless alternative to the conventional autopsy.
Tillmar, Andreas O; Kling, Daniel; Butler, John M; Parson, Walther; Prinz, Mechthild; Schneider, Peter M; Egeland, Thore; Gusmão, Leonor
2017-07-01
Forensic genetic laboratories perform an increasing amount of genetic analyses of the X chromosome, in particular to solve complex cases of kinship analysis. For some biological relationships X-chromosomal markers can be more informative than autosomal markers, and there are a large number of markers, methods and databases that have been described for forensic use. Due to their particular mode of inheritance, and their physical location on a single chromosome, some specific considerations are required when estimating the weight of evidence for X-chromosomal marker DNA data. The DNA Commission of the International Society for Forensic Genetics (ISFG) hereby presents guidelines and recommendations for the use of X-chromosomal markers in kinship analysis with a special focus on the biostatistical evaluation. Linkage and linkage disequilibrium (association of alleles) are of special importance for such evaluations and these concepts and the implications for likelihood calculations are described in more detail. Furthermore it is important to use appropriate computer software that accounts for linkage and linkage disequilibrium among loci, as well as for mutations. Even though some software exist, there is still a need for further improvement of dedicated software. Copyright © 2017 Elsevier B.V. All rights reserved.
Enabling fluorescent biosensors for the forensic identification of body fluids.
Frascione, Nunzianda; Gooch, James; Daniel, Barbara
2013-11-12
The search for body fluids often forms a crucial element of many forensic investigations. Confirming fluid presence at a scene can not only support or refute the circumstantial claims of a victim, suspect or witness, but may additionally provide a valuable source of DNA for further identification purposes. However, current biological fluid testing techniques are impaired by a number of well-characterised limitations; they often give false positives, cannot be used simultaneously, are sample destructive and lack the ability to visually locate fluid depositions. These disadvantages can negatively affect the outcome of a case through missed or misinterpreted evidence. Biosensors are devices able to transduce a biological recognition event into a measurable signal, resulting in real-time analyte detection. The use of innovative optical sensing technology may enable the highly specific and non-destructive detection of biological fluid depositions through interaction with several fluid-endogenous biomarkers. Despite considerable impact in a variety of analytical disciplines, biosensor application within forensic analyses may be considered extremely limited. This article aims to explore a number of prospective biosensing mechanisms and to outline the challenges associated with their adaptation towards detection of fluid-specific analytes.
Science, truth, and forensic cultures: the exceptional legal status of DNA evidence.
Lynch, Michael
2013-03-01
Many epistemological terms, such as investigation, inquiry, argument, evidence, and fact were established in law well before being associated with science. However, while legal proof remained qualified by standards of 'moral certainty', scientific proof attained a reputation for objectivity. Although most forms of legal evidence (including expert evidence) continue to be treated as fallible 'opinions' rather than objective 'facts', forensic DNA evidence increasingly is being granted an exceptional factual status. It did not always enjoy such status. Two decades ago, the scientific status of forensic DNA evidence was challenged in the scientific literature and in courts of law, but by the late 1990s it was being granted exceptional legal status. This paper reviews the ascendancy of DNA profiling, and argues that its widely-heralded objective status is bound up with systems of administrative accountability. The 'administrative objectivity' of DNA evidence rests upon observable and reportable bureaucratic rules, records, recording devices, protocols, and architectural arrangements. By highlighting administrative sources of objectivity, this paper suggests that DNA evidence remains bound within the context of ordinary organisational and practical routines, and is not a transcendent source of 'truth' in the criminal justice system. Copyright © 2012. Published by Elsevier Ltd.
15 CFR Supplement No. 5 to Part 742 - Encryption Registration
Code of Federal Regulations, 2013 CFR
2013-01-01
... registration, i.e., the information as described in this Supplement, submitted as a support documentation... (h) Smartcards or other identity management (i) Computer or network forensics (j) Software (i) Operating systems (ii) Applications (k) Toolkits/ASICs/components (l) Information security including secure...
15 CFR Supplement No. 5 to Part 742 - Encryption Registration
Code of Federal Regulations, 2011 CFR
2011-01-01
... registration, i.e., the information as described in this Supplement, submitted as a support documentation... (h) Smartcards or other identity management (i) Computer or network forensics (j) Software (i) Operating systems (ii) Applications (k) Toolkits/ASICs/components (l) Information security including secure...
15 CFR Supplement No. 5 to Part 742 - Encryption Registration
Code of Federal Regulations, 2014 CFR
2014-01-01
... registration, i.e., the information as described in this Supplement, submitted as a support documentation... (h) Smartcards or other identity management (i) Computer or network forensics (j) Software (i) Operating systems (ii) Applications (k) Toolkits/ASICs/components (l) Information security including secure...
15 CFR Supplement No. 5 to Part 742 - Encryption Registration
Code of Federal Regulations, 2012 CFR
2012-01-01
... registration, i.e., the information as described in this Supplement, submitted as a support documentation... (h) Smartcards or other identity management (i) Computer or network forensics (j) Software (i) Operating systems (ii) Applications (k) Toolkits/ASICs/components (l) Information security including secure...
Bibliography. Citations Obtained through the National Library of Medicine's MEDLARS Program.
ERIC Educational Resources Information Center
Journal of Medical Education, 1980
1980-01-01
A bibliography from the National Library of Medicine's MEDLARS Program covers: accreditation, certification and licensure; computers; continuing education; curriculum; educational measurement; faculty; forensic medicine; history; internship and residency; medical education in other countries; minority groups, sex and age factors; and premedical…
Guyomarc'h, Pierre; Dutailly, Bruno; Couture, Christine; Coqueugniot, Hélène
2012-09-01
Accuracy of forensic facial approximation and superimposition techniques relies on the knowledge of anatomical correlations between soft and hard tissues. Recent studies by Stephan and collaborators (6,8,10) reviewed traditional guidelines leading to a wrong placement of the eyeball in the orbit. As those statements are based on a small cadaver sample, we propose a validation of these findings on a large database (n = 375) of living people. Computed tomography scans of known age and sex subjects were used to collect landmarks on three-dimensional surfaces and DICOM with TIVMI. Results confirmed a more superior and lateral position of the eyeball relatively to the orbital rims. Orbital height and breadth were used to compute regression formulae and proportional placement using percentages to find the most probable position of the eyeball in the orbit. A size-related sexual dimorphism was present but did not impact on the prediction accuracy. © 2012 American Academy of Forensic Sciences.
Derrick, Sharon M; Raxter, Michelle H; Hipp, John A; Goel, Priya; Chan, Elaine F; Love, Jennifer C; Wiersema, Jason M; Akella, N Shastry
2015-01-01
Medical examiners and coroners (ME/C) in the United States hold statutory responsibility to identify deceased individuals who fall under their jurisdiction. The computer-assisted decedent identification (CADI) project was designed to modify software used in diagnosis and treatment of spinal injuries into a mathematically validated tool for ME/C identification of fleshed decedents. CADI software analyzes the shapes of targeted vertebral bodies imaged in an array of standard radiographs and quantifies the likelihood that any two of the radiographs contain matching vertebral bodies. Six validation tests measured the repeatability, reliability, and sensitivity of the method, and the effects of age, sex, and number of radiographs in array composition. CADI returned a 92-100% success rate in identifying the true matching pair of vertebrae within arrays of five to 30 radiographs. Further development of CADI is expected to produce a novel identification method for use in ME/C offices that is reliable, timely, and cost-effective. © 2014 American Academy of Forensic Sciences.
CoDA 2014 special issue: Exploring data-focused research across the department of energy: Editorial
Myers, Kary Lynn
2015-10-05
Here, this collection of papers, written by researchers at the national labs, in academia, and in industry present real problems, massive and complex datasets, and novel statistical approaches motivated by the challenges presented by experimental and computational science. You'll find explorations of the trajectories of aircraft and of the light curves of supernovae, of computer network intrusions and of nuclear forensics, of photovoltaics and overhead imagery.
Field Level Computer Exploitation Package
2007-03-01
to take advantage of the data retrieved from the computer. Major Barge explained that if a tool could be designed that nearly anyone could use...the study of network forensics. This has become a necessity because of the constantly growing eCommerce industry and the stiff competition between...Security. One big advantage that Insert has is the fact that it is quite small compared to most bootable CDs. At only 60 megabytes it can be burned
Likelihood ratio data to report the validation of a forensic fingerprint evaluation method.
Ramos, Daniel; Haraksim, Rudolf; Meuwly, Didier
2017-02-01
Data to which the authors refer to throughout this article are likelihood ratios (LR) computed from the comparison of 5-12 minutiae fingermarks with fingerprints. These LRs data are used for the validation of a likelihood ratio (LR) method in forensic evidence evaluation. These data present a necessary asset for conducting validation experiments when validating LR methods used in forensic evidence evaluation and set up validation reports. These data can be also used as a baseline for comparing the fingermark evidence in the same minutiae configuration as presented in (D. Meuwly, D. Ramos, R. Haraksim,) [1], although the reader should keep in mind that different feature extraction algorithms and different AFIS systems used may produce different LRs values. Moreover, these data may serve as a reproducibility exercise, in order to train the generation of validation reports of forensic methods, according to [1]. Alongside the data, a justification and motivation for the use of methods is given. These methods calculate LRs from the fingerprint/mark data and are subject to a validation procedure. The choice of using real forensic fingerprint in the validation and simulated data in the development is described and justified. Validation criteria are set for the purpose of validation of the LR methods, which are used to calculate the LR values from the data and the validation report. For privacy and data protection reasons, the original fingerprint/mark images cannot be shared. But these images do not constitute the core data for the validation, contrarily to the LRs that are shared.
Accuracy and eligibility of CBCT to digitize dental plaster casts.
Becker, Kathrin; Schmücker, Ulf; Schwarz, Frank; Drescher, Dieter
2018-05-01
Software-based dental planning requires digital casts and oftentimes cone-beam computed tomography (CBCT) radiography. However, buying a dedicated model digitizing device can be expensive and might not be required. The present study aimed to assess whether digital models derived from CBCT and models digitized using a dedicated optical device are of comparable accuracy. A total of 20 plaster casts were digitized with eight CBCT and five optical model digitizers. Corresponding models were superimposed using six control points and subsequent iterative closest point matching. Median distances were calculated among all registered models. Data were pooled per scanner and model. Boxplots were generated, and the paired t test, a Friedman test, and a post-hoc Nemenyi test were employed for statistical comparison. Results were found significant at p < 0.05. All CBCT devices allowed the digitization of plaster casts, but failed to reach the accuracy of the dedicated model digitizers (p < 0.001). Median distances between CBCT and optically digitized casts were 0.064 + - 0.005 mm. Qualitative differences among the CBCT systems were detected (χ 2 = 78.07, p < 0.001), and one CBCT providing a special plaster cast digitization mode was found superior to the competitors (p < 0.05). CBCT systems failed to reach the accuracy from optical digitizers, but within the limits of the study, accuracy appeared to be sufficient for digital planning and forensic purposes. Most CBCT systems enabled digitization of plaster casts, and accuracy was found sufficient for digital planning and storage purposes.
Biomedical devices and systems security.
Arney, David; Venkatasubramanian, Krishna K; Sokolsky, Oleg; Lee, Insup
2011-01-01
Medical devices have been changing in revolutionary ways in recent years. One is in their form-factor. Increasing miniaturization of medical devices has made them wearable, light-weight, and ubiquitous; they are available for continuous care and not restricted to clinical settings. Further, devices are increasingly becoming connected to external entities through both wired and wireless channels. These two developments have tremendous potential to make healthcare accessible to everyone and reduce costs. However, they also provide increased opportunity for technology savvy criminals to exploit them for fun and profit. Consequently, it is essential to consider medical device security issues. In this paper, we focused on the challenges involved in securing networked medical devices. We provide an overview of a generic networked medical device system model, a comprehensive attack and adversary model, and describe some of the challenges present in building security solutions to manage the attacks. Finally, we provide an overview of two areas of research that we believe will be crucial for making medical device system security solutions more viable in the long run: forensic data logging, and building security assurance cases.
Introducing the Forensic Research/Reference on Genetics knowledge base, FROG-kb
2012-01-01
Background Online tools and databases based on multi-allelic short tandem repeat polymorphisms (STRPs) are actively used in forensic teaching, research, and investigations. The Fst value of each CODIS marker tends to be low across the populations of the world and most populations typically have all the common STRP alleles present diminishing the ability of these systems to discriminate ethnicity. Recently, considerable research is being conducted on single nucleotide polymorphisms (SNPs) to be considered for human identification and description. However, online tools and databases that can be used for forensic research and investigation are limited. Methods The back end DBMS (Database Management System) for FROG-kb is Oracle version 10. The front end is implemented with specific code using technologies such as Java, Java Servlet, JSP, JQuery, and GoogleCharts. Results We present an open access web application, FROG-kb (Forensic Research/Reference on Genetics-knowledge base, http://frog.med.yale.edu), that is useful for teaching and research relevant to forensics and can serve as a tool facilitating forensic practice. The underlying data for FROG-kb are provided by the already extensively used and referenced ALlele FREquency Database, ALFRED (http://alfred.med.yale.edu). In addition to displaying data in an organized manner, computational tools that use the underlying allele frequencies with user-provided data are implemented in FROG-kb. These tools are organized by the different published SNP/marker panels available. This web tool currently has implemented general functions possible for two types of SNP panels, individual identification and ancestry inference, and a prediction function specific to a phenotype informative panel for eye color. Conclusion The current online version of FROG-kb already provides new and useful functionality. We expect FROG-kb to grow and expand in capabilities and welcome input from the forensic community in identifying datasets and functionalities that will be most helpful and useful. Thus, the structure and functionality of FROG-kb will be revised in an ongoing process of improvement. This paper describes the state as of early June 2012. PMID:22938150
Viel, Guido; Cecchetto, Giovanni; Manara, Renzo; Cecchetto, Attilio; Montisci, Massimo
2011-06-01
Patients affected by cranial trauma with depressed skull fractures and increased intracranial pressure generally undergo neurosurgical intervention. Because craniotomy and craniectomy remove skull fragments and generate new fracture lines, they complicate forensic examination and sometimes prevent a clear identification of skull fracture etiology. A 3-dimensional reconstruction based on preoperative computed tomography (CT) scans, giving a picture of the injuries before surgical intervention, can help the forensic examiner in identifying skull fracture origin and the means of production.We report the case of a 41-year-old-man presenting at the emergency department with a depressed skull fracture at the vertex and bilateral subdural hemorrhage. The patient underwent 2 neurosurgical interventions (craniotomy and craniectomy) but died after 40 days of hospitalization in an intensive care unit. At autopsy, the absence of various bone fragments did not allow us to establish if the skull had been stricken by a blunt object or had hit the ground with high kinetic energy. To analyze bone injuries before craniectomy, a 3-dimensional CT reconstruction based on preoperative scans was performed. A comparative analysis between autoptic and radiological data allowed us to differentiate surgical from traumatic injuries. Moreover, based on the shape and size of the depressed skull fracture (measured from the CT reformations), we inferred that the man had been stricken by a cylindric blunt object with a diameter of about 3 cm.
Lottering, Nicolene; MacGregor, Donna M; Alston, Clair L; Gregory, Laura S
2015-05-01
Due to disparity regarding the age at which skeletal maturation of the spheno-occipital synchondrosis occurs in forensic and biological literature, this study provides recalibrated multislice computed tomography (MSCT) age standards for the Australian (Queensland) population, using a Bayesian statistical approach. The sample comprises retrospective cranial/cervical MSCT scans obtained from 448 males and 416 females aged birth to 20 years from the Skeletal Biology and Forensic Anthropology Research Osteological Database. Fusion status of the synchondrosis was scored using a modified six-stage scoring tier on an MSCT platform, with negligible observer error (κ = 0.911 ± 0.04, intraclass correlation coefficient = 0.994). Bayesian transition analysis indicates that females are most likely to transition to complete fusion at 13.1 years and males at 15.6 years. Posterior densities were derived for each morphological stage, with complete fusion of the synchondrosis attained in all Queensland males over 16.3 years of age and females aged 13.8 years and older. The results demonstrate significant sexual dimorphism in synchondrosis fusion and are suggestive of intrapopulation variation between major geographic regions in Australia. This study contributes to the growing repository of contemporary anthropological standards calibrated for the Queensland milieu to improve the efficacy of the coronial process for medicolegal death investigation. As a stand-alone age indicator, the basicranial synchondrosis may be consulted as an exclusion criterion when determining the age of majority that constitutes 17 years in Queensland forensic practice. © 2014 Wiley Periodicals, Inc.
Dang, Catherine; Phuong, Thomas; Beddag, Mahmoud; Vega, Anabel; Denis, Céline
2018-07-01
To present a data model for clinical legal medicine and the software based on that data model for both practitioners and researchers. The main functionalities of the presented software are computer-assisted production of medical certificates and data capture, storage and retrieval. The data model and the software were jointly developed by the department of forensic medicine of the Jean Verdier Hospital (Bondy, France) and an bioinformatics laboratory (LIMICS, Paris universities 6-13) between November 2015 and May 2016. The data model was built based on four sources: i) a template used in our department for producing standardised medical certificates; ii) a random sample of medical certificates produced by the forensic department; iii) anterior consensus between four healthcare professionals (two forensic practitioners, a psychologist and a forensic psychiatrist) and iv) anatomical dictionaries. The trial version of the open source software was first designed for examination of physical assault survivors. An UML-like data model dedicated to clinical legal practice was built. The data model describes the terminology for examinations of sexual assault survivors, physical assault survivors, individuals kept in police custody and undocumented migrants for age estimation. A trial version of a software relying on the data model was developed and tested by three physicians. The software allows files archiving, standardised data collection, extraction and assistance for certificate generation. It can be used for research purpose, by data exchange and analysis. Despite some current limitations of use, it is a tool which can be shared and used by other departments of forensic medicine and other specialties, improving data management and exploitation. Full integration with external sources, analytics software and use of a semantic interoperability framework are planned for the next months. Copyright © 2016 Elsevier Ltd and Faculty of Forensic and Legal Medicine. All rights reserved.
ERIC Educational Resources Information Center
Sturgeon, Julie
2008-01-01
Acting on information from students who reported seeing a classmate looking at inappropriate material on a school computer, school officials used forensics software to plunge the depths of the PC's hard drive, searching for evidence of improper activity. Images were found in a deleted Internet Explorer cache as well as deleted file space.…
Spinning a Web Around Forensic Science and Senior Biology.
ERIC Educational Resources Information Center
Harrison, Colin R.
1999-01-01
Discusses a project that was established to integrate computer technology, especially the Internet, into the science classroom. Argues for the importance of providing students with a program of study that exposes them to the widest possible range of ways of gathering information for problem solving. (Author/WRM)
An aptamer-based paper microfluidic device for the colorimetric determination of cocaine.
Wang, Ling; Musile, Giacomo; McCord, Bruce R
2018-02-01
A method utilizing paper microfluidics coupled with gold nanoparticles and two anticocaine aptamers has been developed to detect seized cocaine samples. The ready-to-use format involves the use of a paper strip that produces a color change resulting from the salt-induced aggregation of gold nanoparticles producing a visible color change indicating the presence of the drug. This format is specific for the detection of cocaine. The visual LOD for the method was 2.5 μg and the camera based LOD was 2.36 μg. The operation of the device is easy and rapid, and does not require extensive training or instrumentation. All of the materials utilized in the device are safe and environmental friendly. This device should prove a useful tool for the screening of forensic samples. © 2017 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
de Araujo, William R; Frasson, Carolina M R; Ameku, Wilson A; Silva, José R; Angnes, Lúcio; Paixão, Thiago R L C
2017-11-20
A single-step laser scribing process is used to pattern nanostructured electrodes on paper-based devices. The facile and low-cost technique eliminates the need for chemical reagents or controlled conditions. This process involves the use of a CO 2 laser to pyrolyze the surface of the paperboard, producing a conductive porous non-graphitizing carbon material composed of graphene sheets and composites with aluminosilicate nanoparticles. The new electrode material was extensively characterized, and it exhibits high conductivity and an enhanced active/geometric area ratio; it is thus well-suited for electrochemical purposes. As a proof-of-concept, the devices were successfully employed for different analytical applications in the clinical, pharmaceutical, food, and forensic fields. The scalable and green fabrication method associated with the features of the new material is highly promising for the development of portable electrochemical devices. © 2017 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-21
... Devices, Portable Music and Data Processing Devices, Computers, and Components Thereof; Institution of... communication devices, portable music and data processing devices, computers, and components thereof by reason... certain wireless communication devices, portable music and data processing devices, computers, and...
2015-04-01
report is to examine how a computer forensic investigator/incident handler, without specialised computer memory or software reverse engineering skills ...The skills amassed by incident handlers and investigators alike while using Volatility to examine Windows memory images will be of some help...bin/pulseaudio --start --log-target=syslog 1362 1000 1000 nautilus 1366 1000 1000 /usr/lib/pulseaudio/pulse/gconf- helper 1370 1000 1000 nm-applet
2015-06-01
examine how a computer forensic investigator/incident handler, without specialised computer memory or software reverse engineering skills , can successfully...memory images and malware, this new series of reports will be directed at those who must analyse Linux malware-infected memory images. The skills ...disable 1287 1000 1000 /usr/lib/policykit-1-gnome/polkit-gnome-authentication- agent-1 1310 1000 1000 /usr/lib/pulseaudio/pulse/gconf- helper 1350
Feine, Ilan; Shpitzen, Moshe; Geller, Boris; Salmon, Eran; Peleg, Tsach; Roth, Jonathan; Gafny, Ron
2017-07-01
Electrical tapes (ETs) are a common component of improvised explosive devices (IEDs) used by terrorists or criminal organizations and represent a valuable forensic resource for DNA and latent fingerprints recovery. However, DNA recovery rates are typically low and usually below the minimal amount required for amplification. In addition, most DNA extraction methods are destructive and do not allow further latent fingerprints development. In the present study a cell culture based touch DNA model was used to demonstrate a two-step acetone-water DNA recovery protocol from ETs. This protocol involves only the adhesive side of the ET and increases DNA recovery rates by up to 70%. In addition, we demonstrated partially successful latent fingerprints development from the non-sticky side of the ETs. Taken together, this protocol maximizes the forensic examination of ETs and is recommended for routine casework processing. Copyright © 2017 Elsevier B.V. All rights reserved.
Forensic characterization of camcorded movies: digital cinema vs. celluloid film prints
NASA Astrophysics Data System (ADS)
Rolland-Nevière, Xavier; Chupeau, Bertrand; Do"rr, Gwena"l.; Blondé, Laurent
2012-03-01
Digital camcording in the premises of cinema theaters is the main source of pirate copies of newly released movies. To trace such recordings, watermarking systems are exploited in order for each projection to be unique and thus identifiable. The forensic analysis to recover these marks is different for digital and legacy cinemas. To avoid running both detectors, a reliable oracle discriminating between cams originating from analog or digital projections is required. This article details a classification framework relying on three complementary features : the spatial uniformity of the screen illumination, the vertical (in)stability of the projected image, and the luminance artifacts due to the interplay between the display and acquisition devices. The system has been tuned with cams captured in a controlled environment and benchmarked against a medium-sized dataset (61 samples) composed of real-life pirate cams. Reported experimental results demonstrate that such a framework yields over 80% classification accuracy.
Forensic Analysis of the Sony Playstation Portable
NASA Astrophysics Data System (ADS)
Conrad, Scott; Rodriguez, Carlos; Marberry, Chris; Craiger, Philip
The Sony PlayStation Portable (PSP) is a popular portable gaming device with features such as wireless Internet access and image, music and movie playback. As with most systems built around a processor and storage, the PSP can be used for purposes other than it was originally intended - legal as well as illegal. This paper discusses the features of the PSP browser and suggests best practices for extracting digital evidence.
Comparative analysis of LWR and FBR spent fuels for nuclear forensics evaluation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Permana, Sidik; Suzuki, Mitsutoshi; Su'ud, Zaki
2012-06-06
Some interesting issues are attributed to nuclide compositions of spent fuels from thermal reactors as well as fast reactors such as a potential to reuse as recycled fuel, and a possible capability to be manage as a fuel for destructive devices. In addition, analysis on nuclear forensics which is related to spent fuel compositions becomes one of the interesting topics to evaluate the origin and the composition of spent fuels from the spent fuel foot-prints. Spent fuel compositions of different fuel types give some typical spent fuel foot prints and can be estimated the origin of source of those spentmore » fuel compositions. Some technics or methods have been developing based on some science and technological capability including experimental and modeling or theoretical aspects of analyses. Some foot-print of nuclear forensics will identify the typical information of spent fuel compositions such as enrichment information, burnup or irradiation time, reactor types as well as the cooling time which is related to the age of spent fuels. This paper intends to evaluate the typical spent fuel compositions of light water (LWR) and fast breeder reactors (FBR) from the view point of some foot prints of nuclear forensics. An established depletion code of ORIGEN is adopted to analyze LWR spent fuel (SF) for several burnup constants and decay times. For analyzing some spent fuel compositions of FBR, some coupling codes such as SLAROM code, JOINT and CITATION codes including JFS-3-J-3.2R as nuclear data library have been adopted. Enriched U-235 fuel composition of oxide type is used for fresh fuel of LWR and a mixed oxide fuel (MOX) for FBR fresh fuel. Those MOX fuels of FBR come from the spent fuels of LWR. Some typical spent fuels from both LWR and FBR will be compared to distinguish some typical foot-prints of SF based on nuclear forensic analysis.« less
Ebert, Lars Christian; Ptacek, Wolfgang; Naether, Silvio; Fürst, Martin; Ross, Steffen; Buck, Ursula; Weber, Stefan; Thali, Michael
2010-03-01
The Virtopsy project, a multi-disciplinary project that involves forensic science, diagnostic imaging, computer science, automation technology, telematics and biomechanics, aims to develop new techniques to improve the outcome of forensic investigations. This paper presents a new approach in the field of minimally invasive virtual autopsy for a versatile robotic system that is able to perform three-dimensional (3D) surface scans as well as post mortem image-guided soft tissue biopsies. The system consists of an industrial six-axis robot with additional extensions (i.e. a linear axis to increase working space, a tool-changing system and a dedicated safety system), a multi-slice CT scanner with equipment for angiography, a digital photogrammetry and 3D optical surface-scanning system, a 3D tracking system, and a biopsy end effector for automatic needle placement. A wax phantom was developed for biopsy accuracy tests. Surface scanning times were significantly reduced (scanning times cut in half, calibration three times faster). The biopsy module worked with an accuracy of 3.2 mm. Using the Virtobot, the surface-scanning procedure could be standardized and accelerated. The biopsy module is accurate enough for use in biopsies in a forensic setting. The Virtobot can be utilized for several independent tasks in the field of forensic medicine, and is sufficiently versatile to be adapted to different tasks in the future. (c) 2009 John Wiley & Sons, Ltd.
Enzyme-based logic gates and circuits-analytical applications and interfacing with electronics.
Katz, Evgeny; Poghossian, Arshak; Schöning, Michael J
2017-01-01
The paper is an overview of enzyme-based logic gates and their short circuits, with specific examples of Boolean AND and OR gates, and concatenated logic gates composed of multi-step enzyme-biocatalyzed reactions. Noise formation in the biocatalytic reactions and its decrease by adding a "filter" system, converting convex to sigmoid response function, are discussed. Despite the fact that the enzyme-based logic gates are primarily considered as components of future biomolecular computing systems, their biosensing applications are promising for immediate practical use. Analytical use of the enzyme logic systems in biomedical and forensic applications is discussed and exemplified with the logic analysis of biomarkers of various injuries, e.g., liver injury, and with analysis of biomarkers characteristic of different ethnicity found in blood samples on a crime scene. Interfacing of enzyme logic systems with modified electrodes and semiconductor devices is discussed, giving particular attention to the interfaces functionalized with signal-responsive materials. Future perspectives in the design of the biomolecular logic systems and their applications are discussed in the conclusion. Graphical Abstract Various applications and signal-transduction methods are reviewed for enzyme-based logic systems.
Applications of ENF criterion in forensic audio, video, computer and telecommunication analysis.
Grigoras, Catalin
2007-04-11
This article reports on the electric network frequency criterion as a means of assessing the integrity of digital audio/video evidence and forensic IT and telecommunication analysis. A brief description is given to different ENF types and phenomena that determine ENF variations. In most situations, to reach a non-authenticity opinion, the visual inspection of spectrograms and comparison with an ENF database are enough. A more detailed investigation, in the time domain, requires short time windows measurements and analyses. The stability of the ENF over geographical distances has been established by comparison of synchronized recordings made at different locations on the same network. Real cases are presented, in which the ENF criterion was used to investigate audio and video files created with secret surveillance systems, a digitized audio/video recording and a TV broadcasted reportage. By applying the ENF Criterion in forensic audio/video analysis, one can determine whether and where a digital recording has been edited, establish whether it was made at the time claimed, and identify the time and date of the registering operation.
Using spectral information in forensic imaging.
Miskelly, Gordon M; Wagner, John H
2005-12-20
Improved detection of forensic evidence by combining narrow band photographic images taken at a range of wavelengths is dependent on the substance of interest having a significantly different spectrum from the underlying substrate. While some natural substances such as blood have distinctive spectral features which are readily distinguished from common colorants, this is not true for visualization agents commonly used in forensic science. We now show that it is possible to select reagents with narrow spectral features that lead to increased visibility using digital cameras and computer image enhancement programs even if their coloration is much less intense to the unaided eye than traditional reagents. The concept is illustrated by visualising latent fingermarks on paper with the zinc complex of Ruhemann's Purple, cyanoacrylate-fumed fingerprints with Eu(tta)(3)(phen), and soil prints with 2,6-bis(benzimidazol-2-yl)-4-[4'-(dimethylamino)phenyl]pyridine [BBIDMAPP]. In each case background correction is performed at one or two wavelengths bracketing the narrow absorption or emission band of these compounds. However, compounds with sharp spectral features would also lead to improved detection using more advanced algorithms such as principal component analysis.
Lee, Won-Joon; Wilkinson, Caroline M; Hwang, Hyeon-Shik; Lee, Sang-Mi
2015-05-01
Accuracy is the most important factor supporting the reliability of forensic facial reconstruction (FFR) comparing to the corresponding actual face. A number of methods have been employed to evaluate objective accuracy of FFR. Recently, it has been attempted that the degree of resemblance between computer-generated FFR and actual face is measured by geometric surface comparison method. In this study, three FFRs were produced employing live adult Korean subjects and three-dimensional computerized modeling software. The deviations of the facial surfaces between the FFR and the head scan CT of the corresponding subject were analyzed in reverse modeling software. The results were compared with those from a previous study which applied the same methodology as this study except average facial soft tissue depth dataset. Three FFRs of this study that applied updated dataset demonstrated lesser deviation errors between the facial surfaces of the FFR and corresponding subject than those from the previous study. The results proposed that appropriate average tissue depth data are important to increase quantitative accuracy of FFR. © 2015 American Academy of Forensic Sciences.
Nuzzolese, E; Marcario, V; Di Vella, G
2010-01-01
Forensic identification using odontology is based on the comparison of ante-mortem and post mortem dental records. The insertion of a radio frequency identification (RFId) tag into dentures could be used as an aid to identify decomposed bodies, by storing personal identification data in a small transponder that can be radio-transmitted to a reader connected to a computer. A small passive, 12 x 2,1 mm, read-only RFId-tag was incorporated into the manufacture of three trial complete upper dentures and tested for a signal. The aim of this article is to demonstrate the feasibility of manufacturing such a dental prosthesis, the technical protocols for its implantation in the denture resin and its working principles. Future research and tests are required in order to verify human compatibility of the tagged denture and also to evaluate any potential deterioration in strength when subjected to high temperatures, or for damage resulting from everyday wear and tear. It should also be able to withstand the extreme conditions resulting from major accidents or mass disasters and procedures used to perform a forensic identification. PMID:20657641
Cavalli, Fabio; Lusnig, Luca; Trentin, Edmondo
2017-05-01
Sex determination on skeletal remains is one of the most important diagnosis in forensic cases and in demographic studies on ancient populations. Our purpose is to realize an automatic operator-independent method to determine the sex from the bone shape and to test an intelligent, automatic pattern recognition system in an anthropological domain. Our multiple-classifier system is based exclusively on the morphological variants of a curve that represents the sagittal profile of the calvarium, modeled via artificial neural networks, and yields an accuracy higher than 80 %. The application of this system to other bone profiles is expected to further improve the sensibility of the methodology.
Comparison of historical documents for writership
NASA Astrophysics Data System (ADS)
Ball, Gregory R.; Pu, Danjun; Stritmatter, Roger; Srihari, Sargur N.
2010-01-01
Over the last century forensic document science has developed progressively more sophisticated pattern recognition methodologies for ascertaining the authorship of disputed documents. These include advances not only in computer assisted stylometrics, but forensic handwriting analysis. We present a writer verification method and an evaluation of an actual historical document written by an unknown writer. The questioned document is compared against two known handwriting samples of Herman Melville, a 19th century American author who has been hypothesized to be the writer of this document. The comparison led to a high confidence result that the questioned document was written by the same writer as the known documents. Such methodology can be applied to many such questioned documents in historical writing, both in literary and legal fields.
Development of an evaporation-based microfluidic sample concentrator
NASA Astrophysics Data System (ADS)
Sharma, Nigel R.; Lukyanov, Anatoly; Bardell, Ron L.; Seifried, Lynn; Shen, Mingchao
2008-02-01
MicroPlumbers Microsciences LLC, has developed a relatively simple concentrator device based on isothermal evaporation. The device allows for rapid concentration of dissolved or dispersed substances or microorganisms (e.g. bacteria, viruses, proteins, toxins, enzymes, antibodies, etc.) under conditions gentle enough to preserve their specific activity or viability. It is capable of removing of 0.8 ml of water per minute at 37°C, and has dimensions compatible with typical microfluidic devices. The concentrator can be used as a stand-alone device or integrated into various processes and analytical instruments, substantially increasing their sensitivity while decreasing processing time. The evaporative concentrator can find applications in many areas such as biothreat detection, environmental monitoring, forensic medicine, pathogen analysis, and agricultural industrial monitoring. In our presentation, we describe the design, fabrication, and testing of the concentrator. We discuss multiphysics simulations of the heat and mass transport in the device that we used to select the design of the concentrator and the protocol of performance testing. We present the results of experiments evaluating water removal performance.
Forensic analysis of explosions: Inverse calculation of the charge mass.
van der Voort, M M; van Wees, R M M; Brouwer, S D; van der Jagt-Deutekom, M J; Verreault, J
2015-07-01
Forensic analysis of explosions consists of determining the point of origin, the explosive substance involved, and the charge mass. Within the EU FP7 project Hyperion, TNO developed the Inverse Explosion Analysis (TNO-IEA) tool to estimate the charge mass and point of origin based on observed damage around an explosion. In this paper, inverse models are presented based on two frequently occurring and reliable sources of information: window breakage and building damage. The models have been verified by applying them to the Enschede firework disaster and the Khobar tower attack. Furthermore, a statistical method has been developed to combine the various types of data, in order to determine an overall charge mass distribution. In relatively open environments, like for the Enschede firework disaster, the models generate realistic charge masses that are consistent with values found in forensic literature. The spread predicted by the IEA tool is however larger than presented in the literature for these specific cases. This is also realistic due to the large inherent uncertainties in a forensic analysis. The IEA-models give a reasonable first order estimate of the charge mass in a densely built urban environment, such as for the Khobar tower attack. Due to blast shielding effects which are not taken into account in the IEA tool, this is usually an under prediction. To obtain more accurate predictions, the application of Computational Fluid Dynamics (CFD) simulations is advised. The TNO IEA tool gives unique possibilities to inversely calculate the TNT equivalent charge mass based on a large variety of explosion effects and observations. The IEA tool enables forensic analysts, also those who are not experts on explosion effects, to perform an analysis with a largely reduced effort. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.
Optimization of ultrahigh-speed multiplex PCR for forensic analysis.
Gibson-Daw, Georgiana; Crenshaw, Karin; McCord, Bruce
2018-01-01
In this paper, we demonstrate the design and optimization of an ultrafast PCR amplification technique, used with a seven-locus multiplex that is compatible with conventional capillary electrophoresis systems as well as newer microfluidic chip devices. The procedure involves the use of a high-speed polymerase and a rapid cycling protocol to permit multiplex PCR amplification of forensic short tandem repeat loci in 6.5 min. We describe the selection and optimization of master mix reagents such as enzyme, buffer, MgCl 2 , and dNTPs, as well as primer ratios, total volume, and cycle conditions, in order to get the best profile in the shortest time possible. Sensitivity and reproducibility studies are also described. The amplification process utilizes a small high-speed thermocycler and compact laptop, making it portable and potentially useful for rapid, inexpensive on-site genotyping. The seven loci of the multiplex were taken from conventional STR genotyping kits and selected for their size and lack of overlap. Analysis was performed using conventional capillary electrophoresis and microfluidics with fluorescent detection. Overall, this technique provides a more rapid method for rapid sample screening of suspects and victims. Graphical abstract Rapid amplification of forensic DNA using high speed thermal cycling followed by capillary or microfluidic electrophoresis.
Filograna, Laura; Magarelli, Nicola; Leone, Antonio; Guggenberger, Roman; Winklhofer, Sebastian; Thali, Michael John; Bonomo, Lorenzo
2015-09-01
The aim of this ex vivo study was to assess the performance of monoenergetic dual-energy CT (DECT) reconstructions to reduce metal artefacts in bodies with orthopedic devices in comparison with standard single-energy CT (SECT) examinations in forensic imaging. Forensic and clinical impacts of this study are also discussed. Thirty metallic implants in 20 consecutive cadavers with metallic implants underwent both SECT and DECT with a clinically suitable scanning protocol. Extrapolated monoenergetic DECT images at 64, 69, 88, 105, 120, and 130 keV and individually adjusted monoenergy for optimized image quality (OPTkeV) were generated. Image quality of the seven monoenergetic images and of the corresponding SECT image was assessed qualitatively and quantitatively by visual rating and measurements of attenuation changes induced by streak artefact. Qualitative and quantitative analyses showed statistically significant differences between monoenergetic DECT extrapolated images and SECT, with improvements in diagnostic assessment in monoenergetic DECT at higher monoenergies. The mean value of OPTkeV was 137.6 ± 4.9 with a range of 130 to 148 keV. This study demonstrates that monoenergetic DECT images extrapolated at high energy levels significantly reduce metallic artefacts from orthopedic implants and improve image quality compared to SECT examination in forensic imaging.
Chen, Hong; Ma, Rong-Liang; Fan, Zhinan; Chen, Yun; Wang, Zizheng; Fan, Li-Juan
2018-05-23
Selecting appropriate developing methods/reagents or their combination to enhance the effect for fingerprint development is of great significance for practical forensic investigation. Ethyl-2-cyanoacrylate ester (superglue) fuming is a popular method for "in-situ" developing fingerprints in forensic science, followed by fluorescence staining to enhance the contrast of the fingerprint image in some occasion. In this study, a series of fluorescent poly(p-phenylene vinylene) (PPV) nanoparticles (NPs) in colloidal solution were successfully prepared and the emission color was tuned via a simple way. The fuming process was carried out using a home-made device. The staining was accomplished by immersing a piece of absorbent cotton into the solution of NPs, and then gently applied on the fumed fingerprints for several times. The PPV NPs were found to have a better developing effect than Rhodamine 6G when excited by 365 nm UV lamp. Different emission colors of NPs are advantageous in developing fingerprints on various substrates. Mechanism study suggested that the NPs were embedded in the porous structure of the superglue resin. In all, the combination of fuming method with the staining by conjugated polymer NPs has been demonstrated to be successful for fluorescent fingerprint development and be promising for more practical forensic applications. Copyright © 2018. Published by Elsevier Inc.
Briken, Peer; Müller, Jürgen L; Berner, Wolfgang; Bödeker, Rolf-Hasso; Vollmann, Jochen; Kasperk, Christian; Koller, Matthias
2017-05-01
A testosterone-lowering medication is relatively commonly used as a form of treatment for sexual offenders with severe paraphilic disorders in German forensic psychiatric hospitals; however, a double-blind, controlled and randomized study, which investigates the efficacy of this medication, is still lacking. This article describes the process from the planning to the rejection of a clinical trial over the period from 2009 to 2015. Despite the careful planning with an interdisciplinary team and giving special consideration to the complex legal situation, the Federal Institute for Drugs and Medical Devices (BfArM) rejected the proposed trial in a brief formal letter with reference to the German Drug Law (§ 40 para. 1 p. 3 nr. 4 AMG). The ethics committee of the Hamburg Medical Association considered that clinical research is basically not possible with patients detained in a forensic psychiatric hospital. In the opinion of the authors, the described facts illustrate how legal regulations that should protect vulnerable groups in medical research, in a specific case can lead to the fact that a therapy form relevant to the corresponding patient group cannot be scientifically investigated.
Iatrogenic artefacts attributable to traditional cupping therapy in a shotgun fatality.
Cavlak, Mehmet; Özkök, Alper; Sarı, Serhat; Dursun, Ahmet; Akar, Taner; Karapirli, Mustafa; Demirel, Birol
2015-10-01
Cupping is a traditional treatment method that has been used for thousands of years to diminish pain, restore appetite and improve digestion, remove tendency to faint or remove 'bad blood' from the body. The suction of the cup is created by fire or mechanical devices. This procedure may result in circular erythema, petechiae, purpura, ecchymosis, burns and may be mistaken for trauma-related ecchymosis or livor mortis. Forty-year-old male was died by shotgun injuries in the same day of the wounding. Circular ecchymoses were observed on the forehead, within the scalp of occipital region, the back of the neck, and on the back. They were defined as ecchymoses in the first examination made by a general practitioner. In the external examination during the legal autopsy superficial incisions were observed on the circular ecchymoses. The shape, localization and color of and the characteristics of incisions on the circular lesions were concluded to be caused by the dry cupping therapy and wet cupping therapy procedures. These lesions and their formation mechanisms should be well-known by the forensic medical examiners and the other medical personnel involved in the forensic medical examination. Copyright © 2015 Elsevier Ltd and Faculty of Forensic and Legal Medicine. All rights reserved.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-08
... Wireless Communication Devices, Tablet Computers, Media Players, and Televisions, and Components Thereof... devices, including wireless communication devices, tablet computers, media players, and televisions, and... wireless communication devices, tablet computers, media players, and televisions, and components thereof...
2013-06-01
forensic pathology, forensic anthropology, and forensic toxicology . 13DOD’s forensic directive defines DOD components as the Office of the...DEFENSE FORENSICS Additional Planning and Oversight Needed to Establish an Enduring Expeditionary Forensic ...COVERED 00-00-2013 to 00-00-2013 4. TITLE AND SUBTITLE Defense Forensics : Additional Planning and Oversight Needed to Establish an Enduring
Reliable Acquisition of RAM Dumps from Intel-Based Apple Mac Computers over FireWire
NASA Astrophysics Data System (ADS)
Gladyshev, Pavel; Almansoori, Afrah
RAM content acquisition is an important step in live forensic analysis of computer systems. FireWire offers an attractive way to acquire RAM content of Apple Mac computers equipped with a FireWire connection. However, the existing techniques for doing so require substantial knowledge of the target computer configuration and cannot be used reliably on a previously unknown computer in a crime scene. This paper proposes a novel method for acquiring RAM content of Apple Mac computers over FireWire, which automatically discovers necessary information about the target computer and can be used in the crime scene setting. As an application of the developed method, the techniques for recovery of AOL Instant Messenger (AIM) conversation fragments from RAM dumps are also discussed in this paper.
The security of patient identifiable information in doctors' homes.
McLean, Iain; Anderson, C Mary
2004-08-01
Ethically and legally doctors bear a responsibility to ensure the security of patient identifiable information in their possession. Many doctors, especially those in forensic medicine, hold paper or computerised medical records at home. This survey was conducted to assess the level of security for these records and awareness of the issues. Fifty-six forensic physicians (30 male, 26 female) answered a questionnaire. Eighty-nine percent used a computer to write patient notes and reports, but only 26 of these were on the Data Protection Register, and only 24 password-protected their files. Few doctors took steps to protect data on old computers they had stopped using. Of those responding, 88% held paper records at home but only of these had lockable filing cabinets. Burglar alarms were fitted in 77% of homes, yet 36% of homes had been burgled. No participants had written instructions for disposal of records and reports after their death. Older participants were more likely to have been burgled, yet less likely to have antiviral software than their younger counterparts. Participants expressed the need for information, education and training in data security.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-24
... Music and Data Processing Devices, Computers, and Components Thereof; Notice of Receipt of Complaint... complaint entitled Wireless Communication Devices, Portable Music and Data Processing Devices, Computers..., portable music and data processing devices, computers, and components thereof. The complaint names as...
U.S. and Russian Collaboration in the Area of Nuclear Forensics
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kristo, M J
2007-10-22
Nuclear forensics has become increasingly important in the fight against illicit trafficking in nuclear and other radioactive materials. The illicit trafficking of nuclear materials is, of course, an international problem; nuclear materials may be mined and milled in one country, manufactured in a second country, diverted at a third location, and detected at a fourth. There have been a number of articles in public policy journals in the past year that call for greater interaction between the U. S. and the rest of the world on the topic of nuclear forensics. Some believe that such international cooperation would help providemore » a more certain capability to identify the source of the nuclear material used in a terrorist event. An improved international nuclear forensics capability would also be important as part of the IAEA verification toolkit, particularly linked to increased access provided by the additional protocol. A recent study has found that, although international progress has been made in securing weapons-usable HEU and Pu, the effort is still insufficient. They found that nuclear material, located in 40 countries, could be obtained by terrorists and criminals and used for a crude nuclear weapon. Through 2006, the IAEA Illicit Trafficking Database had recorded a total of 607 confirmed events involving illegal possession, theft, or loss of nuclear and other radioactive materials. Although it is difficult to predict the future course of such illicit trafficking, increasingly such activities are viewed as significant threats that merit the development of special capabilities. As early as April, 1996, nuclear forensics was recognized at the G-8 Summit in Moscow as an important element of an illicit nuclear trafficking program. Given international events over the past several years, the value and need for nuclear forensics seems greater than ever. Determining how and where legitimate control of nuclear material was lost and tracing the route of the material from diversion through interdiction are important goals for nuclear forensics and attribution. It is equally important to determine whether additional devices or materials that pose a threat to public safety are also available. Finding the answer to these questions depends on determining the source of the material and its method of production. Nuclear forensics analysis and interpretation provide essential insights into methods of production and sources of illicit radioactive materials. However, they are most powerful when combined with other sources of information, including intelligence and traditional detective work. The certainty of detection and punishment for those who remove nuclear materials from legitimate control provides the ultimate deterrent for such diversion and, ultimately, for the intended goal of such diversion, including nuclear terrorism or proliferation. Consequently, nuclear forensics is an integral part of 'nuclear deterrence' in the 21st century. Nuclear forensics will always be limited by the diagnostic information inherent in the interdicted material. Important markers for traditional forensics (fingerprints, stray material, etc.) can be eliminated or obscured, but many nuclear materials have inherent isotopic or chemical characteristics that serve as unequivocal markers of specific sources, production processes, or transit routes. The information needed for nuclear forensics goes beyond that collected for most commercial and international verification activities. Fortunately, the international nuclear engineering enterprise has a restricted number of conspicuous process steps that makes the interpretation process easier. Ultimately, though, it will always be difficult to distinguish between materials that reflect similar source or production histories, but are derived from disparate sites. Due to the significant capital costs of the equipment and the specialized expertise of the personnel, work in the field of nuclear forensics has been restricted so far to a handful of national and international laboratories. There are a limited number of specialists who have experience working with interdicted nuclear materials and affiliated evidence. Therefore, a knowledge management system that utilizes information resources relevant to nuclear forensic and attribution signatures, processes, origins, and pathways, allowing subject matter experts to access the right information in order to interpret forensics data and draw appropriate conclusions, is essential. In order to determine the origin, point of diversion of the nuclear material, and those responsible for the unauthorized transfer, close relationships are required between governments who maintain inventories and data of fissile or other radioactive materials. Numerous databases exist in many countries and organizations that could be valuable for the future development and application of nuclear forensics.« less
Biwasaka, Hitoshi; Saigusa, Kiyoshi; Aoki, Yasuhiro
2005-03-01
In this study, the applicability of holography in the 3-dimensional recording of forensic objects such as skulls and mandibulae, and the accuracy of the reconstructed 3-D images, were examined. The virtual holographic image, which records the 3-dimensional data of the original object, is visually observed on the other side of the holographic plate, and reproduces the 3-dimensional shape of the object well. Another type of holographic image, the real image, is focused on a frosted glass screen, and cross-sectional images of the object can be observed. When measuring the distances between anatomical reference points using an image-processing software, the average deviations in the holographic images as compared to the actual objects were less than 0.1 mm. Therefore, holography could be useful as a 3-dimensional recording method of forensic objects. Two superimposition systems using holographic images were examined. In the 2D-3D system, the transparent virtual holographic image of an object is directly superimposed onto the digitized photograph of the same object on the LCD monitor. On the other hand, in the video system, the holographic image captured by the CCD camera is superimposed onto the digitized photographic image using a personal computer. We found that the discrepancy between the outlines of the superimposed holographic and photographic dental images using the video system was smaller than that using the 2D-3D system. Holography seemed to perform comparably to the computer graphic system; however, a fusion with the digital technique would expand the utility of holography in superimposition.
Teaching forensic pathology to undergraduates at Zhongshan School of Medicine.
Zhou, Nan; Wu, Qiu-Ping; Su, Terry; Zhao, Qian-Hao; Yin, Kun; Zheng, Da; Zheng, Jing-Jing; Huang, Lei; Cheng, Jian-Ding
2018-04-01
Producing qualified forensic pathological practitioners is a common difficulty around the world. In China, forensic pathology is one of the required major subspecialties for undergraduates majoring in forensic medicine, in contrast to forensic education in Western countries where forensic pathology is often optional. The enduring predicament is that the professional qualities and abilities of forensic students from different institutions vary due to the lack of an efficient forensic pedagogical model. The purpose of this article is to describe the new pedagogical model of forensic pathology at Zhongshan School of Medicine, Sun Yat-sen University, which is characterised by: (a) imparting a broad view of forensic pathology and basic knowledge of duties and tasks in future careers to students; (b) educating students in primary skills on legal and medical issues, as well as advanced forensic pathological techniques; (c) providing students with resources to broaden their professional minds, and opportunities to improve their professional qualities and abilities; and (d) mentoring students on occupational preparation and further forensic education. In the past few years, this model has resulted in numerous notable forensic students accomplishing achievements in forensic practice and forensic scientific research. We therefore expect this pedagogical model to establish the foundation for forensic pathological education and other subspecialties of forensic medicine in China and abroad.
Flach, Patricia M; Ross, Steffen G; Bolliger, Stephan A; Preiss, Ulrich S; Thali, Michael J; Spendlove, Danny
2010-01-01
In addition to the increasingly significant role of multislice computed tomography in forensic pathology, the performance of whole-body computed tomography angiography provides outstanding results. In this case, we were able to detect multiple injuries of the parenchymal organs in the upper abdomen as well as lesions of the brain parenchyma and vasculature of the neck. The radiologic findings showed complete concordance with the autopsy and even supplemented the autopsy findings in areas that are difficult to access via a manual dissection (such as the vasculature of the neck). This case shows how minimally invasive computed tomography angiography can serve as an invaluable adjunct to the classic autopsy procedure.
Cadle, Brian A; Rasmus, Kristin C; Varela, Juan A; Leverich, Leah S; O'Neill, Casey E; Bachtell, Ryan K; Cooper, Donald C
2010-01-01
Here we describe the first report of using low-cost cellular or web-based digital cameras to image and quantify standardized rapid immunoassay strips as a new point-of-care diagnostic and forensics tool with health applications. Quantitative ratiometric pixel density analysis (QRPDA) is an automated method requiring end-users to utilize inexpensive (∼ $1 USD/each) immunotest strips, a commonly available web or mobile phone camera or scanner, and internet or cellular service. A model is described whereby a central computer server and freely available IMAGEJ image analysis software records and analyzes the incoming image data with time-stamp and geo-tag information and performs the QRPDA using custom JAVA based macros (http://www.neurocloud.org). To demonstrate QRPDA we developed a standardized method using rapid immunotest strips directed against cocaine and its major metabolite, benzoylecgonine. Images from standardized samples were acquired using several devices, including a mobile phone camera, web cam, and scanner. We performed image analysis of three brands of commercially available dye-conjugated anti-cocaine/benzoylecgonine (COC/BE) antibody test strips in response to three different series of cocaine concentrations ranging from 0.1 to 300 ng/ml and BE concentrations ranging from 0.003 to 0.1 ng/ml. This data was then used to create standard curves to allow quantification of COC/BE in biological samples. Across all devices, QRPDA quantification of COC and BE proved to be a sensitive, economical, and faster alternative to more costly methods, such as gas chromatography-mass spectrometry, tandem mass spectrometry, or high pressure liquid chromatography. The limit of detection was determined to be between 0.1 and 5 ng/ml. To simulate conditions in the field, QRPDA was found to be robust under a variety of image acquisition and testing conditions that varied temperature, lighting, resolution, magnification and concentrations of biological fluid in a sample. To determine the effectiveness of the QRPDA method for quantifying cocaine in biological samples, mice were injected with a sub-locomotor activating dose of cocaine (5 mg/kg; i.p.) and were found to have detectable levels of COC/BE in their urine (160.6 ng/ml) and blood plasma (8.1 ng/ml) after 15-30 minutes. By comparison rats self-administering cocaine in a 4 hour session obtained a final BE blood plasma level of 910 ng/ml with an average of 62.5 infusions. It is concluded that automated QRPDA is a low-cost, rapid and highly sensitive method for the detection of COC/BE with health, forensics, and bioinformatics application and the potential to be used with other rapid immunotest strips directed at several other targets. Thus, this report serves as a general reference and method describing the use of image analysis of lateral flow rapid test strips.
Inokuchi, Go; Yajima, Daisuke; Hayakawa, Mutsumi; Motomura, Ayumi; Chiba, Fumiko; Torimitsu, Suguru; Makino, Yohsuke; Iwase, Hirotaro
2013-12-01
Historically, coronary angiography of the isolated heart has played an important role in the detection of stenotic or occlusive lesions that are difficult to identify by autopsy alone. Meanwhile, although the application of multidetector computed tomography (MDCT) to forensic fields has accelerated recently, isolated single organ angiography with MDCT is rarely performed. In this article, we present an evaluation of postmortem selective coronary CT angiography of the isolated heart with MDCT and discuss its utility for autopsy. First, in a preliminary experiment using pig coronary artery, we examined the behavior of water soluble contrast material on postmortem computed tomography angiography (PMCTA) and found that better angiographic images were acquired when the viscosity of the contrast material was increased and CT was performed under conditions of sustained perfusion. Based on these results, we devised a selective coronary angiography procedure using a pressurized bag for drip infusion that can be performed easily, quickly, and at low cost. The angiographic images obtained provided useful supportive evidence of autopsy findings suggestive of ischemic heart disease. With active discussions underway in forensic fields on the proper use of postmortem computed tomography, PMCTA has also naturally attracted attention as it compensates for some of the shortcomings of CT alone. Although PMCTA typically involves whole-body angiography, if we view PMCTA as one of the many useful and supplementary tools available for autopsy, then isolated heart angiography continues to have utility in autopsy today.
On the added value of forensic science and grand innovation challenges for the forensic community.
van Asten, Arian C
2014-03-01
In this paper the insights and results are presented of a long term and ongoing improvement effort within the Netherlands Forensic Institute (NFI) to establish a valuable innovation programme. From the overall perspective of the role and use of forensic science in the criminal justice system, the concepts of Forensic Information Value Added (FIVA) and Forensic Information Value Efficiency (FIVE) are introduced. From these concepts the key factors determining the added value of forensic investigations are discussed; Evidential Value, Relevance, Quality, Speed and Cost. By unravelling the added value of forensic science and combining this with the future needs and scientific and technological developments, six forensic grand challenges are introduced: i) Molecular Photo-fitting; ii) chemical imaging, profiling and age estimation of finger marks; iii) Advancing Forensic Medicine; iv) Objective Forensic Evaluation; v) the Digital Forensic Service Centre and vi) Real time In-Situ Chemical Identification. Finally, models for forensic innovation are presented that could lead to major international breakthroughs on all these six themes within a five year time span. This could cause a step change in the added value of forensic science and would make forensic investigative methods even more valuable than they already are today. © 2013. Published by Elsevier Ireland Ltd on behalf of Forensic Science Society. All rights reserved.
Remote Wiping and Secure Deletion on Mobile Devices: A Review.
Leom, Ming Di; Choo, Kim-Kwang Raymond; Hunt, Ray
2016-11-01
Mobile devices have become ubiquitous in almost every sector of both private and commercial endeavors. As a result of such widespread use in everyday life, many users knowingly and unknowingly save significant amounts of personal and/or commercial data on these mobile devices. Thus, loss of mobile devices through accident or theft can expose users-and their businesses-to significant personal and corporate cost. To mitigate this data leakage issue, remote wiping features have been introduced to modern mobile devices. Given the destructive nature of such a feature, however, it may be subject to criminal exploitation (e.g., a criminal exploiting one or more vulnerabilities to issue a remote wiping command to the victim's device). To obtain a better understanding of remote wiping, we survey the literature, focusing on existing approaches to secure flash storage deletion and provide a critical analysis and comparison of a variety of published research in this area. In support of our analysis, we further provide prototype experimental results for three Android devices, thus providing both a theoretical and applied focus to this article as well as providing directions for further research. © 2016 American Academy of Forensic Sciences.
Cognitive neuroscience in forensic science: understanding and utilizing the human element
Dror, Itiel E.
2015-01-01
The human element plays a critical role in forensic science. It is not limited only to issues relating to forensic decision-making, such as bias, but also relates to most aspects of forensic work (some of which even take place before a crime is ever committed or long after the verification of the forensic conclusion). In this paper, I explicate many aspects of forensic work that involve the human element and therefore show the relevance (and potential contribution) of cognitive neuroscience to forensic science. The 10 aspects covered in this paper are proactive forensic science, selection during recruitment, training, crime scene investigation, forensic decision-making, verification and conflict resolution, reporting, the role of the forensic examiner, presentation in court and judicial decisions. As the forensic community is taking on the challenges introduced by the realization that the human element is critical for forensic work, new opportunities emerge that allow for considerable improvement and enhancement of the forensic science endeavour. PMID:26101281
Cognitive neuroscience in forensic science: understanding and utilizing the human element.
Dror, Itiel E
2015-08-05
The human element plays a critical role in forensic science. It is not limited only to issues relating to forensic decision-making, such as bias, but also relates to most aspects of forensic work (some of which even take place before a crime is ever committed or long after the verification of the forensic conclusion). In this paper, I explicate many aspects of forensic work that involve the human element and therefore show the relevance (and potential contribution) of cognitive neuroscience to forensic science. The 10 aspects covered in this paper are proactive forensic science, selection during recruitment, training, crime scene investigation, forensic decision-making, verification and conflict resolution, reporting, the role of the forensic examiner, presentation in court and judicial decisions. As the forensic community is taking on the challenges introduced by the realization that the human element is critical for forensic work, new opportunities emerge that allow for considerable improvement and enhancement of the forensic science endeavour. © 2015 The Author(s) Published by the Royal Society. All rights reserved.
Computer Access. Tech Use Guide: Using Computer Technology.
ERIC Educational Resources Information Center
Council for Exceptional Children, Reston, VA. Center for Special Education Technology.
One of nine brief guides for special educators on using computer technology, this guide focuses on access including adaptations in input devices, output devices, and computer interfaces. Low technology devices include "no-technology" devices (usually modifications to existing devices), simple switches, and multiple switches. High technology input…
Benchmarking contactless acquisition sensor reproducibility for latent fingerprint trace evidence
NASA Astrophysics Data System (ADS)
Hildebrandt, Mario; Dittmann, Jana
2015-03-01
Optical, nano-meter range, contactless, non-destructive sensor devices are promising acquisition techniques in crime scene trace forensics, e.g. for digitizing latent fingerprint traces. Before new approaches are introduced in crime investigations, innovations need to be positively tested and quality ensured. In this paper we investigate sensor reproducibility by studying different scans from four sensors: two chromatic white light sensors (CWL600/CWL1mm), one confocal laser scanning microscope, and one NIR/VIS/UV reflection spectrometer. Firstly, we perform an intra-sensor reproducibility testing for CWL600 with a privacy conform test set of artificial-sweat printed, computer generated fingerprints. We use 24 different fingerprint patterns as original samples (printing samples/templates) for printing with artificial sweat (physical trace samples) and their acquisition with contactless sensory resulting in 96 sensor images, called scan or acquired samples. The second test set for inter-sensor reproducibility assessment consists of the first three patterns from the first test set, acquired in two consecutive scans using each device. We suggest using a simple feature space set in spatial and frequency domain known from signal processing and test its suitability for six different classifiers classifying scan data into small differences (reproducible) and large differences (non-reproducible). Furthermore, we suggest comparing the classification results with biometric verification scores (calculated with NBIS, with threshold of 40) as biometric reproducibility score. The Bagging classifier is nearly for all cases the most reliable classifier in our experiments and the results are also confirmed with the biometric matching rates.
Forensic archaeology and anthropology : An Australian perspective.
Oakley, Kate
2005-09-01
Forensic archaeology is an extremely powerful investigative discipline and, in combination with forensic anthropology, can provide a wealth of evidentiary information to police investigators and the forensic community. The re-emergence of forensic archaeology and anthropology within Australia relies on its diversification and cooperation with established forensic medical organizations, law enforcement forensic service divisions, and national forensic boards. This presents a unique opportunity to develop a new multidisciplinary approach to forensic archaeology/anthropology within Australia as we hold a unique set of environmental, social, and cultural conditions that diverge from overseas models and require different methodological approaches. In the current world political climate, more forensic techniques are being applied at scenes of mass disasters, genocide, and terrorism. This provides Australian forensic archaeology/anthropology with a unique opportunity to develop multidisciplinary models with contributions from psychological profiling, ballistics, sociopolitics, cultural anthropology, mortuary technicians, post-blast analysis, fire analysis, and other disciplines from the world of forensic science.
Biennial Conference on Chemical Education, Abstracts (11th, Atlanta, Georgia, August 5-9, 1990).
ERIC Educational Resources Information Center
Mellon, E. K.; Pulliam, E. J.
This publication includes more than 470 abstracts of papers scheduled to be presented at a chemical education conference. Topics of the papers include: (1) human impact on the environment; (2) technology; (3) forensic science; (4) paper chemistry; (5) computer interfacing, software, videodisc and graphics; (6) faculty enhancement programs; (7)…
Nuclear Forensics and Radiochemistry: Cross Sections
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rundberg, Robert S.
The neutron activation of components in a nuclear device can provide useful signatures of weapon design or sophistication. This lecture will cover some of the basics of neutron reaction cross sections. Nuclear reactor cross sections will also be presented to illustrate the complexity of convolving neutron energy spectra with nuclear excitation functions to calculate useful effective reactor cross sections. Deficiencies in the nuclear database will be discussed along with tools available at Los Alamos to provide new neutron cross section data.
Residual Network Data Structures in Android Devices
2011-09-01
Apple’s iOS, Google’s Android, RIM’s Blackberry and Nokia’s Symbian. Each Smartphone presents unique characteristics for forensic examiners. In...another. • Home Agent: A router on mobile node’s home network that tunnels traffic to mobile node when not on home network. Also maintains mobile nodes...Address notification to the Home Agent. When traffic arrives at the Home Agent for the mobile node, the Home Agent tunnels the traffic to the Care-of
Scherer, James R; Liu, Peng; Mathies, Richard A
2010-11-01
We have developed a compact, laser-induced fluorescence detection scanner, the multichannel capillary array electrophoresis portable scanner (McCAEPs) as a platform for electrophoretic detection and control of high-throughput, integrated microfluidic devices for genetic and other analyses. The instrument contains a confocal optical system with a rotary objective for detecting four different fluorescence signals, a pneumatic system consisting of two pressure/vacuum pumps and 28 individual addressable solenoid valves for control of on-chip microvalves and micropumps, four Polymerase Chain Reaction (PCR) temperature control systems, and four high voltage power supplies for electrophoresis. The detection limit of the instrument is ~20 pM for on-chip capillary electrophoresis of fluorescein dyes. To demonstrate the system performance for forensic short tandem repeat (STR) analysis, two experiments were conducted: (i) electrophoretic separation and detection of STR samples on a 96-lane microfabricated capillary array electrophoresis microchip. Fully resolved PowerPlex(®) 16 STR profiles amplified from 1 ng of 9947A female standard DNA were successfully obtained; (ii) nine-plex STR amplification, sample injection, separation, and fluorescence detection of 100-copy 9948 male standard DNA in a single integrated PCR- capillary electrophoresis microchip. These results demonstrate that the McCAEPs can be used as a versatile control and detection instrument that operates integrated microfluidic devices for high-performance forensic human identification.
NASA Astrophysics Data System (ADS)
Scherer, James R.; Liu, Peng; Mathies, Richard A.
2010-11-01
We have developed a compact, laser-induced fluorescence detection scanner, the multichannel capillary array electrophoresis portable scanner (McCAEPs) as a platform for electrophoretic detection and control of high-throughput, integrated microfluidic devices for genetic and other analyses. The instrument contains a confocal optical system with a rotary objective for detecting four different fluorescence signals, a pneumatic system consisting of two pressure/vacuum pumps and 28 individual addressable solenoid valves for control of on-chip microvalves and micropumps, four Polymerase Chain Reaction (PCR) temperature control systems, and four high voltage power supplies for electrophoresis. The detection limit of the instrument is ˜20 pM for on-chip capillary electrophoresis of fluorescein dyes. To demonstrate the system performance for forensic short tandem repeat (STR) analysis, two experiments were conducted: (i) electrophoretic separation and detection of STR samples on a 96-lane microfabricated capillary array electrophoresis microchip. Fully resolved PowerPlex® 16 STR profiles amplified from 1 ng of 9947A female standard DNA were successfully obtained; (ii) nine-plex STR amplification, sample injection, separation, and fluorescence detection of 100-copy 9948 male standard DNA in a single integrated PCR- capillary electrophoresis microchip. These results demonstrate that the McCAEPs can be used as a versatile control and detection instrument that operates integrated microfluidic devices for high-performance forensic human identification.
21 CFR 868.1730 - Oxygen uptake computer.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Oxygen uptake computer. 868.1730 Section 868.1730...) MEDICAL DEVICES ANESTHESIOLOGY DEVICES Diagnostic Devices § 868.1730 Oxygen uptake computer. (a) Identification. An oxygen uptake computer is a device intended to compute the amount of oxygen consumed by a...
21 CFR 868.1730 - Oxygen uptake computer.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 21 Food and Drugs 8 2011-04-01 2011-04-01 false Oxygen uptake computer. 868.1730 Section 868.1730...) MEDICAL DEVICES ANESTHESIOLOGY DEVICES Diagnostic Devices § 868.1730 Oxygen uptake computer. (a) Identification. An oxygen uptake computer is a device intended to compute the amount of oxygen consumed by a...
21 CFR 868.1730 - Oxygen uptake computer.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 21 Food and Drugs 8 2014-04-01 2014-04-01 false Oxygen uptake computer. 868.1730 Section 868.1730...) MEDICAL DEVICES ANESTHESIOLOGY DEVICES Diagnostic Devices § 868.1730 Oxygen uptake computer. (a) Identification. An oxygen uptake computer is a device intended to compute the amount of oxygen consumed by a...
21 CFR 868.1730 - Oxygen uptake computer.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 21 Food and Drugs 8 2013-04-01 2013-04-01 false Oxygen uptake computer. 868.1730 Section 868.1730...) MEDICAL DEVICES ANESTHESIOLOGY DEVICES Diagnostic Devices § 868.1730 Oxygen uptake computer. (a) Identification. An oxygen uptake computer is a device intended to compute the amount of oxygen consumed by a...
21 CFR 868.1730 - Oxygen uptake computer.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 21 Food and Drugs 8 2012-04-01 2012-04-01 false Oxygen uptake computer. 868.1730 Section 868.1730...) MEDICAL DEVICES ANESTHESIOLOGY DEVICES Diagnostic Devices § 868.1730 Oxygen uptake computer. (a) Identification. An oxygen uptake computer is a device intended to compute the amount of oxygen consumed by a...
Practice of clinical forensic medicine in Sri Lanka: does it need a new era?
Kodikara, Sarathchandra
2012-07-01
Clinical forensic medicine is a sub-specialty of forensic medicine and is intimately associated with the justice system of a country. Practice of clinical forensic medicine is evolving, but deviates from one jurisdiction to another. Most English-speaking countries practice clinical forensic medicine and forensic pathology separately while most non-English-speaking countries practice forensic medicine which includes clinical forensic medicine and forensic pathology. Unlike the practice of forensic pathology, several countries have informal arrangements to deal with forensic patients and there are no international standards of practice or training in this discipline. Besides, this is rarely a topic of discussion. In the adversarial justice system in Sri Lanka, the designated Government Medical Officers practice both clinical forensic medicine and forensic pathology. Practice of clinical forensic medicine, and its teaching and training in Sri Lanka depicts unique features. However, this system has not undergone a significant revision for many decades. In this communication, the existing legal framework, current procedure of practice, examination for drunkenness, investigations, structure of referrals, reports, subsequent legal procedures, undergraduate, in-service, and postgraduate training are discussed with suggestions for reforms. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-02
... INTERNATIONAL TRADE COMMISSION [Inv. No. 337-TA-841] Certain Computers and Computer Peripheral... after importation of certain computers and computer peripheral devices and components thereof and... computers and computer peripheral devices and components thereof and products containing the same that...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-26
... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-745] Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers and Components Thereof; Commission Decision... importation of certain wireless communication devices, portable music and data processing devices, computers...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-25
... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-745] Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers and Components Thereof; Commission Decision... importation of certain wireless communication devices, portable music and data processing devices, computers...
Characteristics of Bone Injuries Resulting from Knife Wounds Incised with Different Forces.
Humphrey, Caitlin; Kumaratilake, Jaliya; Henneberg, Maciej
2017-11-01
The aim of this research was to experimentally determine the characteristics of incised bone wounds, which are commonly found in defense injuries. A specially constructed pivoting arm device was used to inflict wounds with controlled forces and direction. Five knives were selected to inflict the wounds on porcine forelimbs. Eight incised wounds were made per knife per force. A larger knife and a greater force caused longer and wider bone wounds. Comparisons of individual knives at the two forces produced varying results in the bone wounds. A correlation was seen between the force and the length (r = 0.69), width (r = 0.63), and depth (r = 0.57) of bone wounds. Serrated-edge and nonserrated knives can be distinguished from the appearance of the wound. The outcomes may be applicable in forensic investigations to ascertain the forces associated with incised wounds and identify the specific knife used. © 2017 American Academy of Forensic Sciences.
Van Neste, Christophe; Van Criekinge, Wim; Deforce, Dieter; Van Nieuwerburgh, Filip
2016-01-01
It is difficult to predict if and when massively parallel sequencing of forensic STR loci will replace capillary electrophoresis as the new standard technology in forensic genetics. The main benefits of sequencing are increased multiplexing scales and SNP detection. There is not yet a consensus on how sequenced profiles should be reported. We present the Forensic Loci Allele Database (FLAD) service, made freely available on http://forensic.ugent.be/FLAD/. It offers permanent identifiers for sequenced forensic alleles (STR or SNP) and their microvariants for use in forensic allele nomenclature. Analogous to Genbank, its aim is to provide permanent identifiers for forensically relevant allele sequences. Researchers that are developing forensic sequencing kits or are performing population studies, can register on http://forensic.ugent.be/FLAD/ and add loci and allele sequences with a short and simple application interface (API). Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.
Vanhaebost, Jessica; Ducrot, Kewin; de Froidmont, Sébastien; Scarpelli, Maria Pia; Egger, Coraline; Baumann, Pia; Schmit, Gregory; Grabherr, Silke; Palmiere, Cristian
2017-02-01
The aim of this study was to assess whether the identification of pathological myocardial enhancement at multiphase postmortem computed tomography angiography was correlated with increased levels of troponin T and I in postmortem serum from femoral blood as well as morphological findings of myocardial ischemia. We further aimed to investigate whether autopsy cases characterized by increased troponin T and I concentrations as well as morphological findings of myocardial ischemia were also characterized by pathological myocardial enhancement at multiphase postmortem computed tomography angiography. Two different approaches were used. In one, 40 forensic autopsy cases that had pathological enhancement of the myocardium (mean Hounsfield units ≥95) observed at postmortem angiography were retrospectively selected. In the second approach, 40 forensic autopsy cases that had a cause of death attributed to acute myocardial ischemia were retrospectively selected. The preliminary results seem to indicate that the identification of a pathological enhancement of the myocardium at postmortem angiography is associated with the presence of increased levels of cardiac troponins in postmortem serum and morphological findings of ischemia. Analogously, a pathological enhancement of the myocardium at postmortem angiography can be retrospectively found in the great majority of autopsy cases characterized by increased cardiac troponin levels in postmortem serum and morphological findings of myocardial ischemia. Multiphase postmortem computed tomography angiography is a useful tool in the postmortem setting for investigating ischemically damaged myocardium.
Shaheen, E; Mowafy, B; Politis, C; Jacobs, R
2017-12-01
Previous research proposed the use of the mandibular midline neurovascular canal structures as a forensic finger print. In their observer study, an average correct identification of 95% was reached which triggered this study. To present a semi-automatic computer recognition approach to replace the observers and to validate the accuracy of this newly proposed method. Imaging data from Computer Tomography (CT) and Cone Beam Computer Tomography (CBCT) of mandibles scanned at two different moments were collected to simulate an AM and PM situation where the first scan presented AM and the second scan was used to simulate PM. Ten cases with 20 scans were used to build a classifier which relies on voxel based matching and results with classification into one of two groups: "Unmatched" and "Matched". This protocol was then tested using five other scans out of the database. Unpaired t-testing was applied and accuracy of the computerized approach was determined. A significant difference was found between the "Unmatched" and "Matched" classes with means of 0.41 and 0.86 respectively. Furthermore, the testing phase showed an accuracy of 100%. The validation of this method pushes this protocol further to a fully automatic identification procedure for victim identification based on the mandibular midline canals structures only in cases with available AM and PM CBCT/CT data.
Guyomarc'h, Pierre; Bruzek, Jaroslav
2011-05-20
Identification in forensic anthropology and the definition of a biological profile in bioarchaeology are essential to each of those fields and use the same methodologies. Sex, age, stature and ancestry can be conclusive or dispensable, depending on the field. The Fordisc(®) 3.0 computer program was developed to aid in the identification of the sex, stature and ancestry of skeletal remains by exploiting the Forensic Data Bank (FDB) and computing discriminant function analyses (DFAs). Although widely used, this tool has been recently criticised, principally when used to determine ancestry. Two sub-samples of individuals of known sex were drawn from French (n=50) and Thai (n=91) osteological collections and used to assess the reliability of sex determination using Fordisc(®) 3.0 with 12 cranial measurements. Comparisons were made using the whole FDB as well as using select groups, taking into account the posterior and typicality probabilities. The results of Fordisc(®) 3.0 vary between 52.2% and 77.8% depending on the options and groups selected. Tests of published discriminant functions and the computation of specific DFA were performed in order to discuss the applicability of this software and, overall, to question the pertinence of the use of DFA and linear distances in sex determination, in light of the huge cranial morphological variability. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-30
... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-745] Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers and Components Thereof; Notice of... communication devices, portable music and data processing devices, computers and components thereof by reason of...
[The characteristics of computer simulation of traffic accidents].
Zou, Dong-Hua; Liu, Ning-Guo; Chen, Jian-Guo; Jin, Xian-Long; Zhang, Xiao-Yun; Zhang, Jian-Hua; Chen, Yi-Jiu
2008-12-01
To reconstruct the collision process of traffic accident and the injury mode of the victim by computer simulation technology in forensic assessment of traffic accident. Forty actual accidents were reconstructed by stimulation software and high performance computer based on analysis of the trace evidences at the scene, damage of the vehicles and injury of the victims, with 2 cases discussed in details. The reconstruction correlated very well in 28 cases, well in 9 cases, and suboptimal in 3 cases with the above parameters. Accurate reconstruction of the accident would be helpful for assessment of the injury mechanism of the victims. Reconstruction of the collision process of traffic accident and the injury mechanism of the victim by computer simulation is useful in traffic accident assessment.
[The application of radiological image in forensic medicine].
Zhang, Ji-Zong; Che, Hong-Min; Xu, Li-Xiang
2006-04-01
Personal identification is an important work in forensic investigation included sex discrimination, age and stature estimation. Human identification depended on radiological image technique analysis is a practice and proper method in forensic science field. This paper intended to understand the advantage and defect by reviewed the employing of forensic radiology in forensic science field broadly and provide a reference to perfect the application of forensic radiology in forensic science field.
Transitioning from Forensic Genetics to Forensic Genomics
Kayser, Manfred
2017-01-01
Due to its support of law enforcement, forensics is a conservative field; nevertheless, driven by scientific and technological progress, forensic genetics is slowly transitioning into forensic genomics. With this Special Issue of Genes we acknowledge and appreciate this rather recent development by not only introducing the field of forensics to the wider community of geneticists, but we do so by emphasizing on different topics of forensic relevance where genomic, transcriptomic, and epigenomic principles, methods, and datasets of humans and beyond are beginning to be used to answer forensic questions. PMID:29271907
21 CFR 870.1425 - Programmable diagnostic computer.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 21 Food and Drugs 8 2013-04-01 2013-04-01 false Programmable diagnostic computer. 870.1425 Section... (CONTINUED) MEDICAL DEVICES CARDIOVASCULAR DEVICES Cardiovascular Diagnostic Devices § 870.1425 Programmable diagnostic computer. (a) Identification. A programmable diagnostic computer is a device that can be...
21 CFR 870.1425 - Programmable diagnostic computer.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 21 Food and Drugs 8 2012-04-01 2012-04-01 false Programmable diagnostic computer. 870.1425 Section... (CONTINUED) MEDICAL DEVICES CARDIOVASCULAR DEVICES Cardiovascular Diagnostic Devices § 870.1425 Programmable diagnostic computer. (a) Identification. A programmable diagnostic computer is a device that can be...
21 CFR 870.1425 - Programmable diagnostic computer.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 21 Food and Drugs 8 2014-04-01 2014-04-01 false Programmable diagnostic computer. 870.1425 Section... (CONTINUED) MEDICAL DEVICES CARDIOVASCULAR DEVICES Cardiovascular Diagnostic Devices § 870.1425 Programmable diagnostic computer. (a) Identification. A programmable diagnostic computer is a device that can be...
21 CFR 870.1425 - Programmable diagnostic computer.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Programmable diagnostic computer. 870.1425 Section... (CONTINUED) MEDICAL DEVICES CARDIOVASCULAR DEVICES Cardiovascular Diagnostic Devices § 870.1425 Programmable diagnostic computer. (a) Identification. A programmable diagnostic computer is a device that can be...
21 CFR 870.1425 - Programmable diagnostic computer.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 21 Food and Drugs 8 2011-04-01 2011-04-01 false Programmable diagnostic computer. 870.1425 Section... (CONTINUED) MEDICAL DEVICES CARDIOVASCULAR DEVICES Cardiovascular Diagnostic Devices § 870.1425 Programmable diagnostic computer. (a) Identification. A programmable diagnostic computer is a device that can be...
Statistical fingerprinting for malware detection and classification
Prowell, Stacy J.; Rathgeb, Christopher T.
2015-09-15
A system detects malware in a computing architecture with an unknown pedigree. The system includes a first computing device having a known pedigree and operating free of malware. The first computing device executes a series of instrumented functions that, when executed, provide a statistical baseline that is representative of the time it takes the software application to run on a computing device having a known pedigree. A second computing device executes a second series of instrumented functions that, when executed, provides an actual time that is representative of the time the known software application runs on the second computing device. The system detects malware when there is a difference in execution times between the first and the second computing devices.
Makarov, I Yu; Svetlakov, A V; Sotin, A V; Shigeev, S V; Gusarov, A A; Smirenin, S A; Emelin, V V; Stragis, V B; Fetisov, V A
2018-01-01
To-day, the computer-assisted 3D-technologies for the mathematical simulation of the engineering facilities are extensively used for the purpose of technical calculations in all branches of industry and building. The positive experience gained with the application of the 3D-models finds wide application in the joined investigations on the topical problems of the prosthetic and surgical treatment of bones, teeth, joints, cardiac valves, blood vessels, etc. The objective of the present study was the analysis of the positive experience with the involvement of the specialists in the design and practical application of 3D-models for the solution of problems facing the medical prosthetics and the management of various pathological conditions. Another objective was to discuss the possible prospects for the interdisciplinary collaboration in these fields with a view to improving the quality of expert conclusions in the framework of forensic medical and criminalistics examinations. The data readily available from the official domestic and foreign Internet resources were used for the purpose of the study. The analysis of the published data has demonstrated the obvious advantages of the application of the mathematical 3D-models and the biomechanical studies for the solution of the concrete medico-biological problems. The currently available positive experience gained due to the participation of domestic specialists in biomechanics in the solution of the specific clinical problems gives hope that their collaboration between themselves and with the forensic medical experts will open up the promising prospects for the further investigations of the issues of common interest.
Buck, Ursula; Naether, Silvio; Braun, Marcel; Bolliger, Stephan; Friederich, Hans; Jackowski, Christian; Aghayev, Emin; Christe, Andreas; Vock, Peter; Dirnhofer, Richard; Thali, Michael J
2007-07-20
The examination of traffic accidents is daily routine in forensic medicine. An important question in the analysis of the victims of traffic accidents, for example in collisions between motor vehicles and pedestrians or cyclists, is the situation of the impact. Apart from forensic medical examinations (external examination and autopsy), three-dimensional technologies and methods are gaining importance in forensic investigations. Besides the post-mortem multi-slice computed tomography (MSCT) and magnetic resonance imaging (MRI) for the documentation and analysis of internal findings, highly precise 3D surface scanning is employed for the documentation of the external body findings and of injury-inflicting instruments. The correlation of injuries of the body to the injury-inflicting object and the accident mechanism are of great importance. The applied methods include documentation of the external and internal body and the involved vehicles and inflicting tools as well as the analysis of the acquired data. The body surface and the accident vehicles with their damages were digitized by 3D surface scanning. For the internal findings of the body, post-mortem MSCT and MRI were used. The analysis included the processing of the obtained data to 3D models, determination of the driving direction of the vehicle, correlation of injuries to the vehicle damages, geometric determination of the impact situation and evaluation of further findings of the accident. In the following article, the benefits of the 3D documentation and computer-assisted, drawn-to-scale 3D comparisons of the relevant injuries with the damages to the vehicle in the analysis of the course of accidents, especially with regard to the impact situation, are shown on two examined cases.
Auffret, Mathieu; Garetier, Marc; Diallo, Idris; Aho, Serge; Ben Salem, Douraied
2016-12-01
Body identification is the cornerstone of forensic investigation. It can be performed using radiographic techniques, if antemortem images are available. This study was designed to assess the value of visual comparison of the computed tomography (CT) anatomical aspects of the sphenoid sinuses, in forensic individual identification, especially if antemortem dental records, fingerprints or DNA samples are not available. This retrospective work took place in a French university hospital. The supervisor of this study randomly selected from the picture archiving and communication system (PACS), 58 patients who underwent one (16 patients) or two (42 patients) head CT in various neurological contexts. To avoid bias, those studies were prepared (anonymized, and all the head structures but the sphenoid sinuses were excluded), and used to constitute two working lists of 50 (42+8) CT studies of the sphenoid sinuses. An anatomical classification system of the sphenoid sinuses anatomical variations was created based on the anatomical and surgical literature. In these two working lists, three blinded readers had to identify, using the anatomical system and subjective visual comparison, 42 pairs of matched studies, and 16 unmatched studies. Readers were blinded from the exact numbers of matching studies. Each reader correctly identified the 42 pairs of CT with a concordance of 100% [97.5% confidence interval: 91-100%], and the 16 unmatched CT with a concordance of 100% [97.5% confidence interval: 79-100%]. Overall accuracy was 100%. Our study shows that establishing the anatomical concordance of the sphenoid sinuses by visual comparison could be used in personal identification. This easy method, based on a frequently and increasingly prescribed exam, still needs to be assessed on a postmortem cohort. Copyright © 2016 Elsevier Masson SAS. All rights reserved.
Kloosterman, Ate; Mapes, Anna; Geradts, Zeno; van Eijk, Erwin; Koper, Carola; van den Berg, Jorrit; Verheij, Saskia; van der Steen, Marcel; van Asten, Arian
2015-01-01
In this paper, the importance of modern technology in forensic investigations is discussed. Recent technological developments are creating new possibilities to perform robust scientific measurements and studies outside the controlled laboratory environment. The benefits of real-time, on-site forensic investigations are manifold and such technology has the potential to strongly increase the speed and efficacy of the criminal justice system. However, such benefits are only realized when quality can be guaranteed at all times and findings can be used as forensic evidence in court. At the Netherlands Forensic Institute, innovation efforts are currently undertaken to develop integrated forensic platform solutions that allow for the forensic investigation of human biological traces, the chemical identification of illicit drugs and the study of large amounts of digital evidence. These platforms enable field investigations, yield robust and validated evidence and allow for forensic intelligence and targeted use of expert capacity at the forensic institutes. This technological revolution in forensic science could ultimately lead to a paradigm shift in which a new role of the forensic expert emerges as developer and custodian of integrated forensic platforms. PMID:26101289
Aromatario, Mariarosaria; Cappelletti, Simone; Bottoni, Edoardo; Fiore, Paola Antonella; Ciallella, Costantino
2016-01-01
An interesting case of homicide involving the use of a heavy glass ashtray is described. The victim, a 81-years-old woman, has survived for few days and died in hospital. The external examination of the victim showed extensive blunt and sharp facial injuries and defense injuries on both the hands. The autopsy examination showed numerous tears on the face, as well as multiple fractures of the facial bones. Computer tomography scan, with 3D reconstruction, performed in hospital before death, was used to identify the weapon used for the crime. In recent years new diagnostics tools such as computer tomography has been widely used, especially in cases involving sharp and blunt forces. Computer tomography has proven to be very valuable in analyzing fractures of the cranial teca for forensic purpose, in particular antemortem computer tomography with 3D reconstruction is becoming an important tool in the process of weapon identification, thanks to the possibility to identify and make comparison between the shape of the object used to commit the crime, the injury and the objects found during the investigations. No previous reports on the use of this technique, for the weapon identification process, in cases of isolated facial fractures were described. We report a case in which, despite the correct use of this technique, it was not possible for the forensic pathologist to identify the weapon used to commit the crime. Authors wants to highlight the limits encountered in the use of computer tomography with 3D reconstruction as a tool for weapon identification when facial fractures occurred. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.
An Automatic Image-Based Modelling Method Applied to Forensic Infography
Zancajo-Blazquez, Sandra; Gonzalez-Aguilera, Diego; Gonzalez-Jorge, Higinio; Hernandez-Lopez, David
2015-01-01
This paper presents a new method based on 3D reconstruction from images that demonstrates the utility and integration of close-range photogrammetry and computer vision as an efficient alternative to modelling complex objects and scenarios of forensic infography. The results obtained confirm the validity of the method compared to other existing alternatives as it guarantees the following: (i) flexibility, permitting work with any type of camera (calibrated and non-calibrated, smartphone or tablet) and image (visible, infrared, thermal, etc.); (ii) automation, allowing the reconstruction of three-dimensional scenarios in the absence of manual intervention, and (iii) high quality results, sometimes providing higher resolution than modern laser scanning systems. As a result, each ocular inspection of a crime scene with any camera performed by the scientific police can be transformed into a scaled 3d model. PMID:25793628
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-03
...] Guidances for Industry and Food and Drug Administration Staff: Computer-Assisted Detection Devices Applied... Clinical Performance Assessment: Considerations for Computer-Assisted Detection Devices Applied to... guidance, entitled ``Computer-Assisted Detection Devices Applied to Radiology Images and Radiology Device...
Preserving the Pedagogy: The Director of Forensics as an At-Risk Professional.
ERIC Educational Resources Information Center
Jensen, Scott
Today's collegiate forensic activities have changed in ways that pose profound challenges to directors of forensics. Six primary factors that contribute to the "at-riskness" of directors of forensics are: the changing face of today's forensic program forces difficult choices; the forensics community is seeing signs of a crisis in…
Passive TCP Reconstruction and Forensic Analysis with tcpflow
2013-09-01
Detection Evaluation [17]. 6 Future Work The original tcpflow was developed at a time when computers had relatively small memories and, as a result...4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 6...1 2 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 3 Requirements
Sano, Rie; Takahashi, Yoichiro; Hayakawa, Akira; Murayama, Masayuki; Kubo, Rieko; Hirasawa, Satoshi; Tokue, Hiroyuki; Shimada, Takehiro; Awata, Sachiko; Takei, Hiroyuki; Yuasa, Masahiro; Uetake, Shinji; Akuzawa, Hisashi; Kominato, Yoshihiko
2018-05-01
Postmortem computed tomography (PMCT) is becoming a commonly used modality in routine forensic investigation. Mechanical injuries including lacerations, incisions, stab wounds and gunshot wounds frequently contain foreign bodies that may have significant value as clues in criminal investigations. CT is a sensitive modality for detection of metal foreign bodies that may be associated with injuries to the victim in cases of homicide or traffic accidents. Here we report two cases in which PMCT was able to act as a guide to forensic pathologists for retrieval of metal fragments in the corpses of the victims, the retrieved fragments then being used to validate the confessions of the assailants through comparison with the knife and the crowbar, respectively, that had been used in the crimes. In these cases, the small metal fragments retrieved from the corpses of the victims with the aid of PMCT were decisive pieces of evidence confirming the circumstances of the crimes. These cases illustrate how PMCT can be used to complement the findings of classical autopsy for integrative investigation of corpses with injury. Copyright © 2018 Elsevier B.V. All rights reserved.
Wortzel, Hal S; Filley, Christopher M; Anderson, C Alan; Oster, Timothy; Arciniegas, David B
2008-01-01
Traumatic brain injury (TBI) is a substantial source of mortality and morbidity world wide. Although most such injuries are relatively mild, accurate diagnosis and prognostication after mild TBI are challenging. These problems are complicated further when considered in medicolegal contexts, particularly civil litigation. Cerebral single photon emission computed tomography (SPECT) may contribute to the evaluation and treatment of persons with mild TBI. Cerebral SPECT is relatively sensitive to the metabolic changes produced by TBI. However, such changes are not specific to this condition, and their presence on cerebral SPECT imaging does not confirm a diagnosis of mild TBI. Conversely, the absence of abnormalities on cerebral SPECT imaging does not exclude a diagnosis of mild TBI, although such findings may be of prognostic value. The literature does not demonstrate consistent relationships between SPECT images and neuropsychological testing or neuropsychiatric symptoms. Using the rules of evidence shaped by Daubert v. Merrell Dow Pharmaceuticals, Inc., and its progeny to analyze the suitability of SPECT for forensic purposes, we suggest that expert testimony regarding SPECT findings should be admissible only as evidence to support clinical history, neuropsychological test results, and structural brain imaging findings and not as stand-alone diagnostic data.
American Academy of Forensic Sciences
... Academy News PDF Library Proceedings Journal of Forensic Sciences Information for Authors Searchable Index Contact Information Forensic Links ... Dale Stewart Award 2018 Annual Scientific Meeting Registration ... in Forensic Science … Now What? Young Forensic Scientists Forum (YFSF) Annual ...
Toward a virtual reconstruction of an antique three-dimensional marble puzzle
NASA Astrophysics Data System (ADS)
Benamar, Fatima Zahra; Fauvet, Eric; Hostein, Antony; Laligant, Olivier; Truchetet, Frederic
2017-01-01
The reconstruction of broken objects is an important field of research for many applications, such as art restoration, surgery, forensics, and solving puzzles. In archaeology, the reconstruction of broken artifacts is a very time-consuming task due to the handling of fractured objects, which are generally fragile. However, it can now be supported by three-dimensional (3-D) data acquisition devices and computer processing. Those techniques are very useful in this domain because they allow the remote handling of very accurate models of fragile parts, they permit the extensive testing of reconstruction solutions, and they provide access to the parts for the entire research community. An interesting problem has recently been proposed by archaeologists in the form of a huge puzzle composed of a thousand fragments of Pentelic marble of different sizes found in Autun (France), and all attempts to reconstruct the puzzle during the last two centuries have failed. Archaeologists are sure that some fragments are missing and that some of the ones we have come from different slabs. We propose an inexpensive transportable system for 3-D acquisition setup and a 3-D reconstruction method that is applied to this Roman inscription but is also relevant to other applications.
Differential Power Analysis as a digital forensic tool.
Souvignet, T; Frinken, J
2013-07-10
Electronic payment fraud is considered a serious international crime by Europol. An important part of this fraud comes from payment card data skimming. This type of fraud consists of an illegal acquisition of payment card details when a user is withdrawing cash at an automated teller machine (ATM) or paying at a point of sale (POS). Modern skimming devices, also known as skimmers, use secure crypto-algorithms (e.g. Advanced Encryption Standard (AES)) to protect skimmed data stored within their memory. In order to provide digital evidence in criminal cases involving skimmers, law enforcement agencies (LEAs) must retrieve the plaintext skimmed data, generally without having knowledge of the secret key. This article proposes an alternative to the current solution at the Bundeskriminalamt (BKA) to reveal the secret key. The proposed solution is non-invasive, based on Power Analysis Attack (PAA). This article first describes the structure and the behaviour of an AES skimmer, followed by the proposal of the full operational PAA process, from power measurements to attack computation. Finally, it presents results obtained in several cases, explaining the latest improvements and providing some ideas for further developments. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.
Glemser, Philip A; Pfleiderer, Michael; Heger, Anna; Tremper, Jan; Krauskopf, Astrid; Schlemmer, Heinz-Peter; Yen, Kathrin; Simons, David
2017-03-01
The aim of this multi-reader feasibility study was to evaluate new post-processing CT imaging tools in rib fracture assessment of forensic cases by analyzing detection time and diagnostic accuracy. Thirty autopsy cases (20 with and 10 without rib fractures in autopsy) were randomly selected and included in this study. All cases received a native whole body CT scan prior to the autopsy procedure, which included dissection and careful evaluation of each rib. In addition to standard transverse sections (modality A), CT images were subjected to a reconstruction algorithm to compute axial labelling of the ribs (modality B) as well as "unfolding" visualizations of the rib cage (modality C, "eagle tool"). Three radiologists with different clinical and forensic experience who were blinded to autopsy results evaluated all cases in a random manner of modality and case. Rib fracture assessment of each reader was evaluated compared to autopsy and a CT consensus read as radiologic reference. A detailed evaluation of relevant test parameters revealed a better accordance to the CT consensus read as to the autopsy. Modality C was the significantly quickest rib fracture detection modality despite slightly reduced statistic test parameters compared to modalities A and B. Modern CT post-processing software is able to shorten reading time and to increase sensitivity and specificity compared to standard autopsy alone. The eagle tool as an easy to use tool is suited for an initial rib fracture screening prior to autopsy and can therefore be beneficial for forensic pathologists.
Forensic Analysis of Human DNA from Samples Contamined with Bioweapons Agents
2011-10-01
Forensic analysis of human DNA from samples contaminated with bioweapons agents Jason Timbers Kathryn Wright Royal Canadian Mounted...Police Forensic Science and Identification Service Prepared By: Royal Canadian Mounted Police RCMP Forensic Science Identification Services... Royal Canadian Mounted Police Forensic Science and Identification Service Prepared By: Royal Canadian Mounted Police RCMP Forensic Science
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-24
... Communications and Computer Devices and Components Thereof; Notice of Investigation AGENCY: U.S. International... States after importation of certain mobile communications and computer devices and components thereof by... importation of certain mobile communications or computer devices or components thereof that infringe one or...
Aghayev, Emin; Staub, Lukas; Dirnhofer, Richard; Ambrose, Tony; Jackowski, Christian; Yen, Kathrin; Bolliger, Stephan; Christe, Andreas; Roeder, Christoph; Aebi, Max; Thali, Michael J
2008-04-01
Recent developments in clinical radiology have resulted in additional developments in the field of forensic radiology. After implementation of cross-sectional radiology and optical surface documentation in forensic medicine, difficulties in the validation and analysis of the acquired data was experienced. To address this problem and for the comparison of autopsy and radiological data a centralized database with internet technology for forensic cases was created. The main goals of the database are (1) creation of a digital and standardized documentation tool for forensic-radiological and pathological findings; (2) establishing a basis for validation of forensic cross-sectional radiology as a non-invasive examination method in forensic medicine that means comparing and evaluating the radiological and autopsy data and analyzing the accuracy of such data; and (3) providing a conduit for continuing research and education in forensic medicine. Considering the infrequent availability of CT or MRI for forensic institutions and the heterogeneous nature of case material in forensic medicine an evaluation of benefits and limitations of cross-sectional imaging concerning certain forensic features by a single institution may be of limited value. A centralized database permitting international forensic and cross disciplinary collaborations may provide important support for forensic-radiological casework and research.
Kloosterman, Ate; Mapes, Anna; Geradts, Zeno; van Eijk, Erwin; Koper, Carola; van den Berg, Jorrit; Verheij, Saskia; van der Steen, Marcel; van Asten, Arian
2015-08-05
In this paper, the importance of modern technology in forensic investigations is discussed. Recent technological developments are creating new possibilities to perform robust scientific measurements and studies outside the controlled laboratory environment. The benefits of real-time, on-site forensic investigations are manifold and such technology has the potential to strongly increase the speed and efficacy of the criminal justice system. However, such benefits are only realized when quality can be guaranteed at all times and findings can be used as forensic evidence in court. At the Netherlands Forensic Institute, innovation efforts are currently undertaken to develop integrated forensic platform solutions that allow for the forensic investigation of human biological traces, the chemical identification of illicit drugs and the study of large amounts of digital evidence. These platforms enable field investigations, yield robust and validated evidence and allow for forensic intelligence and targeted use of expert capacity at the forensic institutes. This technological revolution in forensic science could ultimately lead to a paradigm shift in which a new role of the forensic expert emerges as developer and custodian of integrated forensic platforms. © 2015 The Author(s) Published by the Royal Society. All rights reserved.
Parasites in Forensic Science: a historic perspective
Cardoso, Rita; Alves, Helena; Richter, Joachim; Botelho, Monica C
Parasites show a great potential to Forensic Science. Forensic Science is the application of any science and methodology to the legal system. The forensic scientist collects and analyses the physical evidence and produce a report of the results to the court. A parasite is an organism that lives at the expense of another and they exist in any ecosystem. Parasites are the cause of many important diseases. The forensic scientists can use the parasites to identify a crime scene, to determine the murder weapon or simply identify an individual. The applications for parasites in the Forensic Science can be many and more studies should be made in Forensic Parasitology. The most important parasites in Forensic Science are helminths specifically schistosomes. Through history there are many cases where schistosomes were described in autopsies and it was related to the cause of death. Here we review the applications of parasites in Forensic Science and its importance to the forensic scientist.
[Two anniversaries in Czech forensic medicine].
Nečas, P; Hejna, P
2012-10-01
The authors commemorate the 100th anniversary of the publication of Slavíks textbook Forensic Pathology for Medical and Legal Students and the 125th anniversary of the 1st Czech forensic autopsy. They introduce professor V. Slavík and describe his personal qualities and expertise. The content of the textbook is described. The topicality of Slavíks explanations and the tradition of Czech forensic pathology are discussed. Key words: forensic pathology - history of Czech forensic pathology - textbooks of forensic pathology.
[Research Progress on Forensic Dentistry].
Liu, F; Dang, Y H
2017-04-01
Forensic dentistry is an interdiscipline of forensic medicine and stomatology, which provides legal information by collecting, testing and assessing the dental evidence scientifically. In this review, the present application of forensic dentistry has been described, such as the estimation of age, sex, species, occupation and living habit, as well as the identification of individual, domestic violence or abuse, which aims to enrich and improve forensic dentistry for making it be more useful in forensic medicine even in juridical practice. Copyright© by the Editorial Department of Journal of Forensic Medicine.
[Reflection of estimating postmortem interval in forensic entomology and the Daubert standard].
Xie, Dan; Peng, Yu-Long; Guo, Ya-Dong; Cai, Ji-Feng
2013-08-01
Estimating postmortem interval (PMI) is always the emphasis and difficulty in forensic practice. Forensic entomology plays a significant indispensable role. Recently, the theories and technologies of forensic entomology are increasingly rich. But many problems remain in the research and practice. With proposing the Daubert standard, the reliability and accuracy of estimation PMI by forensic entomology need more demands. This review summarizes the application of the Daubert standard in several aspects of ecology, quantitative genetics, population genetics, molecular biology, and microbiology in the practice of forensic entomology. It builds a bridge for basic research and forensic practice to provide higher accuracy for estimating postmortem interval by forensic entomology.
Feature Extraction and Machine Learning for the Classification of Brazilian Savannah Pollen Grains
Souza, Junior Silva; da Silva, Gercina Gonçalves
2016-01-01
The classification of pollen species and types is an important task in many areas like forensic palynology, archaeological palynology and melissopalynology. This paper presents the first annotated image dataset for the Brazilian Savannah pollen types that can be used to train and test computer vision based automatic pollen classifiers. A first baseline human and computer performance for this dataset has been established using 805 pollen images of 23 pollen types. In order to access the computer performance, a combination of three feature extractors and four machine learning techniques has been implemented, fine tuned and tested. The results of these tests are also presented in this paper. PMID:27276196
Times have changed! Forensic radiology--a new challenge for radiology and forensic pathology.
Flach, Patricia M; Thali, Michael J; Germerott, Tanja
2014-04-01
The ongoing development of imaging and the recent integration of cross-sectional imaging methods into the medicolegal workflow have resulted in an increasing number of forensic institutes acquiring dedicated CT and MRI scanners. The purpose of this article is to evaluate the different aspects of postmortem imaging and to detail the necessary cooperation between radiologists and forensic pathologists for mutual learning and accurate science to form a new subspecialty: forensic radiology. CONCLUSION; Forensic radiology must integrate the expertise of forensic pathologists and radiologists. The challenge is to unite these two disciplines first by direct and intense communications and second by a basic understanding of forensic pathology by radiologists as well as a foundational knowledge of postmortem imaging by forensic pathologists, in combination with the establishment of educational and reporting guidelines.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-14
... Communications and Computer Devices and Components Thereof; Notice of Commission Determination Not To Review an... in its entirety Inv. No. 337-TA-704, Certain Mobile Communications and Computer Devices and... importation of certain mobile communications and computer devices and components thereof by reason of...
A call for more science in forensic science.
Bell, Suzanne; Sah, Sunita; Albright, Thomas D; Gates, S James; Denton, M Bonner; Casadevall, Arturo
2018-05-01
Forensic science is critical to the administration of justice. The discipline of forensic science is remarkably complex and includes methodologies ranging from DNA analysis to chemical composition to pattern recognition. Many forensic practices developed under the auspices of law enforcement and were vetted primarily by the legal system rather than being subjected to scientific scrutiny and empirical testing. Beginning in the 1990s, exonerations based on DNA-related methods revealed problems with some forensic disciplines, leading to calls for major reforms. This process generated a National Academy of Science report in 2009 that was highly critical of many forensic practices and eventually led to the establishment of the National Commission for Forensic Science (NCFS) in 2013. The NCFS was a deliberative body that catalyzed communication between nonforensic scientists, forensic scientists, and other stakeholders in the legal community. In 2017, despite continuing problems with forensic science, the Department of Justice terminated the NCFS. Just when forensic science needs the most support, it is getting the least. We urge the larger scientific community to come to the aid of our forensic colleagues by advocating for urgently needed research, testing, and financial support.
Toward a general ontology for digital forensic disciplines.
Karie, Nickson M; Venter, Hein S
2014-09-01
Ontologies are widely used in different disciplines as a technique for representing and reasoning about domain knowledge. However, despite the widespread ontology-related research activities and applications in different disciplines, the development of ontologies and ontology research activities is still wanting in digital forensics. This paper therefore presents the case for establishing an ontology for digital forensic disciplines. Such an ontology would enable better categorization of the digital forensic disciplines, as well as assist in the development of methodologies and specifications that can offer direction in different areas of digital forensics. This includes such areas as professional specialization, certifications, development of digital forensic tools, curricula, and educational materials. In addition, the ontology presented in this paper can be used, for example, to better organize the digital forensic domain knowledge and explicitly describe the discipline's semantics in a common way. Finally, this paper is meant to spark discussions and further research on an internationally agreed ontological distinction of the digital forensic disciplines. Digital forensic disciplines ontology is a novel approach toward organizing the digital forensic domain knowledge and constitutes the main contribution of this paper. © 2014 American Academy of Forensic Sciences.
Shaw, Kirsty J; Joyce, Domino A; Docker, Peter T; Dyer, Charlotte E; Greenway, Gillian M; Greenman, John; Haswell, Stephen J
2011-02-07
Integrated DNA extraction and amplification have been carried out in a microfluidic device using electro-osmotic pumping (EOP) for fluidic control. All the necessary reagents for performing both DNA extraction and polymerase chain reaction (PCR) amplification were pre-loaded into the microfluidic device following encapsulation in agarose gel. Buccal cells were collected using OmniSwabs [Whatman™, UK] and manually added to a chaotropic binding/lysis solution pre-loaded into the microfluidic device. The released DNA was then adsorbed onto a silica monolith contained within the DNA extraction chamber and the microfluidic device sealed using polymer electrodes. The washing and elution steps for DNA extraction were carried out using EOP, resulting in transfer of the eluted DNA into the PCR chamber. Thermal cycling, achieved using a Peltier element, resulted in amplification of the Amelogenin locus as confirmed using conventional capillary gel electrophoresis. It was demonstrated that the PCR reagents could be stored in the microfluidic device for at least 8 weeks at 4 °C with no significant loss of activity. Such methodology lends itself to the production of 'ready-to-use' microfluidic devices containing all the necessary reagents for sample processing, with many obvious applications in forensics and clinical medicine.
Usability of a Low-Cost Head Tracking Computer Access Method following Stroke.
Mah, Jasmine; Jutai, Jeffrey W; Finestone, Hillel; Mckee, Hilary; Carter, Melanie
2015-01-01
Assistive technology devices for computer access can facilitate social reintegration and promote independence for people who have had a stroke. This work describes the exploration of the usefulness and acceptability of a new computer access device called the Nouse™ (Nose-as-mouse). The device uses standard webcam and video recognition algorithms to map the movement of the user's nose to a computer cursor, thereby allowing hands-free computer operation. Ten participants receiving in- or outpatient stroke rehabilitation completed a series of standardized and everyday computer tasks using the Nouse™ and then completed a device usability questionnaire. Task completion rates were high (90%) for computer activities only in the absence of time constraints. Most of the participants were satisfied with ease of use (70%) and liked using the Nouse™ (60%), indicating they could resume most of their usual computer activities apart from word-processing using the device. The findings suggest that hands-free computer access devices like the Nouse™ may be an option for people who experience upper motor impairment caused by stroke and are highly motivated to resume personal computing. More research is necessary to further evaluate the effectiveness of this technology, especially in relation to other computer access assistive technology devices.
The broad field of forensic pharmacy.
Anderson, Peter D
2012-02-01
Forensic pharmacy is application of the sciences of drugs to legal issues. Forensic pharmacists engage in work relating to litigation, the regulatory process, and the criminal justice system. Forensic pharmacy overlaps with many other forensic fields. Pharmacists hold a variety of positions with local, state, and federal governments. Many pharmacists do freelance work as forensic litigation consultants. A forensic pharmacist can be a valuable resource in legal cases relating to malpractice, adverse drug reactions, drunk and drugged driving, health care fraud, poisoning, and numerous other types of civil and criminal cases.
Power throttling of collections of computing elements
Bellofatto, Ralph E [Ridgefield, CT; Coteus, Paul W [Yorktown Heights, NY; Crumley, Paul G [Yorktown Heights, NY; Gara, Alan G [Mount Kidsco, NY; Giampapa, Mark E [Irvington, NY; Gooding,; Thomas, M [Rochester, MN; Haring, Rudolf A [Cortlandt Manor, NY; Megerian, Mark G [Rochester, MN; Ohmacht, Martin [Yorktown Heights, NY; Reed, Don D [Mantorville, MN; Swetz, Richard A [Mahopac, NY; Takken, Todd [Brewster, NY
2011-08-16
An apparatus and method for controlling power usage in a computer includes a plurality of computers communicating with a local control device, and a power source supplying power to the local control device and the computer. A plurality of sensors communicate with the computer for ascertaining power usage of the computer, and a system control device communicates with the computer for controlling power usage of the computer.
Forensic anthropology in Europe: an assessment of current status and application.
Kranioti, Elena; Paine, Robert
2011-01-01
Forensic anthropology is the discipline that traditionally deals with the examination of human remains for legal purposes and it derives from the fields of anatomy, physical anthropology and forensic medicine. For more than a century, forensic anthropologists in the United States have been offering their services in the court of law complementing the medico-legal investigation of other forensic professionals. The current status in European countries is presented here. The development of forensic anthropology varies significantly among the countries of Europe. Whereas some countries show a long history of research activity in the forensic sciences, including forensic anthropology (i.e. France, Germany and Spain), others are exhibiting a recent, rapid development (i.e. United Kingdom). In some cases, forensic anthropologists are employed within the academic realm (i.e. U.K., Denmark, Portugal, Turkey), forensic institutions (Netherlands) or government organizations (Spain, Hungary), although the vast majority of them remain limited to freelance activities on a sporadic basis. Often, European scientists that deal with skeletal remains come from nonphysical anthropology disciplines such as archaeology, forensic medicine and biology. In many cases they do not have adequate training equivalent to the forensic anthropologists in the USA. Naturally, without common training and a common legal system, an accreditation system for Europe will be difficult to implement.
Keller, Mark; Naue, Jana; Zengerle, Roland; von Stetten, Felix; Schmidt, Ulrike
2015-01-01
Nested PCR remains a labor-intensive and error-prone biomolecular analysis. Laboratory workflow automation by precise control of minute liquid volumes in centrifugal microfluidic Lab-on-a-Chip systems holds great potential for such applications. However, the majority of these systems require costly custom-made processing devices. Our idea is to augment a standard laboratory device, here a centrifugal real-time PCR thermocycler, with inbuilt liquid handling capabilities for automation. We have developed a microfluidic disk segment enabling an automated nested real-time PCR assay for identification of common European animal groups adapted to forensic standards. For the first time we utilize a novel combination of fluidic elements, including pre-storage of reagents, to automate the assay at constant rotational frequency of an off-the-shelf thermocycler. It provides a universal duplex pre-amplification of short fragments of the mitochondrial 12S rRNA and cytochrome b genes, animal-group-specific main-amplifications, and melting curve analysis for differentiation. The system was characterized with respect to assay sensitivity, specificity, risk of cross-contamination, and detection of minor components in mixtures. 92.2% of the performed tests were recognized as fluidically failure-free sample handling and used for evaluation. Altogether, augmentation of the standard real-time thermocycler with a self-contained centrifugal microfluidic disk segment resulted in an accelerated and automated analysis reducing hands-on time, and circumventing the risk of contamination associated with regular nested PCR protocols.
Woźniak, Krzysztof; Rzepecka-Woźniak, Ewa; Moskała, Artur; Pohl, Jerzy; Latacz, Katarzyna; Dybała, Bogdan
2012-10-10
A frequent request of a prosecutor referring to forensic autopsy is to determine the mechanism of an injury and to identify the weapons used to cause those injuries. This task could be problematic in many ways, including changes in the primary injury caused by medical intervention and the process of healing. To accomplish this task, the forensic pathologist has to gather all possible information during the post-mortem examination. The more data is collected, the easier it is to obtain an accurate answer to the prosecutor's question. The authors present a case of head injuries that the victim sustained under unknown circumstances. The patient underwent neurosurgical treatment which resulted in alteration of the bone fracture pattern. The only way to evaluate this injury was to analyze antemortem clinical data, especially CT scans, with virtual 3D reconstruction of the fractured skull. A physical model of a part of the broken skull was created with the use of 3D printing. These advanced techniques, applied for the first time in Poland for forensic purposes, allowed investigators to extract enough data to develop a hypothesis about the mechanism of injury and the weapon most likely used. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.
Imaging and virtual autopsy: looking back and forward
Bolliger, Stephan A.; Thali, Michael J.
2015-01-01
In order to create a three-dimensional (3D) documentation of findings which can be reassessed if necessary by other experts, the research project ‘Virtopsy®’ was launched in the late 1990s. This project combined autopsy results with forensic imaging in the form of computed tomography, magnetic resonance tomography and 3D surface scanning. The success of this project eventually succeeded in convincing the courts in Switzerland to accept these novel methods as evidence. As opposition towards autopsies has grown over the last decades, Virtopsy also strives to find and elaborate additional methods which can answer the main forensic questions without autopsy. These methods comprise post-mortem angiography for illustration of the vascular bed and image-guided tissue and fluid sampling for histological, toxicological and microbiological examinations. Based on the promising results, post-mortem imaging, especially with 3D surface scanning, has meanwhile also been applied to living victims of assault, who have suffered patterned injuries due to bites, blows with objects, etc. In our opinion, forensic imaging is an objective method which offers the possibility for a reassessment of the findings by other experts, even after burial or cremation of the corpse, or healing of the injuries in living victims, thus leading to a greater security in court. PMID:26101279
2011-10-01
mémorandum technique fournit donc une description détaillée de l’approche des auteurs pour produire des calendriers des événements plus détaillés dans...SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT
Analysis of bite marks in foodstuffs by computer tomography (cone beam CT)--3D reconstruction.
Marques, Jeidson; Musse, Jamilly; Caetano, Catarina; Corte-Real, Francisco; Corte-Real, Ana Teresa
2013-12-01
The use of three-dimensional (3D) analysis of forensic evidence is highlighted in comparison with traditional methods. This three-dimensional analysis is based on the registration of the surface from a bitten object. The authors propose to use Cone Beam Computed Tomography (CBCT), which is used in dental practice, in order to study the surface and interior of bitten objects and dental casts of suspects. In this study, CBCT is applied to the analysis of bite marks in foodstuffs, which may be found in a forensic case scenario. 6 different types of foodstuffs were used: chocolate, cheese, apple, chewing gum, pizza and tart (flaky pastry and custard). The food was bitten into and dental casts of the possible suspects were made. The dental casts and bitten objects were registered using an x-ray source and the CBCT equipment iCAT® (Pennsylvania, EUA). The software InVivo5® (Anatomage Inc, EUA) was used to visualize and analyze the tomographic slices and 3D reconstructions of the objects. For each material an estimate of its density was assessed by two methods: HU values and specific gravity. All the used materials were successfully reconstructed as good quality 3D images. The relative densities of the materials in study were compared. Amongst the foodstuffs, the chocolate had the highest density (median value 100.5 HU and 1,36 g/cm(3)), while the pizza showed to have the lowest (median value -775 HU and 0,39 g/cm(3)), on both scales. Through tomographic slices and three-dimensional reconstructions it was possible to perform the metric analysis of the bite marks in all the foodstuffs, except for the pizza. These measurements could also be obtained from the dental casts. The depth of the bite mark was also successfully determined in all the foodstuffs except for the pizza. Cone Beam Computed Tomography has the potential to become an important tool for forensic sciences, namely for the registration and analysis of bite marks in foodstuffs that may be found in a crime scene.
Gonoi, Wataru; Okuma, Hidemi; Shirota, Go; Shintani, Yukako; Abe, Hiroyuki; Takazawa, Yutaka; Fukayama, Masashi; Ohtomo, Kuni
2015-01-01
Computed tomography (CT) is widely used in postmortem investigations as an adjunct to the traditional autopsy in forensic medicine. To date, several studies have described postmortem CT findings as being caused by normal postmortem changes. However, on interpretation, postmortem CT findings that are seemingly due to normal postmortem changes initially, may not have been mere postmortem artifacts. In this pictorial essay, we describe the common postmortem CT findings in cases of atraumatic in-hospital death and describe the diagnostic pitfalls of normal postmortem changes that can mimic real pathologic lesions. PMID:26175579
Hu, Yue-Qing; Fung, Wing K
2003-08-01
The effect of a structured population on the likelihood ratio of a DNA mixture has been studied by the current authors and others. In practice, contributors of a DNA mixture may belong to different ethnic/racial origins, a situation especially common in multi-racial countries such as the USA and Singapore. We have developed a computer software which is available on the web for evaluating DNA mixtures in multi-structured populations. The software can deal with various DNA mixture problems that cannot be handled by the methods given in a recent article of Fung and Hu.
An Empirical Investigation of the Relevant Skills of Forensic Accountants
ERIC Educational Resources Information Center
DiGabriele, James A.
2008-01-01
The author investigated whether views of the relevant skills of forensic accountants differ among forensic accounting practitioners, accounting academics, and users of forensic accounting services. Universities and colleges are currently considering adding forensic accounting courses to their curriculum. The results of the present study provide…
Sidorov, V L; Shvetsova, I V; Isakova, I V
2007-01-01
The authors give the comparative analysis of Russian and foreign forensic medical methods of species character identification of the blood from the stains on the material evidences and bone fragments. It is shown that for this purpose it is feasible to apply human immunoglobulin G (IgG) and solid phase enzyme immunoassay (EIA) with the kit "IgG general-EIA-BEST". In comparison with the methods used in Russia this method is more sensitive, convenient for objective registration and computer processing. The results of experiments shown that it is possible to use the kit "IgG general-EIA-BEST" in forensic medicine for the species character identification of the blood from the stains on the material evidences and bone fragments.
A Computational Discriminability Analysis on Twin Fingerprints
NASA Astrophysics Data System (ADS)
Liu, Yu; Srihari, Sargur N.
Sharing similar genetic traits makes the investigation of twins an important study in forensics and biometrics. Fingerprints are one of the most commonly found types of forensic evidence. The similarity between twins’ prints is critical establish to the reliability of fingerprint identification. We present a quantitative analysis of the discriminability of twin fingerprints on a new data set (227 pairs of identical twins and fraternal twins) recently collected from a twin population using both level 1 and level 2 features. Although the patterns of minutiae among twins are more similar than in the general population, the similarity of fingerprints of twins is significantly different from that between genuine prints of the same finger. Twins fingerprints are discriminable with a 1.5%~1.7% higher EER than non-twins. And identical twins can be distinguished by examine fingerprint with a slightly higher error rate than fraternal twins.
Fimag: the United Kingdom disaster victim/forensic identification imaging system.
Rutty, Guy N; Robinson, Claire; Morgan, Bruno; Black, Sue; Adams, Catherine; Webster, Philip
2009-11-01
Imaging is an integral diagnostic tool in mass fatality investigations undertaken traditionally by plain X-rays, fluoroscopy, and dental radiography. However, little attention has been given to appropriate image reporting, secure data transfer and storage particularly in relation to the need to meet stringent judicial requirements. Notwithstanding these limitations, it is the risk associated with the safe handling and investigation of contaminated fatalities which is providing new challenges for mass fatality radiological imaging. Mobile multi-slice computed tomography is an alternative to these traditional modalities as it provides a greater diagnostic yield and an opportunity to address the requirements of the criminal justice system. We present a new national disaster victim/forensic identification imaging system--Fimag--which is applicable for both contaminated and non-contaminated mass fatality imaging and addresses the issues of judicial reporting. We suggest this system opens a new era in radiological diagnostics for mass fatalities.
Microchip-based cell lysis and DNA extraction from sperm cells for application to forensic analysis.
Bienvenue, Joan M; Duncalf, Natalie; Marchiarullo, Daniel; Ferrance, Jerome P; Landers, James P
2006-03-01
The current backlog of casework is among the most significant challenges facing crime laboratories at this time. While the development of next-generation microchip-based technology for expedited forensic casework analysis offers one solution to this problem, this will require the adaptation of manual, large-volume, benchtop chemistry to small volume microfluidic devices. Analysis of evidentiary materials from rape kits where semen or sperm cells are commonly found represents a unique set of challenges for on-chip cell lysis and DNA extraction that must be addressed for successful application. The work presented here details the development of a microdevice capable of DNA extraction directly from sperm cells for application to the analysis of sexual assault evidence. A variety of chemical lysing agents are assessed for inclusion in the extraction protocol and a method for DNA purification from sperm cells is described. Suitability of the extracted DNA for short tandem repeat (STR) analysis is assessed and genetic profiles shown. Finally, on-chip cell lysis methods are evaluated, with results from fluorescence visualization of cell rupture and DNA extraction from an integrated cell lysis and purification with subsequent STR amplification presented. A method for on-chip cell lysis and DNA purification is described, with considerations toward inclusion in an integrated microdevice capable of both differential cell sorting and DNA extraction. The results of this work demonstrate the feasibility of incorporating microchip-based cell lysis and DNA extraction into forensic casework analysis.
Stangegaard, Michael; Frøslev, Tobias G; Frank-Hansen, Rune; Hansen, Anders J; Morling, Niels
2011-04-01
We have implemented and validated automated protocols for DNA extraction and PCR setup using a Tecan Freedom EVO liquid handler mounted with the Te-MagS magnetic separation device (Tecan, Männedorf, Switzerland). The protocols were validated for accredited forensic genetic work according to ISO 17025 using the Qiagen MagAttract DNA Mini M48 kit (Qiagen GmbH, Hilden, Germany) from fresh whole blood and blood from deceased individuals. The workflow was simplified by returning the DNA extracts to the original tubes minimizing the risk of misplacing samples. The tubes that originally contained the samples were washed with MilliQ water before the return of the DNA extracts. The PCR was setup in 96-well microtiter plates. The methods were validated for the kits: AmpFℓSTR Identifiler, SGM Plus and Yfiler (Applied Biosystems, Foster City, CA), GenePrint FFFL and PowerPlex Y (Promega, Madison, WI). The automated protocols allowed for extraction and addition of PCR master mix of 96 samples within 3.5h. In conclusion, we demonstrated that (1) DNA extraction with magnetic beads and (2) PCR setup for accredited, forensic genetic short tandem repeat typing can be implemented on a simple automated liquid handler leading to the reduction of manual work, and increased quality and throughput. Copyright © 2011 Society for Laboratory Automation and Screening. Published by Elsevier Inc. All rights reserved.
Radiochemistry and the Study of Fission
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rundberg, Robert S.
These are slides from a lecture given at UC Berkeley. Radiochemistry has been used to study fission since its discovery. Radiochemical methods are used to determine cumulative mass yields. These measurements have led to the two-mode fission hypothesis to model the neutron energy dependence of fission product yields. Fission product yields can be used for the nuclear forensics of nuclear explosions. The mass yield curve depends on both the fuel and the neutron spectrum of a device. Recent studies have shown that the nuclear structure of the compound nucleus can affect the mass yield distribution. The following topics are covered:more » In the beginning: the discovery of fission; forensics using fission products: what can be learned from fission products, definitions of R-values and Q-values, fission bases, K-factors and fission chambers, limitations; the neutron energy dependence of the mass yield distribution (the two mode fission hypothesis); the influence of nuclear structure on the mass yield distribution. In summary: Radiochemistry has been used to study fission since its discovery. Radiochemical measurement of fission product yields have provided the highest precision data for developing fission models and for nuclear forensics. The two-mode fission hypothesis provides a description of the neutron energy dependence of the mass yield curve. However, data is still rather sparse and more work is needed near second and third chance fission. Radiochemical measurements have provided evidence for the importance of nuclear states in the compound nucleus in predicting the mass yield curve in the resonance region.« less
Urbanová, Petra; Hejna, Petr; Jurda, Mikoláš
2015-05-01
Three-dimensional surface technologies particularly close range photogrammetry and optical surface scanning have recently advanced into affordable, flexible and accurate techniques. Forensic postmortem investigation as performed on a daily basis, however, has not yet fully benefited from their potentials. In the present paper, we tested two approaches to 3D external body documentation - digital camera-based photogrammetry combined with commercial Agisoft PhotoScan(®) software and stereophotogrammetry-based Vectra H1(®), a portable handheld surface scanner. In order to conduct the study three human subjects were selected, a living person, a 25-year-old female, and two forensic cases admitted for postmortem examination at the Department of Forensic Medicine, Hradec Králové, Czech Republic (both 63-year-old males), one dead to traumatic, self-inflicted, injuries (suicide by hanging), the other diagnosed with the heart failure. All three cases were photographed in 360° manner with a Nikon 7000 digital camera and simultaneously documented with the handheld scanner. In addition to having recorded the pre-autopsy phase of the forensic cases, both techniques were employed in various stages of autopsy. The sets of collected digital images (approximately 100 per case) were further processed to generate point clouds and 3D meshes. Final 3D models (a pair per individual) were counted for numbers of points and polygons, then assessed visually and compared quantitatively using ICP alignment algorithm and a cloud point comparison technique based on closest point to point distances. Both techniques were proven to be easy to handle and equally laborious. While collecting the images at autopsy took around 20min, the post-processing was much more time-demanding and required up to 10h of computation time. Moreover, for the full-body scanning the post-processing of the handheld scanner required rather time-consuming manual image alignment. In all instances the applied approaches produced high-resolution photorealistic, real sized or easy to calibrate 3D surface models. Both methods equally failed when the scanned body surface was covered with body hair or reflective moist areas. Still, it can be concluded that single camera close range photogrammetry and optical surface scanning using Vectra H1 scanner represent relatively low-cost solutions which were shown to be beneficial for postmortem body documentation in forensic pathology. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-10
..., Including Wireless Communication Devices, Portable Music and Data Processing Devices, and Tablet Computers... importing wireless communication devices, portable music and data processing devices, and tablet computers... certain electronic devices, including wireless communication devices, portable music and data processing...
ERIC Educational Resources Information Center
Brettell, T. A.; Saferstein, R.
1989-01-01
Presents a review of articles appealing to forensic practitioners. Topics include: drugs and poisons, forensic biochemistry, and trace evidence. Lists noteworthy books published on forensic science topics since 1986. (MVL)
[The concept of "forensic medicine"].
Popov, V L
2013-01-01
The analysis of the definition of forensic medicine and its evolution during the past 300 years is presented. The special character of forensic medicine, its subject-matter, scope of research, procedures, goals and targeted application of forensic medical knowledge are discussed. The original definition of the notion of "forensic medicine" is proposed.
Forensic entomology: a template for forensic acarology?
Turner, Bryan
2009-10-01
Insects are used in a variety of ways in forensic science and the developing area of forensic acarology may have a similar range of potential. This short account summarises the main ways in which entomology currently contributes to forensic science and discusses to what extent acarology might also contribute in these areas.
From forensic epigenetics to forensic epigenomics: broadening DNA investigative intelligence.
Vidaki, Athina; Kayser, Manfred
2017-12-21
Human genetic variation is a major resource in forensics, but does not allow all forensically relevant questions to be answered. Some questions may instead be addressable via epigenomics, as the epigenome acts as an interphase between the fixed genome and the dynamic environment. We envision future forensic applications of DNA methylation analysis that will broaden DNA-based forensic intelligence. Together with genetic prediction of appearance and biogeographic ancestry, epigenomic lifestyle prediction is expected to increase the ability of police to find unknown perpetrators of crime who are not identifiable using current forensic DNA profiling.
Marquant, Thomas; Sabbe, Bernard; Van Nuffel, Meike; Verelst, Rudy; Goethals, Kris
2018-01-01
Non-forensic or regular assertive community treatment (ACT) has positive effects on non-forensic outcomes but has poor effects on forensic outcome measures. In this study, we examined non-forensic and forensic outcome measures of a forensic adaptation of ACT (ForACT) within a continuum of care for internees. Data were collected retrospectively from files of 70 participants in the ForACT group who had been released from a forensic hospital. The control group comprised internees who had left prison and entered community-based care (n = 56). The ForACT group demonstrated significantly better outcomes on forensic measures, such as arrests and incarcerations, and had better community tenure. However, this group showed high hospitalization rates. The findings indicate that this type of community-based care can be beneficial for such internees; however, internees continue to experience difficulties reintegrating into society.
Madea, Burkhard; Saukko, Pekka; Musshoff, Frank
2007-01-17
In the last years the research output of forensic medicine has sometimes been regarded as insufficient and as of poor quality, especially when parameters as impact factors and external funding were taken into account. However, forensic medicine has different tasks compared to clinical medicine. The main difference between basic subjects, clinical and forensic medicine is not a lack of scientific efficiency in forensic medicine but is a result of the questions asked, the available methods and specific aims. In contrast to natural-scientific research, forensic science has furthermore important intersections with arts and socio-scientific disciplines. Etiologic and pathogenetic research is of only limited relevance in forensic medicine. Thus, forensic medicine is excluded from these research fields, which are mainly supported by external funding. In forensic medicine research mainly means applied research regarding findings, the probative value and reconstruction as well as examination at different points of intersection between medicine and law. Clinical types of research such as controlled randomised, prospective cross-sectional, cohort or case-control studies can only rarely be applied in forensic medicine due to the area specific research fields (e.g. thantatology, violent death, vitality, traffic medicine, analytical toxicology, hemogenetics and stain analysis). The types of studies which are successfully established in forensic medicine are comparison of methods, sensitivity studies, validation of methods, kinetic examinations etc. Tasks of research in forensic medicine and study types, which may be applied will be addressed.
Forensic Pathology Education in Pathology Residency
Ross, Wayne K.; Domen, Ronald E.
2017-01-01
Forensic pathology is a fundamental part of anatomic pathology training during pathology residency. However, the lack of information on forensic teaching suggests the highly variable nature of forensic education. A survey of pathology residency program directors was performed to determine key aspects of their respective forensic rotations and curriculum. A total of 38.3% of programs from across the country responded, and the survey results show 5.6% don’t require a forensic pathology rotation. In those that do, most forensic pathology rotations are 4 weeks long, are done at a medical examiner’s office, and require set prerequisites. A total of 21.1% of responding programs have residents who are not receiving documented evaluations for this rotation. While 39.6% of programs have a defined forensics curriculum, as many as 15% do not. Furthermore, nearly 43% of programs place no limit on counting forensic autopsies when applying for pathology board examinations. Our survey confirmed the inconsistent nature of forensic pathology training in resident education. Additionally, our curriculum was reorganized to create a more robust educational experience. A pre- and post-forensic lecture quiz and Resident In-Service Examination scores were analyzed to determine our curriculum’s impact and effectiveness. Analysis of our pre- and post-lecture quiz showed an improved overall average as well as an increase in Resident In-Service Examination scores, indicating improved general forensic pathology knowledge. Using this knowledge, along with changes in our curriculum, we generated a number of recommendations for improving forensic pathology education in pathology residency. PMID:28913415
High-performance computing for airborne applications
DOE Office of Scientific and Technical Information (OSTI.GOV)
Quinn, Heather M; Manuzzato, Andrea; Fairbanks, Tom
2010-06-28
Recently, there has been attempts to move common satellite tasks to unmanned aerial vehicles (UAVs). UAVs are significantly cheaper to buy than satellites and easier to deploy on an as-needed basis. The more benign radiation environment also allows for an aggressive adoption of state-of-the-art commercial computational devices, which increases the amount of data that can be collected. There are a number of commercial computing devices currently available that are well-suited to high-performance computing. These devices range from specialized computational devices, such as field-programmable gate arrays (FPGAs) and digital signal processors (DSPs), to traditional computing platforms, such as microprocessors. Even thoughmore » the radiation environment is relatively benign, these devices could be susceptible to single-event effects. In this paper, we will present radiation data for high-performance computing devices in a accelerated neutron environment. These devices include a multi-core digital signal processor, two field-programmable gate arrays, and a microprocessor. From these results, we found that all of these devices are suitable for many airplane environments without reliability problems.« less
Kageura, Mitsuyoshi
2002-09-01
In this paper, the status quo of forensic toxicology in Japan and the West is surveyed and a strategy to address future goals of Japanese forensic toxicology is proposed. Forensic toxicology in the West consists of three main areas--post-mortem forensic toxicology, human-performance forensic toxicology and forensic urine drug testing. In Japan, post-mortem forensic toxicology is practiced in university forensic medicine departments while most of the human-performance forensic toxicology is carried out in police laboratories. However, at least at present, strictly controlled workplace urine drug testing is not being performed, despite the abuse of drugs even by uniformed members of the National Defence Forces and police. For several years, the author has been introducing Western forensic toxicology guidelines and recommendations, translated into Japanese with the help of Western forensic toxicologists, to Japanese forensic toxicologists. Western forensic toxicology practice is at an advanced stage, whereas Japanese practice is in a critical condition and holds many problems awaiting solution, as exemplified by the urine drug testing in police laboratories. There is never any sample left for re-examination by the defence in all cases, though the initial volume of the urine sample available for examination is 30-50 ml. Only one organisation carries out everything from sampling to reporting and, in addition, the parent drug and its metabolites are not quantified. It is clear that the police laboratories do not work within good laboratory practice guidelines, nor do they have quality manuals or standard operating procedures manuals. A basic change in Japanese forensic toxicology practice is now essential. The author strongly recommends that, first of all, Japanese toxicologists should prepare forensic toxicology guidelines based on the Western models. The guidelines would progress the following objectives for forensic toxicology laboratories: 1) to have documented good laboratory practice standards; 2) to have a quality control system including a quality manual and standard operating procedures manual; 3) to have some degree of compulsion to implement quality assurance both through their own internal efforts and by appropriate remedial actions based on the results of an external proficiency testing scheme. For forensic toxicologists, the implications are that they should be: 1) responsible for ensuring that laboratory practices are performed under satisfactory conditions and 2) required to be certified as a forensic toxicology specialist in order to prove their forensic toxicology ability. For their part, governments should: 1) carry out administrative reforms related to forensic toxicology; 2) simplify the procedure for obtaining certified reference materials; 3) introduce a strict workplace urine drug testing programme for government employees, at least for those related to law enforcement. When all of these objectives have been realised, the specific goal will be achieved through which Japanese forensic toxicology is able, in practice, to fulfill its responsibility to society.
Tracking Radionuclide Fractionation in the First Atomic Explosion Using Stable Elements
Bonamici, Chloë E.; Hervig, Richard L.; Kinman, William S.
2017-08-25
Compositional analysis of postdetonation fallout is a tool for forensic identification of nuclear devices. However, the relationship between device composition and fallout composition is difficult to interpret because of the complex combination of physical mixing, nuclear reactions, and chemical fractionations that occur in the chaotic nuclear fireball. By using a combination of in situ microanalytical techniques (electron microprobe analysis and secondary ion mass spectrometry), we show that some heavy stable elements (Rb, Sr, Zr, Ba, Cs, Ba, La, Ce, Nd, Sm, Dy, Lu, U, Th) in glassy fallout from the first nuclear test, Trinity, are reliable chemical proxies for radionuclidesmore » generated during the explosion. Stable-element proxies show that radionuclides from the Trinity device were chemically, but not isotopically, fractionated by condensation. Moreover, stable-element proxies delineate chemical fractionation trends that can be used to connect present-day fallout composition to past fireball composition. Stable-element proxies therefore offer a novel approach for elucidating the phenomenology of the nuclear fireball as it relates to the formation of debris and the fixation of device materials within debris.« less
Tracking Radionuclide Fractionation in the First Atomic Explosion Using Stable Elements
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bonamici, Chloë E.; Hervig, Richard L.; Kinman, William S.
Compositional analysis of postdetonation fallout is a tool for forensic identification of nuclear devices. However, the relationship between device composition and fallout composition is difficult to interpret because of the complex combination of physical mixing, nuclear reactions, and chemical fractionations that occur in the chaotic nuclear fireball. By using a combination of in situ microanalytical techniques (electron microprobe analysis and secondary ion mass spectrometry), we show that some heavy stable elements (Rb, Sr, Zr, Ba, Cs, Ba, La, Ce, Nd, Sm, Dy, Lu, U, Th) in glassy fallout from the first nuclear test, Trinity, are reliable chemical proxies for radionuclidesmore » generated during the explosion. Stable-element proxies show that radionuclides from the Trinity device were chemically, but not isotopically, fractionated by condensation. Moreover, stable-element proxies delineate chemical fractionation trends that can be used to connect present-day fallout composition to past fireball composition. Stable-element proxies therefore offer a novel approach for elucidating the phenomenology of the nuclear fireball as it relates to the formation of debris and the fixation of device materials within debris.« less
Tracking Radionuclide Fractionation in the First Atomic Explosion Using Stable Elements.
Bonamici, Chloë E; Hervig, Richard L; Kinman, William S
2017-09-19
Compositional analysis of postdetonation fallout is a tool for forensic identification of nuclear devices. However, the relationship between device composition and fallout composition is difficult to interpret because of the complex combination of physical mixing, nuclear reactions, and chemical fractionations that occur in the chaotic nuclear fireball. Using a combination of in situ microanalytical techniques (electron microprobe analysis and secondary ion mass spectrometry), we show that some heavy stable elements (Rb, Sr, Zr, Ba, Cs, Ba, La, Ce, Nd, Sm, Dy, Lu, U, Th) in glassy fallout from the first nuclear test, Trinity, are reliable chemical proxies for radionuclides generated during the explosion. Stable-element proxies show that radionuclides from the Trinity device were chemically, but not isotopically, fractionated by condensation. Furthermore, stable-element proxies delineate chemical fractionation trends that can be used to connect present-day fallout composition to past fireball composition. Stable-element proxies therefore offer a novel approach for elucidating the phenomenology of the nuclear fireball as it relates to the formation of debris and the fixation of device materials within debris.
Comeaux, James A; Jauchem, James R; Cox, D Duane; Crane, Carrie C; D'Andrea, John A
2011-01-01
Electronic control devices (including the Advanced TASER(®) X26 model produced by TASER International) incapacitate individuals by causing muscle contractions. To provide information relevant to development of future potential devices, effects of monophasic square waves with different parameters were compared with those of the X26 electronic control device, using two animal models (frogs and swine). Pulse power, electrical pulse charge, pulse duration, and pulse repetition frequency affected muscle contraction. There was no difference in the charge required, between the square waveform and the X26 waveform, to cause approximately the same muscle-contraction response (in terms of the strength-duration curve). Thus, on the basis of these initial studies, the detailed shape of a waveform may not be important in terms of generating electro-muscular incapacitation. More detailed studies, however, may be required to thoroughly test all potential waveforms to be considered for future use in ECDs. 2010 American Academy of Forensic Sciences. Published 2010. This article is a U.S. Government work and is in the public domain in the U.S.A.
The work of forensic physicians with police detainees in the Canberra City Watchhouse.
Sturgiss, Elizabeth Ann; Parekh, Vanita
2011-02-01
Forensic physicians provide both medical care and forensic consultations to detainees in police custody. There is a paucity of Australian data regarding characteristics of detainees and the type of work provided by forensic physicians in this setting. This retrospective audit of a clinical forensic service in Canberra, Australia will assist with service planning, future data collection and the training of forensic physicians. Crown Copyright © 2010. Published by Elsevier Ltd. All rights reserved.
Madadin, Mohammed S
2013-11-01
This study assesses the knowledge about, awareness of, and attitudes toward forensic medicine and the forensic medicine undergraduate course among medical students at the University of Dammam in Dammam, Saudi Arabia. We conducted a cross-sectional study of 143 fourth-year students. We used a structured, self-administered questionnaire containing 10 items relating to forensic medicine to assess the knowledge about, awareness of, and attitudes toward forensic medicine and the forensic medicine undergraduate course. The results showed inadequate knowledge about, poor attitudes toward, and limited awareness of the importance of the forensic medicine course among medical students. Media had an effect on the students as they are a major source of forensic science information among medical students. The forensic medicine undergraduate course is important for medical students. We recommended that it be taught at the undergraduate level because it is the only academic source for forensic medicine that physicians may encounter in their careers. Teaching how to conduct an autopsy is important and has a positive role in medical education, and the forensic medicine curriculum must include instruction on autopsies, both from theoretical and practical perspectives. Medical institutes must take responsibility to increase awareness about the effect of media on medical education. Copyright © 2013 Elsevier Ltd and Faculty of Forensic and Legal Medicine. All rights reserved.
Cross-cultural issues in forensic psychiatry training.
Layde, Joseph B
2004-01-01
Forensic psychiatry was officially recognized as a subspecialty by the American Board of Medical Specialties in the 1990's. In 1994, the American Board of Psychiatry and Neurology (ABPN) gave its first written examination to certify forensic psychiatrists. In 1996, the Accreditation Council for Graduate Medical Education (ACGME) began to officially accredit one-year residency experiences in forensic psychiatry, which follow a 4-year residency in general psychiatry. The extra year of training, colloquially known as a fellowship, is required for candidates who wish to receive certification in the subspecialty of forensic psychiatry; since 2001, completion of a year of training in a program accredited by ACGME has been required for candidates wishing to take the ABPN forensic psychiatry subspecialty examination. With the formal recognition of the subspecialty of forensic psychiatry comes the need to examine special issues of cultural importance which apply specifically to forensic psychiatry training. This paper examines the current literature on cross-cultural issues in forensic psychiatry, sets out several of the societal reasons for the importance of emphasizing those issues in forensic psychiatric training, and discusses how those issues are addressed in the curriculum of one forensic psychiatry fellowship at the Medical College of Wisconsin (MCW). While much has been written about cross-cultural issues in general psychiatry, very little has appeared in the literature on the topic of cross-cultural issues in forensic psychiatry.
Unifying Research and Teaching: Pedagogy for the Transition from Forensics Competition to Education.
ERIC Educational Resources Information Center
Jensen, Scott
At a minimum, tomorrow's forensic educators need formal training that orients the professional to the responsibilities central to forensic education. While a number of opportunities, as well as applications of those opportunities, are available to forensics students, the rooting of forensics in the speech communication discipline is paramount.…
The Non-Forensics After-Life of a Forensics Director.
ERIC Educational Resources Information Center
Nicolai, Michael T.
A study investigated the personal and career choices that motivate an educator's departure from active involvement in forensics activities, and what trends, if any, exist concerning what former directors do in place of forensics. The study also investigated how forensics participation as a coach/director impacted on the individual, and what…
Origin and development of forensic medicine in Egypt.
Kharoshah, Magdy Abdel Azim; Zaki, Mamdouh Kamal; Galeb, Sherien Salah; Moulana, Ashraf Abdel Reheem; Elsebaay, Elsebaay Ahmed
2011-01-01
Egyptians are one of the first civilisations to practice the removal and examination of internal organs of humans. Their practices ranged from embalming to faith healing to surgery and autopsy. Modern radiological studies, together with various forensic techniques, allowed scientists unique glimpses of the state of health in Egypt 4000 years ago and discovered one of the earliest applications of autopsy, the main element of forensic medicine practice today. The Egyptian Forensic Medicine Authority handles a relatively large number of cases annually and depends on different assisting laboratories (forensic histopathology, microbiology, serology unit, DNA laboratory, forensic chemistry laboratory) as well as the Counterfeiting and Forgery unit. Crime scene investigations are performed mainly through the criminal laboratory related to the Ministry of Interior. Forensic Medicine is studied thoroughly in the faculty of medicine (undergraduates), as well as by forensic medical examiners at postgraduate level (diploma, master's and doctorate). This review recommends more scientific cooperation with universities in the field of forensic medicine and related sciences to solve various crimes with meticulous detail. Copyright © 2010 Elsevier Ltd and Faculty of Forensic and Legal Medicine. All rights reserved.
The use of insects in forensic investigations: An overview on the scope of forensic entomology
Joseph, Isaac; Mathew, Deepu G; Sathyan, Pradeesh; Vargheese, Geetha
2011-01-01
Forensic entomology is the study of insects/arthropods in criminal investigation. Right from the early stages insects are attracted to the decomposing body and may lay eggs in it. By studying the insect population and the developing larval stages, forensic scientists can estimate the postmortem index, any change in position of the corpse as well as the cause of death. Forensic odontologists are called upon more frequently to collaborate in criminal investigations and hence should be aware of the possibilities that forensic entomology have to offer and use it as an adjunct to the conventional means of forensic investigation. PMID:22408328
The use of insects in forensic investigations: An overview on the scope of forensic entomology.
Joseph, Isaac; Mathew, Deepu G; Sathyan, Pradeesh; Vargheese, Geetha
2011-07-01
Forensic entomology is the study of insects/arthropods in criminal investigation. Right from the early stages insects are attracted to the decomposing body and may lay eggs in it. By studying the insect population and the developing larval stages, forensic scientists can estimate the postmortem index, any change in position of the corpse as well as the cause of death. Forensic odontologists are called upon more frequently to collaborate in criminal investigations and hence should be aware of the possibilities that forensic entomology have to offer and use it as an adjunct to the conventional means of forensic investigation.
Law and psychiatry. Doing forensic work, II: fees, billing, and collections.
Reid, William H
2012-05-01
Forensic practice fees, billing, and collection procedures are quite different from those in general psychiatry. Most forensic practices have far fewer "clients," and individual bills are usually larger. Collections are usually better (and less frequently discounted) in forensic practice, and resolving billing disputes is far more straightforward. Medicare, Medicaid, other insurance coverage, provider networks and agreements, procedure codes, and diagnosis-related groups (DRGs) are all largely irrelevant in forensic work (although sometimes important to direct clinical services in correctional psychiatry or forensic treatment clinics). An understanding of the practicalities and ethics of charging and billing for forensic services greatly simplifies practice management.
Postmortem CT Angiography Compared with Autopsy: A Forensic Multicenter Study.
Grabherr, Silke; Heinemann, Axel; Vogel, Hermann; Rutty, Guy; Morgan, Bruno; Woźniak, Krzysztof; Dedouit, Fabrice; Fischer, Florian; Lochner, Stefanie; Wittig, Holger; Guglielmi, Giuseppe; Eplinius, Franziska; Michaud, Katarzyna; Palmiere, Cristian; Chevallier, Christine; Mangin, Patrice; Grimm, Jochen M
2018-05-01
Purpose To determine if postmortem computed tomography (CT) and postmortem CT angiography help to detect more lesions than autopsy in postmortem examinations, to evaluate the strengths and weaknesses of each method, and to define their indications. Materials and Methods Postmortem CT angiography was performed on 500 human corpses and followed by conventional autopsy. Nine centers were involved. All CT images were read by an experienced team including one forensic pathologist and one radiologist, blinded to the autopsy results. All findings were recorded for each method and categorized by anatomic structure (bone, organ parenchyma, soft tissue, and vascular) and relative importance in the forensic case (essential, useful, and unimportant). Results Among 18 654 findings, autopsies helped to identify 61.3% (11 433 of 18 654), postmortem CT helped to identify 76.0% (14 179 of 18 654), and postmortem CT angiography helped to identify 89.9% (16 780 of 18 654; P < .001). Postmortem CT angiography was superior to autopsy, especially at helping to identify essential skeletal lesions (96.1% [625 of 650] vs 65.4% [425 of 650], respectively; P < .001) and vascular lesions (93.5% [938 of 1003] vs 65.3% [655 of 1003], respectively; P < .001). Among the forensically essential findings, 23.4% (1029 of 4393) were not detected at autopsy, while only 9.7% (428 of 4393) were missed at postmortem CT angiography (P < .001). The best results were obtained when postmortem CT angiography was combined with autopsy. Conclusion Postmortem CT and postmortem CT angiography and autopsy each detect important lesions not detected by the other method. More lesions were identified by combining postmortem CT angiography and autopsy, which may increase the quality of postmortem diagnosis. Online supplemental material is available for this article.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-04
... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-794] Certain Electronic Devices, Including Wireless Commmunication Devices, Portable Music and Data Processing Devices, and Tablet Computers... communication devices, portable music and data processing devices, and tablet computers, imported by Apple Inc...
Undergraduate teaching of forensic medicine in Saudi Arabia.
Madadin, Mohammed; Al-Saif, Dalia M; Khamis, Amar Hassan; Taha, Attia Z; Kharoshah, Magdy A; Alsayyah, Ahmed; Alfehaid, Suha; Yaghmour, Khalid; Hakami, Ahmad Yahia; Bamousa, Manal S; Menezes, Ritesh G; Almadani, Osama M
2016-07-01
Medico-legal tasks are not exclusive to forensic medical experts -any physician may face medico-legal issues in his career. Hence, the practice of medicine requires education in legal issues. In Saudi Arabia, there are 30 universities with medical colleges, but we do not know how they teach undergraduate forensic medicine and medico-legal issues. The aim of this study was to discover undergraduate training courses in forensic medicine in Saudi universities. We conducted a cross-sectional study involving all colleges of medicine in Saudi Arabia. A structured, self-administered questionnaire containing 13 items relating to the undergraduate forensic medicine course was distributed. Out of a total of 30 universities, 27 universities responded. Of these 27 universities, 16 (59.26%) teach forensic medicine to undergraduate medical students, and 11 (40.74%) do not teach forensic medicine in their undergraduate curriculum. Of the 27 universities that responded, none has a department of forensic medicine. Eleven universities that do not teach forensic medicine have no forensic medicine unit/division or faculty at all. Forensic medicine belongs to the pathology department in 11 universities, while it belongs to different departments in five universities. There is variation in teaching methods, years where the course is taught and length of the course. Practical and morgue visits take place in 7/16 (43.8%) universities, while 9/16 (56.3%) universities only teach the theoretical aspects of forensic medicine. All 16 universities teach forensic medicine only to medical students and do not teach it to students in other colleges such as dentistry and nursing. © The Author(s) 2016.
Spencer, Amanda; Ross, Wayne K; Domen, Ronald E
2017-01-01
Forensic pathology is a fundamental part of anatomic pathology training during pathology residency. However, the lack of information on forensic teaching suggests the highly variable nature of forensic education. A survey of pathology residency program directors was performed to determine key aspects of their respective forensic rotations and curriculum. A total of 38.3% of programs from across the country responded, and the survey results show 5.6% don't require a forensic pathology rotation. In those that do, most forensic pathology rotations are 4 weeks long, are done at a medical examiner's office, and require set prerequisites. A total of 21.1% of responding programs have residents who are not receiving documented evaluations for this rotation. While 39.6% of programs have a defined forensics curriculum, as many as 15% do not. Furthermore, nearly 43% of programs place no limit on counting forensic autopsies when applying for pathology board examinations. Our survey confirmed the inconsistent nature of forensic pathology training in resident education. Additionally, our curriculum was reorganized to create a more robust educational experience. A pre- and post-forensic lecture quiz and Resident In-Service Examination scores were analyzed to determine our curriculum's impact and effectiveness. Analysis of our pre- and post-lecture quiz showed an improved overall average as well as an increase in Resident In-Service Examination scores, indicating improved general forensic pathology knowledge. Using this knowledge, along with changes in our curriculum, we generated a number of recommendations for improving forensic pathology education in pathology residency.
Sensor sentinel computing device
Damico, Joseph P.
2016-08-02
Technologies pertaining to authenticating data output by sensors in an industrial environment are described herein. A sensor sentinel computing device receives time-series data from a sensor by way of a wireline connection. The sensor sentinel computing device generates a validation signal that is a function of the time-series signal. The sensor sentinel computing device then transmits the validation signal to a programmable logic controller in the industrial environment.
[Commentary on the history of forensic medicine in Venezuela].
González Carrero, A
1991-01-01
The author explains definitions and fields of forensic medicine. Three periods are described: 1) Since colonial times to the foundation of the Caracas forensic medicine (1937); 2) From 1937 to the foundation of the Technical Judiciary Police (1958); 3) From 1958 until now; this period includes the process called "Nationalization of forensic medicine". Then there are remarks, within the historical context, on forensic medicine and teaching, the importance of the Forensic Medicine Society and the importance of postgraduate courses.
González, Leonardo; Inzunza, José Antonio; Bustos, Luis; Vallejos, Carlos; Gutiérrez, René
2005-07-01
Lawyers need some medical knowledge and physicians must know about forensics. To explore training and research programs in forensic medicine in Chilean universities. Deans of all Medicine Faculties in Chile were contacted by e-mail and invited to answer a questionnaire containing 21 questions. A survey of Chilean publications on forensic medicine was performed in Medline, Lilacs and SciELO databases. Fourteen deans answered the questionnaire. In all the responding faculties, forensic medicine is an obligatory course, generally during the fifth year and mostly combining theory with practice. In seven faculties, forensic medicine concepts are included in other courses. Forensics is taught in only two of 10 dental schools, two of 17 nursing schools, one of nine midwives schools and one of nine medical technology schools. It is not taught in phonoaudiology, kinesiology and nutrition schools. There are 74 physicians that teach the specialty but only 10 are certified by the National Board of Medical Specialty Certification (CONACEM). Treatment of most topics on forensics is insufficient. Thanatology is the strongest topic and forensic dentistry is the weakest. There are 52 publications in the area, mostly on "medical law". Forensic medicine is taught in medical schools mostly as thanatology. The knowledge of forensics among medical students is limited and must be improved.
Papadodima, Stavroula A; Sergentanis, Theodoros N; Iliakis, Roussos G; Sotiropoulos, Konstantinos C; Spiliopoulou, Chara A
2008-11-01
To investigate the particular features of students who express the desire to follow a forensic career. Three hundred and four 6th-year students attending the compulsory practice in forensic medicine in the academic year 2005-2006 were asked to fill in a self-administered questionnaire at the end of the course. The predominant motivation for following forensics was the scientific interest (39.7%). Gender, marital status, religion, place of residence, number of siblings, father/mother being a health professional, being a religious individual were not associated with forensics. Higher grades were a negative predictor for the forensic specialty. A trend linking rejection of an afterlife and orientation towards forensic medicine was found. The fear of death was more intense in students rejecting forensics. Feelings of fear, aversion and grief during the last day of autopsy seemed to be important negative predictors. Stereotypes about forensic doctors (such as "forensic doctors have a peculiar character") significantly modified the decision of students, but the beliefs about the role of the autopsy practice (cause of anxiety for death, stimulus to live every moment in life) did not. Medical students who want to follow forensics present only small differences concerning their inherent features, beliefs, reactions, emotions and attitudes, compared with the rest of their fellow students.
Forensic age assessment of asylum seekers in Finland.
Metsäniitty, Mari; Varkkola, Olli; Waltimo-Sirén, Janna; Ranta, Helena
2017-01-01
In Finland, forensic age assessment is strictly regulated by legislation. According to the Aliens Act (301/2004) and the amendment of the Act (549/2010), the police authorities, the frontier guard authorities, and the immigration authorities have the right to refer asylum seekers to the University of Helsinki, Department of Forensic Medicine, for age assessment. These assessments are especially performed to solve if the person is of major age, the cutoff being 18 completed years. The forensic age assessment is largely based on dental development, since the special permit of the Radiation and Nuclear Safety Authority (STUK) to the Department of Forensic Medicine of the University of Helsinki, allowing the use of ionizing radiation for non-medical purposes, includes dental and hand X-rays. Forensic age assessment is always performed by two forensic odontologists. In 2015, the total number of forensic age assessment examinations was 149, and the countries of origin of the asylum seekers were most commonly Iraq, Afghanistan, and Somalia. The current legislation on forensic age assessment has been well received and approved. Radiological and other examinations can be performed in different parts of Finland, but the forensic odontologist at the University of Helsinki is always involved in the process and ensures joint quality standards for the forensic age assessment.
Forensic services, public mental health policy, and financing: charting the course ahead.
Pinals, Debra A
2014-01-01
High-quality forensic evaluations can be critical for criminal cases brought before the court. In addition, forensic practitioners and mental health and forensic administrators have increasingly taken a broader view of the revolving door between the mental health and criminal justice systems. More attention is now paid to why individuals with mental disorders, including co-occurring substance use, come into the criminal justice system and the challenges that they face on re-entry into the community. In particular, individuals who receive care across civil, forensic, and correctional systems are at especially increased risk of disrupted health care access and coverage. With health care reform on the horizon, it is important to understand public financing and its impact on forensic services for this crossover population. This article is a review of historical and future trends in public mental health funding focused on Medicaid and other federal resources, the movement toward community-based services, and the impact of these areas on forensic practice and forensic systems. Tensions between recovery principles and legal mandates are also addressed as community services are emphasized, even in forensic contexts. This article calls forensic practitioners to action and offers suggested areas of focus for training to increase knowledge of public mental health funding, policy, and practice from a forensic perspective.
Simple video format for mobile applications
NASA Astrophysics Data System (ADS)
Smith, John R.; Miao, Zhourong; Li, Chung-Sheng
2000-04-01
With the advent of pervasive computing, there is a growing demand for enabling multimedia applications on mobile devices. Large numbers of pervasive computing devices, such as personal digital assistants (PDAs), hand-held computer (HHC), smart phones, portable audio players, automotive computing devices, and wearable computers are gaining access to online information sources. However, the pervasive computing devices are often constrained along a number of dimensions, such as processing power, local storage, display size and depth, connectivity, and communication bandwidth, which makes it difficult to access rich image and video content. In this paper, we report on our initial efforts in designing a simple scalable video format with low-decoding and transcoding complexity for pervasive computing. The goal is to enable image and video access for mobile applications such as electronic catalog shopping, video conferencing, remote surveillance and video mail using pervasive computing devices.
Careers in Forensics: Analysis, Evidence, and Law
ERIC Educational Resources Information Center
Torpey, Elka Maria
2009-01-01
In legal proceedings, a case is only as strong as its evidence. And whether that evidence is strong depends, in large part, on the work of forensic specialists. The field of forensics is broad and involves many kinds of workers. Some of them are involved in crimesolving. Others, such as forensic social workers or forensic economists, help to…
ERIC Educational Resources Information Center
Field, Kenneth S.; And Others
This survey of the educational offerings in the Forensic Sciences was initiated to identify institutions and agencies offering educational courses and/or programs in the forensic sciences and to evaluate the availability of these programs. The information gathered by surveying members of the American Academy of Forensic Sciences reveals that…
Analytical and Radiochemistry for Nuclear Forensics
DOE Office of Scientific and Technical Information (OSTI.GOV)
Steiner, Robert Ernest; Dry, Donald E.; Kinman, William Scott
Information about nonproliferation nuclear forensics, activities in forensics at Los Alamos National Laboratory, radio analytical work at LANL, radiochemical characterization capabilities, bulk chemical and materials analysis capabilities, and future interests in forensics interactions.
Forensic Science--Where Scientific Methods Are Utilized to Fight the Crime.
ERIC Educational Resources Information Center
Lee, Henry C.
1980-01-01
Describes various scientific techniques used to analyze physical evidence, ten areas of specialization in forensic science, courses needed by forensic scientists, and the future of forensic science. (DS)
History, research and practice of forensic anthropology in Thailand.
Traithepchanapai, Pongpon; Mahakkanukrauh, Pasuk; Kranioti, Elena F
2016-04-01
Forensic anthropology is an increasingly developing discipline born about a century ago in the United States with the objective to contribute the knowledge of bone biology and physical anthropology to the emerging needs of the court of law. The development of research in biological and forensic anthropology has made rapid progress worldwide in the past few years, however, in most countries--with the exception of the United States--forensic anthropology work is still considered within the duties of the forensic pathologist. This paper attempts to summarise the history and development of forensic anthropology in Thailand by providing information on past and current research and practice that can help forensic practitioners to apply existing methods in forensic cases and mass disasters. It is hoped that the lessons learned from the tsunami catastrophe and the emerging need for positive identification in medicolegal settings will lead to rapid advances in education, training and professional engagement of anthropologists from the forensic departments and the law enforcement agencies in Thailand. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
Bethard, Jonathan D
2017-01-01
The history of forensic anthropology has been documented by numerous scholars. These contributions have described the work of early pioneers in the field and have described important milestones, such as the founding of the Physical Anthropology Section of the American Academy of Forensic Sciences (AAFS) in 1972 and the American Board of Forensic Anthropology (ABFA) in 1977. This paper contributes to the growing literature on the history of forensic anthropology by documenting the academic training of all individuals who have been granted diplomate status by the ABFA (n = 115). Doctoral dissertation titles were queried to discern broad patterns of research foci. A total of 39 doctoral granting institutions have trained diplomates and 77.3% of board-certified forensic anthropologists wrote dissertations involving skeletal biology, bioarchaeology, or forensic anthropology. Board-certified forensic anthropologists are a broadly trained group of professionals with far-reaching anthropological interests and expertise. © 2016 American Academy of Forensic Sciences.
Present and foreseeable future of metabolomics in forensic analysis.
Castillo-Peinado, L S; Luque de Castro, M D
2016-06-21
The revulsive publications during the last years on the precariousness of forensic sciences worldwide have promoted the move of major steps towards improvement of this science. One of the steps (viz. a higher involvement of metabolomics in the new era of forensic analysis) deserves to be discussed under different angles. Thus, the characteristics of metabolomics that make it a useful tool in forensic analysis, the aspects in which this omics is so far implicit, but not mentioned in forensic analyses, and how typical forensic parameters such as the post-mortem interval or fingerprints take benefits from metabolomics are critically discussed in this review. The way in which the metabolomics-forensic binomial succeeds when either conventional or less frequent samples are used is highlighted here. Finally, the pillars that should support future developments involving metabolomics and forensic analysis, and the research required for a fruitful in-depth involvement of metabolomics in forensic analysis are critically discussed. Copyright © 2016 Elsevier B.V. All rights reserved.
The Benefits of Required Forensic Clinical Experiences in Residency.
Wasser, Tobias; Sun, Amanda; Chandra, Saksham; Michaelsen, Katherine
2018-06-01
The growth of forensic psychiatry has spurred efforts to improve forensic psychiatry training in general psychiatry residency. The Accreditation Council for Graduate Medical Education requires that residencies provide an experience that "exposes" residents to forensic issues, but leaves the specifics to individual programs. However, there is growing need for psychiatrists to understand the unique circumstances of individuals with mental illness involved in the criminal justice system. The authors developed a new mandatory forensic rotation for general psychiatry residents and conducted a pilot study to assess its impact on residents' interest and comfort working with criminal justice-involved patients, interest in forensic fellowship, and knowledge of available resources for consultation and supervision. Rotation completion was associated with a significantly increased interest in working with forensic populations and pursuing forensic fellowship, but no changes in residents' level of comfort or knowledge of supervisory and consultative resources. This study adds to the growing body of literature describing the benefits of expanding forensic education for residents.
Thinking forensics: Cognitive science for forensic practitioners.
Edmond, Gary; Towler, Alice; Growns, Bethany; Ribeiro, Gianni; Found, Bryan; White, David; Ballantyne, Kaye; Searston, Rachel A; Thompson, Matthew B; Tangen, Jason M; Kemp, Richard I; Martire, Kristy
2017-03-01
Human factors and their implications for forensic science have attracted increasing levels of interest across criminal justice communities in recent years. Initial interest centred on cognitive biases, but has since expanded such that knowledge from psychology and cognitive science is slowly infiltrating forensic practices more broadly. This article highlights a series of important findings and insights of relevance to forensic practitioners. These include research on human perception, memory, context information, expertise, decision-making, communication, experience, verification, confidence, and feedback. The aim of this article is to sensitise forensic practitioners (and lawyers and judges) to a range of potentially significant issues, and encourage them to engage with research in these domains so that they may adapt procedures to improve performance, mitigate risks and reduce errors. Doing so will reduce the divide between forensic practitioners and research scientists as well as improve the value and utility of forensic science evidence. Copyright © 2016 The Chartered Society of Forensic Sciences. Published by Elsevier B.V. All rights reserved.
Page, Mark; Taylor, Jane; Blenkin, Matt
2011-07-01
Many studies regarding the legal status of forensic science have relied on the U.S. Supreme Court's mandate in Daubert v. Merrell Dow Pharmaceuticals Inc., and its progeny in order to make subsequent recommendations or rebuttals. This paper focuses on a more pragmatic approach to analyzing forensic science's immediate deficiencies by considering a qualitative analysis of actual judicial reasoning where forensic identification evidence has been excluded on reliability grounds since the Daubert precedent. Reliance on general acceptance is becoming insufficient as proof of the admissibility of forensic evidence. The citation of unfounded statistics, error rates and certainties, a failure to document the analytical process or follow standardized procedures, and the existence of observe bias represent some of the concerns that have lead to the exclusion or limitation of forensic identification evidence. Analysis of these reasons may serve to refocus forensic practitioners' testimony, resources, and research toward rectifying shortfalls in these areas. © 2011 American Academy of Forensic Sciences.
Measuring coherence of computer-assisted likelihood ratio methods.
Haraksim, Rudolf; Ramos, Daniel; Meuwly, Didier; Berger, Charles E H
2015-04-01
Measuring the performance of forensic evaluation methods that compute likelihood ratios (LRs) is relevant for both the development and the validation of such methods. A framework of performance characteristics categorized as primary and secondary is introduced in this study to help achieve such development and validation. Ground-truth labelled fingerprint data is used to assess the performance of an example likelihood ratio method in terms of those performance characteristics. Discrimination, calibration, and especially the coherence of this LR method are assessed as a function of the quantity and quality of the trace fingerprint specimen. Assessment of the coherence revealed a weakness of the comparison algorithm in the computer-assisted likelihood ratio method used. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.
Portable Device Analyzes Rocks and Minerals
NASA Technical Reports Server (NTRS)
2008-01-01
inXitu Inc., of Mountain View, California, entered into a Phase II SBIR contract with Ames Research Center to develop technologies for the next generation of scientific instruments for materials analysis. The work resulted in a sample handling system that could find a wide range of applications in research and industrial laboratories as a means to load powdered samples for analysis or process control. Potential industries include chemical, cement, inks, pharmaceutical, ceramics, and forensics. Additional applications include characterizing materials that cannot be ground to a fine size, such as explosives and research pharmaceuticals.
2012-05-31
The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing...comments regarding this burden estimate or any other aspect of this collection of information, including suggesstions for reducing this burden, to... stratification near or close to the tip of the fungal mycelium suggesting active protein and lipid synthesis. The device uses a DSLR camera with a 1-5x Macro
Forensic Assertive Community Treatment: A Review of the Literature.
Marquant, Thomas; Sabbe, Bernard; Van Nuffel, Meike; Goethals, Kris
2016-11-01
An extensive body of literature provides evidence supporting the effectiveness of assertive community treatment (ACT) with regard to non-forensic outcome measures, such as number of hospital admissions and length of stay. However, research findings on the effectiveness of ACT for forensic outcome measures, such as rearrests or detentions, is much less clear. The present review, therefore, focuses on the application of ACT in forensic populations, combining key elements of ACT with elements of forensic rehabilitation models. Specifically, a review of the literature was conducted using a systematic methodology in an attempt to combine evidence-based elements of 40 years of research on regular ACT with elements of forensic rehabilitation models. Results reveal limited yet promising evidence in support of the effectiveness of forensic ACT for forensic outcome measures. Implications for future research and clinical practice are discussed.
Veterinary Forensic Pathology: The Search for Truth.
McDonough, S P; McEwen, B J
2016-09-01
Veterinary forensic pathology is emerging as a distinct discipline, and this special issue is a major step forward in establishing the scientific basis of the discipline. A forensic necropsy uses the same skill set needed for investigations of natural disease, but the analytical framework and purpose of forensic pathology differ significantly. The requirement of legal credibility and all that it entails distinguishes the forensic from routine diagnostic cases. Despite the extraordinary depth and breadth of knowledge afforded by their training, almost 75% of veterinary pathologists report that their training has not adequately prepared them to handle forensic cases. Many veterinary pathologists, however, are interested and willing to develop expertise in the discipline. Lessons learned from tragic examples of wrongful convictions in medical forensic pathology indicate that a solid foundation for the evolving discipline of veterinary forensic pathology requires a commitment to education, training, and certification. The overarching theme of this issue is that the forensic necropsy is just one aspect in the investigation of a case of suspected animal abuse or neglect. As veterinary pathologists, we must be aware of the roles filled by other veterinary forensic experts involved in these cases and how our findings are an integral part of an investigation. We hope that the outcome of this special issue of the journal is that veterinary pathologists begin to familiarize themselves with not only forensic pathology but also all aspects of veterinary forensic science. © The Author(s) 2016.
Ogden, Samantha J; Horton, Jeffrey K; Stubbs, Simon L; Tatnell, Peter J
2015-01-01
The 1.2 mm Electric Coring Tool (e-Core™) was developed to increase the throughput of FTA(™) sample collection cards used during forensic workflows and is similar to a 1.2 mm Harris manual micro-punch for sampling dried blood spots. Direct short tandem repeat (STR) DNA profiling was used to compare samples taken by the e-Core tool with those taken by the manual micro-punch. The performance of the e-Core device was evaluated using a commercially available PowerPlex™ 18D STR System. In addition, an analysis was performed that investigated the potential carryover of DNA via the e-Core punch from one FTA disc to another. This contamination study was carried out using Applied Biosystems AmpflSTR™ Identifiler™ Direct PCR Amplification kits. The e-Core instrument does not contaminate FTA discs when a cleaning punch is used following excision of discs containing samples and generates STR profiles that are comparable to those generated by the manual micro-punch. © 2014 American Academy of Forensic Sciences.
Fernández de la Ossa, Mª Ángeles; Amigo, José Manuel; García-Ruiz, Carmen
2014-09-01
In this study near infrared hyperspectral imaging (NIR-HSI) is used to provide a fast, non-contact, non-invasive and non-destructive method for the analysis of explosive residues on human handprints. Volunteers manipulated individually each of these explosives and after deposited their handprints on plastic sheets. For this purpose, classical explosives, potentially used as part of improvised explosive devices (IEDs) as ammonium nitrate, blackpowder, single- and double-base smokeless gunpowders and dynamite were studied. A partial-least squares discriminant analysis (PLS-DA) model was built to detect and classify the presence of explosive residues in handprints. High levels of sensitivity and specificity for the PLS-DA classification model created to identify ammonium nitrate, blackpowder, single- and double-base smokeless gunpowders and dynamite residues were obtained, allowing the development of a preliminary library and facilitating the direct and in situ detection of explosives by NIR-HSI. Consequently, this technique is showed as a promising forensic tool for the detection of explosive residues and other related samples. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.
Constructing and Classifying Email Networks from Raw Forensic Images
2016-09-01
data mining for sequence and pattern mining ; in medical imaging for image segmentation; and in computer vision for object recognition” [28]. 2.3.1...machine learning and data mining suite that is written in Python. It provides a platform for experiment selection, recommendation systems, and...predictivemod- eling. The Orange library is a hierarchically-organized toolbox of data mining components. Data filtering and probability assessment are at the
Forensic Information Warfare Requirement Study
2002-06-01
technologies that are taking place now and in the near future that will adversely impact the current technologies and require additional sophistication...WetStone Technologies, Inc. moderated a panel at the Economic Crime Investigation Institute’s Ninth Annual Conference (Fraud Management in the Twenty-First...second, to ascertain the legal impact of these tools. Their report was delivered to AFRL and provides an in-depth look into these areas. 8 Computer
Interfacing External Quantum Devices to a Universal Quantum Computer
Lagana, Antonio A.; Lohe, Max A.; von Smekal, Lorenz
2011-01-01
We present a scheme to use external quantum devices using the universal quantum computer previously constructed. We thereby show how the universal quantum computer can utilize networked quantum information resources to carry out local computations. Such information may come from specialized quantum devices or even from remote universal quantum computers. We show how to accomplish this by devising universal quantum computer programs that implement well known oracle based quantum algorithms, namely the Deutsch, Deutsch-Jozsa, and the Grover algorithms using external black-box quantum oracle devices. In the process, we demonstrate a method to map existing quantum algorithms onto the universal quantum computer. PMID:22216276
Interfacing external quantum devices to a universal quantum computer.
Lagana, Antonio A; Lohe, Max A; von Smekal, Lorenz
2011-01-01
We present a scheme to use external quantum devices using the universal quantum computer previously constructed. We thereby show how the universal quantum computer can utilize networked quantum information resources to carry out local computations. Such information may come from specialized quantum devices or even from remote universal quantum computers. We show how to accomplish this by devising universal quantum computer programs that implement well known oracle based quantum algorithms, namely the Deutsch, Deutsch-Jozsa, and the Grover algorithms using external black-box quantum oracle devices. In the process, we demonstrate a method to map existing quantum algorithms onto the universal quantum computer. © 2011 Lagana et al.
NASA Astrophysics Data System (ADS)
Larson, Michael
2012-03-01
This presentation will describe the history of the Nuclear Emergency Support Team (NEST) and its evolution over the years. NEST was formed due to a number of nuclear extortion threats received in the early 1970s. From the beginning NEST developed an extensive exercise program to test and expand capabilities. The Nuclear Assessment Program (NAP) was developed, in part, to determine if NEST deployments were required. A major revamp of the NEST program occurred in 1994. Many other organizations work in conjunction with NEST in particular the FBI and DOD. Considerable research and development has been performed in the areas of Access, Search, Diagnostics, Device Assessment, and Disablement. Extensive searches of material appearing in the unclassified literature have been and are being performed to see what is being said about nuclear materials and devices. A comprehensive study of Improvised Nuclear Devices (IND) is ongoing to determine what a terrorist can and cannot do. NEST now consists of four phases with the latest additions of Phase III, Disposition and Phase IV, Nuclear Forensics. LLNL-ABS-521775
ERIC Educational Resources Information Center
Raina, P.; Lunsky, Y.
2010-01-01
The current study describes and compares profiles of patients in the same specialized hospital program for patients with intellectual disability with and without forensic involvement. A retrospective chart review of 78 individuals (39 forensic and 39 non-forensic) served between 2006 and 2008 was completed. The forensic sample was more likely to…
Microbial forensics: the next forensic challenge.
Budowle, Bruce; Murch, Randall; Chakraborty, Ranajit
2005-11-01
Pathogens and toxins can be converted to bioweapons and used to commit bioterrorism and biocrime. Because of the potential and relative ease of an attack using a bioweapon, forensic science needs to be prepared to assist in the investigation to bring perpetrators to justice and to deter future attacks. A new subfield of forensics--microbial forensics--has been created, which is focused on characterization of evidence from a bioterrorism act, biocrime, hoax, or an inadvertent release. Forensic microbiological investigations are essentially the same as any other forensic investigation regarding processing. They involve crime scene(s) investigation, chain of custody practices, evidence collection, handling and preservation, evidence shipping, analysis of evidence, interpretation of results, and court presentation. In addition to collecting and analyzing traditional forensic evidence, the forensic investigation will attempt to determine the etiology and identity of the causal agent, often in a similar fashion as in an epidemiologic investigation. However, for attribution, higher-resolution characterization is needed. The tools for attribution include genetic- and nongenetic-based assays and informatics to attempt to determine the unique source of a sample or at least eliminate some sources. In addition, chemical and physical assays may help determine the process used to prepare, store, or disseminate the bioweapon. An effective microbial forensics program will require development and/or validation of all aspects of the forensic investigative process, from sample collection to interpretation of results. Quality assurance (QA) and QC practices, comparable to those used by the forensic DNA science community, are being implemented. Lastly, partnerships with other laboratories will be requisite, because many of the necessary capabilities for analysis will not reside in the traditional forensic laboratory.
Bruno Garza, J L; Young, J G
2015-01-01
Extended use of conventional computer input devices is associated with negative musculoskeletal outcomes. While many alternative designs have been proposed, it is unclear whether these devices reduce biomechanical loading and musculoskeletal outcomes. To review studies describing and evaluating the biomechanical loading and musculoskeletal outcomes associated with conventional and alternative input devices. Included studies evaluated biomechanical loading and/or musculoskeletal outcomes of users' distal or proximal upper extremity regions associated with the operation of alternative input devices (pointing devices, mice, other devices) that could be used in a desktop personal computing environment during typical office work. Some alternative pointing device designs (e.g. rollerbar) were consistently associated with decreased biomechanical loading while other designs had inconsistent results across studies. Most alternative keyboards evaluated in the literature reduce biomechanical loading and musculoskeletal outcomes. Studies of other input devices (e.g. touchscreen and gestural controls) were rare, however, those reported to date indicate that these devices are currently unsuitable as replacements for traditional devices. Alternative input devices that reduce biomechanical loading may make better choices for preventing or alleviating musculoskeletal outcomes during computer use, however, it is unclear whether many existing designs are effective.
Building Efficient Wireless Infrastructures for Pervasive Computing Environments
ERIC Educational Resources Information Center
Sheng, Bo
2010-01-01
Pervasive computing is an emerging concept that thoroughly brings computing devices and the consequent technology into people's daily life and activities. Most of these computing devices are very small, sometimes even "invisible", and often embedded into the objects surrounding people. In addition, these devices usually are not isolated, but…
[Advances of forensic entomology in China].
Lan, Ling-mei; Liao, Zhi-gang; Chen, Yao-qing; Yao, Yue; Li, Jian-bo; Li, Mao-yang; Cai, Ji-feng
2006-12-01
Forensic entomology is a branch of forensic medicine, which applies studies of insects and arthropods to getting evidence for court and has an analogous advantage in the estimation of the postmortem interval (PMI) and other questions of forensic relevance. The paper expounds its definition and contents and reviews some progress of the studies in some aspects in China such as the constitution and succession of insect community on the different cadavers, the applications of morphological features of insects and the technology of analysis of deoxyribonucleic acid (DNA) in forensic entomology, and forensic entomological toxicology etc.
NASA Astrophysics Data System (ADS)
Bell, Suzanne
2009-07-01
Forensic chemistry is unique among chemical sciences in that its research, practice, and presentation must meet the needs of both the scientific and the legal communities. As such, forensic chemistry research is applied and derivative by nature and design, and it emphasizes metrology (the science of measurement) and validation. Forensic chemistry has moved away from its analytical roots and is incorporating a broader spectrum of chemical sciences. Existing forensic practices are being revisited as the purview of forensic chemistry extends outward from drug analysis and toxicology into such diverse areas as combustion chemistry, materials science, and pattern evidence.
Towards Scalable Graph Computation on Mobile Devices.
Chen, Yiqi; Lin, Zhiyuan; Pienta, Robert; Kahng, Minsuk; Chau, Duen Horng
2014-10-01
Mobile devices have become increasingly central to our everyday activities, due to their portability, multi-touch capabilities, and ever-improving computational power. Such attractive features have spurred research interest in leveraging mobile devices for computation. We explore a novel approach that aims to use a single mobile device to perform scalable graph computation on large graphs that do not fit in the device's limited main memory, opening up the possibility of performing on-device analysis of large datasets, without relying on the cloud. Based on the familiar memory mapping capability provided by today's mobile operating systems, our approach to scale up computation is powerful and intentionally kept simple to maximize its applicability across the iOS and Android platforms. Our experiments demonstrate that an iPad mini can perform fast computation on large real graphs with as many as 272 million edges (Google+ social graph), at a speed that is only a few times slower than a 13″ Macbook Pro. Through creating a real world iOS app with this technique, we demonstrate the strong potential application for scalable graph computation on a single mobile device using our approach.
Towards Scalable Graph Computation on Mobile Devices
Chen, Yiqi; Lin, Zhiyuan; Pienta, Robert; Kahng, Minsuk; Chau, Duen Horng
2015-01-01
Mobile devices have become increasingly central to our everyday activities, due to their portability, multi-touch capabilities, and ever-improving computational power. Such attractive features have spurred research interest in leveraging mobile devices for computation. We explore a novel approach that aims to use a single mobile device to perform scalable graph computation on large graphs that do not fit in the device's limited main memory, opening up the possibility of performing on-device analysis of large datasets, without relying on the cloud. Based on the familiar memory mapping capability provided by today's mobile operating systems, our approach to scale up computation is powerful and intentionally kept simple to maximize its applicability across the iOS and Android platforms. Our experiments demonstrate that an iPad mini can perform fast computation on large real graphs with as many as 272 million edges (Google+ social graph), at a speed that is only a few times slower than a 13″ Macbook Pro. Through creating a real world iOS app with this technique, we demonstrate the strong potential application for scalable graph computation on a single mobile device using our approach. PMID:25859564
Materials requirements for optical processing and computing devices
NASA Technical Reports Server (NTRS)
Tanguay, A. R., Jr.
1985-01-01
Devices for optical processing and computing systems are discussed, with emphasis on the materials requirements imposed by functional constraints. Generalized optical processing and computing systems are described in order to identify principal categories of requisite components for complete system implementation. Three principal device categories are selected for analysis in some detail: spatial light modulators, volume holographic optical elements, and bistable optical devices. The implications for optical processing and computing systems of the materials requirements identified for these device categories are described, and directions for future research are proposed.
Teaching forensic medicine in the University of Porto.
Magalhães, Teresa; Dinis-Oliveira, Ricardo Jorge; Santos, Agostinho
2014-07-01
The University of Porto (UP) provides education in Forensic Medicine (FM) through the 1st, 2nd and 3rd cycle of studies, post-graduation and continuing education courses. This education is related to forensic pathology, clinical forensic medicine (including forensic psychology and psychiatry), forensic chemistry and toxicology, forensic genetics and biology, and criminalistics. With this work we intent to reflect on how we are currently teaching FM in the UP, at all levels of university graduation. We will present our models, regarding the educational objectives, curricular program and teaching/learning methodologies of each cycle of studies as well as in post-graduate and continuing education courses. Historically, and besides related administratively to the Ministry of Justice, the Portuguese Medico-Legal Institutes (since 1918) and more recently the National Institute of Legal Medicine and Forensic Sciences (INMLCF) also have educational and research responsibilities. Thus, it lends space and cooperates with academic institutions and this contribution, namely regarding teaching forensic sciences in Portugal has been judged as an example for other Countries. This contribution is so important that in UP, the Department of Legal Medicine and Forensic Sciences of the Faculty of Medicine (FMUP) shares, until now, the same physical space with North Branch of the INMLCF, which represents a notorious advantage, since it makes possible the "learning by doing". Copyright © 2014 Elsevier Ltd and Faculty of Forensic and Legal Medicine. All rights reserved.
Forensic DNA databases in Western Balkan region: retrospectives, perspectives, and initiatives
Marjanović, Damir; Konjhodžić, Rijad; Butorac, Sara Sanela; Drobnič, Katja; Merkaš, Siniša; Lauc, Gordan; Primorac, Damir; Anđelinović, Šimun; Milosavljević, Mladen; Karan, Željko; Vidović, Stojko; Stojković, Oliver; Panić, Bojana; Vučetić Dragović, Anđelka; Kovačević, Sandra; Jakovski, Zlatko; Asplen, Chris; Primorac, Dragan
2011-01-01
The European Network of Forensic Science Institutes (ENFSI) recommended the establishment of forensic DNA databases and specific implementation and management legislations for all EU/ENFSI members. Therefore, forensic institutions from Bosnia and Herzegovina, Serbia, Montenegro, and Macedonia launched a wide set of activities to support these recommendations. To assess the current state, a regional expert team completed detailed screening and investigation of the existing forensic DNA data repositories and associated legislation in these countries. The scope also included relevant concurrent projects and a wide spectrum of different activities in relation to forensics DNA use. The state of forensic DNA analysis was also determined in the neighboring Slovenia and Croatia, which already have functional national DNA databases. There is a need for a ‘regional supplement’ to the current documentation and standards pertaining to forensic application of DNA databases, which should include regional-specific preliminary aims and recommendations. PMID:21674821
Community forensic psychiatry: restoring some sanity to forensic psychiatric rehabilitation.
Skipworth, J; Humberstone, V
2002-01-01
To review clinical and legal paradigms of community forensic mental health care, with specific focus on New Zealand, and to develop a clinically based set of guiding principles for service development in this area. The general principles of rehabilitating mentally disordered offenders, and assertive community care programmes were reviewed and applied to the law and policy in a New Zealand forensic mental health setting. There is a need to develop comprehensive community treatment programmes for mentally disordered offenders. The limited available research supports assertive community treatment models, with specialist forensic input. Ten clinically based principles of care provision important to forensic mental health assertive community treatment were developed. Deinstitutionalization in forensic psychiatry lags behind the rest of psychiatry, but can only occur with well-supported systems in place to assess and manage risk in the community setting. The development of community-based forensic rehabilitation services in conjunction with general mental health is indicated.
Expanding forensic science through forensic intelligence.
Ribaux, Olivier; Talbot Wright, Benjamin
2014-12-01
Research and Development ('R&D') in forensic science currently focuses on innovative technologies improving the efficiency of existing forensic processes, from the detection of marks and traces at the scene, to their presentation in Court. R&D approached from this perspective provides no response to doubts raised by recent criminological studies, which question the effective contribution of forensic science to crime reduction, and to policing in general. Traces (i.e. forensic case data), as remnants of criminal activity are collected and used in various forms of crime monitoring and investigation. The aforementioned doubts therefore need to be addressed by expressing how information is conveyed by traces in these processes. Modelling from this standpoint expands the scope of forensic science and provides new R&D opportunities. Twelve propositions for R&D are stated in order to pave the way. Copyright © 2014 Forensic Science Society. Published by Elsevier Ireland Ltd. All rights reserved.
Application of DNA-based methods in forensic entomology.
Wells, Jeffrey D; Stevens, Jamie R
2008-01-01
A forensic entomological investigation can benefit from a variety of widely practiced molecular genotyping methods. The most commonly used is DNA-based specimen identification. Other applications include the identification of insect gut contents and the characterization of the population genetic structure of a forensically important insect species. The proper application of these procedures demands that the analyst be technically expert. However, one must also be aware of the extensive list of standards and expectations that many legal systems have developed for forensic DNA analysis. We summarize the DNA techniques that are currently used in, or have been proposed for, forensic entomology and review established genetic analyses from other scientific fields that address questions similar to those in forensic entomology. We describe how accepted standards for forensic DNA practice and method validation are likely to apply to insect evidence used in a death or other forensic entomological investigation.
Forensic DNA databases in Western Balkan region: retrospectives, perspectives, and initiatives.
Marjanović, Damir; Konjhodzić, Rijad; Butorac, Sara Sanela; Drobnic, Katja; Merkas, Sinisa; Lauc, Gordan; Primorac, Damir; Andjelinović, Simun; Milosavljević, Mladen; Karan, Zeljko; Vidović, Stojko; Stojković, Oliver; Panić, Bojana; Vucetić Dragović, Andjelka; Kovacević, Sandra; Jakovski, Zlatko; Asplen, Chris; Primorac, Dragan
2011-06-01
The European Network of Forensic Science Institutes (ENFSI) recommended the establishment of forensic DNA databases and specific implementation and management legislations for all EU/ENFSI members. Therefore, forensic institutions from Bosnia and Herzegovina, Serbia, Montenegro, and Macedonia launched a wide set of activities to support these recommendations. To assess the current state, a regional expert team completed detailed screening and investigation of the existing forensic DNA data repositories and associated legislation in these countries. The scope also included relevant concurrent projects and a wide spectrum of different activities in relation to forensics DNA use. The state of forensic DNA analysis was also determined in the neighboring Slovenia and Croatia, which already have functional national DNA databases. There is a need for a 'regional supplement' to the current documentation and standards pertaining to forensic application of DNA databases, which should include regional-specific preliminary aims and recommendations.
[Application of DNA labeling technology in forensic botany].
Znang, Xian; Li, Jing-Lin; Zhang, Xiang-Yu
2008-12-01
Forensic botany is a study of judicial plant evidence. Recently, researches on DNA labeling technology have been a mainstream of forensic botany. The article systematically reviews various types of DNA labeling techniques in forensic botany with enumerated practical cases, as well as the potential forensic application of each individual technique. The advantages of the DNA labeling technology over traditional morphological taxonomic methods are also summarized.
Development of forensic medicine in post reform Indonesia.
Syukriani, Yoni Fuadah; Novita, Nita; Sunjaya, Deni K
2018-05-03
Forensic medicine practice in Indonesia was introduced through the Dutch colonial criminal justice system in the early twentieth century. After more than 70 years of national independence, the development of forensic medicine still faces fundamental challenges, including confusion in the distribution of responsibility with law enforcement agencies, difficulties in managing conflicts of interest, and impediments in scientific practice and professional development. Despite of the golden opportunity from the Indonesian Reform movement in the late 1990s, the impact on forensic medicine development has been less than expected. It is thus important to identify the scope of the problems plaguing the development of forensic medicine, as well as its causes. We conducted a qualitative study to explain the problems and propose solutions. The results show that the standards of practice have developed more slowly than those in many other branches of medicine, despite its increasing popularity from its role in counterterrorism and disaster victim identification. A strong thriving spirit exists in forensic science, although growth in forensic research activities should be facilitated more. The 2009 Health Law has included forensic medicine practice in the health system to cover the role of forensic medicine for health and medical education purposes. It also potentially provides a way to support the justice system without exposing forensic practitioners to possible conflicts of interest, for instance, by utilizing a tiered referral system. To this aim, an alternative is proposed: to place forensic medicine practice within the context of the health system. Copyright © 2018 Elsevier Ltd and Faculty of Forensic and Legal Medicine. All rights reserved.
New perspectives in forensic anthropology.
Dirkmaat, Dennis C; Cabo, Luis L; Ousley, Stephen D; Symes, Steven A
2008-01-01
A critical review of the conceptual and practical evolution of forensic anthropology during the last two decades serves to identify two key external factors and four tightly inter-related internal methodological advances that have significantly affected the discipline. These key developments have not only altered the current practice of forensic anthropology, but also its goals, objectives, scope, and definition. The development of DNA analysis techniques served to undermine the classic role of forensic anthropology as a field almost exclusively focused on victim identification. The introduction of the Daubert criteria in the courtroom presentation of scientific testimony accompanied the development of new human comparative samples and tools for data analysis and sharing, resulting in a vastly enhanced role for quantitative methods in human skeletal analysis. Additionally, new questions asked of forensic anthropologists, beyond identity, required sound scientific bases and expanded the scope of the field. This environment favored the incipient development of the interrelated fields of forensic taphonomy, forensic archaeology, and forensic trauma analysis, fields concerned with the reconstruction of events surrounding death. Far from representing the mere addition of new methodological techniques, these disciplines (especially, forensic taphonomy) provide forensic anthropology with a new conceptual framework, which is broader, deeper, and more solidly entrenched in the natural sciences. It is argued that this new framework represents a true paradigm shift, as it modifies not only the way in which classic forensic anthropological questions are answered, but also the goals and tasks of forensic anthropologists, and their perception of what can be considered a legitimate question or problem to be answered within the field.
Identical twins in forensic genetics - Epidemiology and risk based estimation of weight of evidence.
Tvedebrink, Torben; Morling, Niels
2015-12-01
The increase in the number of forensic genetic loci used for identification purposes results in infinitesimal random match probabilities. These probabilities are computed under assumptions made for rather simple population genetic models. Often, the forensic expert reports likelihood ratios, where the alternative hypothesis is assumed not to encompass close relatives. However, this approach implies that important factors present in real human populations are discarded. This approach may be very unfavourable to the defendant. In this paper, we discuss some important aspects concerning the closest familial relationship, i.e., identical (monozygotic) twins, when reporting the weight of evidence. This can be done even when the suspect has no knowledge of an identical twin or when official records hold no twin information about the suspect. The derived expressions are not original as several authors previously have published results accounting for close familial relationships. However, we revisit the discussion to increase the awareness among forensic genetic practitioners and include new information on medical and societal factors to assess the risk of not considering a monozygotic twin as the true perpetrator. If accounting for a monozygotic twin in the weight of evidence, it implies that the likelihood ratio is truncated at a maximal value depending on the prevalence of monozygotic twins and the societal efficiency of recognising a monozygotic twin. If a monozygotic twin is considered as an alternative proposition, then data relevant for the Danish society suggests that the threshold of likelihood ratios should approximately be between 150,000 and 2,000,000 in order to take the risk of an unrecognised identical, monozygotic twin into consideration. In other societies, the threshold of the likelihood ratio in crime cases may reach other, often lower, values depending on the recognition of monozygotic twins and the age of the suspect. In general, more strictly kept registries will imply larger thresholds on the likelihood ratio as the monozygotic twin explanation gets less probable. Copyright © 2015 The Chartered Society of Forensic Sciences. Published by Elsevier Ireland Ltd. All rights reserved.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mayer, Klaus; Glaser, Alexander
Whenever nuclear material is found out of regulatory control, questions on the origin of the material, on its intended use, and on hazards associated with the material need to be answered. Here, analytical and interpretational methodologies have been developed in order to exploit measurable material properties for gaining information on the history of the nuclear material. This area of research is referred to as nuclear forensic science or, in short, nuclear forensics.This chapter reviews the origins, types, and state-of-the-art of nuclear forensics; discusses the potential roles of nuclear forensics in supporting nuclear security; and examines what nuclear forensics can realisticallymore » achieve. Lastly, it also charts a path forward, pointing at potential applications of nuclear forensic methodologies in other areas.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Keegan, Elizabeth; Kristo, Michael J.; Toole, Kaitlyn
In Nuclear Forensic Science, analytical chemists join forces with nuclear physicists, material scientists, radiochemists, and traditional forensic scientists, as well as experts in nuclear security, nuclear safeguards, law enforcement, and policy development, in an effort to deter nuclear smuggling. Nuclear forensic science, or “nuclear forensics,” aims to answer questions about nuclear material found outside of regulatory control, questions such as ‘where did this material come from?’ and ‘what is the intended use of the material?’ In this Feature, we provide a general overview of nuclear forensics, selecting examples of key “nuclear forensic signatures” which have allowed investigators to determine themore » identity of unknown nuclear material in real investigations.« less
Glaser, Alexander; Mayer, Klaus
2016-06-01
Whenever nuclear material is found out of regulatory control, questions on the origin of the material, on its intended use, and on hazards associated with the material need to be answered. Analytical and interpretational methodologies have been developed in order to exploit measurable material properties for gaining information on the history of the nuclear material. This area of research is referred to as nuclear forensic science or, in short, nuclear forensics.This chapter reviews the origins, types, and state-of-the-art of nuclear forensics; discusses the potential roles of nuclear forensics in supporting nuclear security; and examines what nuclear forensics can realistically achieve.more » It also charts a path forward, pointing at potential applications of nuclear forensic methodologies in other areas.« less
Keegan, Elizabeth; Kristo, Michael J.; Toole, Kaitlyn; ...
2015-12-24
In Nuclear Forensic Science, analytical chemists join forces with nuclear physicists, material scientists, radiochemists, and traditional forensic scientists, as well as experts in nuclear security, nuclear safeguards, law enforcement, and policy development, in an effort to deter nuclear smuggling. Nuclear forensic science, or “nuclear forensics,” aims to answer questions about nuclear material found outside of regulatory control, questions such as ‘where did this material come from?’ and ‘what is the intended use of the material?’ In this Feature, we provide a general overview of nuclear forensics, selecting examples of key “nuclear forensic signatures” which have allowed investigators to determine themore » identity of unknown nuclear material in real investigations.« less
Chi, Chia-Fen; Tseng, Li-Kai; Jang, Yuh
2012-07-01
Many disabled individuals lack extensive knowledge about assistive technology, which could help them use computers. In 1997, Denis Anson developed a decision tree of 49 evaluative questions designed to evaluate the functional capabilities of the disabled user and choose an appropriate combination of assistive devices, from a selection of 26, that enable the individual to use a computer. In general, occupational therapists guide the disabled users through this process. They often have to go over repetitive questions in order to find an appropriate device. A disabled user may require an alphanumeric entry device, a pointing device, an output device, a performance enhancement device, or some combination of these. Therefore, the current research eliminates redundant questions and divides Anson's decision tree into multiple independent subtrees to meet the actual demand of computer users with disabilities. The modified decision tree was tested by six disabled users to prove it can determine a complete set of assistive devices with a smaller number of evaluative questions. The means to insert new categories of computer-related assistive devices was included to ensure the decision tree can be expanded and updated. The current decision tree can help the disabled users and assistive technology practitioners to find appropriate computer-related assistive devices that meet with clients' individual needs in an efficient manner.
Forensic Chemistry--A Symposium Collection.
ERIC Educational Resources Information Center
Journal of Chemical Education, 1985
1985-01-01
Presents a collection of articles to provide chemistry teachers with resource materials to add forensic chemistry units to their chemistry courses. Topics range from development of forensic science laboratory courses and mock-crime scenes to forensic serology and analytical techniques. (JN)
A Perspective on Veterinary Forensic Pathology and Medicine in the United Kingdom.
Newbery, S G; Cooke, S W; Martineau, H M
2016-09-01
Internationally, forensic medicine and pathology are increasingly recognized as an important aspect of work done by veterinary clinicians and veterinary pathologists. In this article, a forensic veterinary clinician, a forensic veterinary pathologist in private practice, and a forensic veterinary pathologist at a veterinary school discuss the interactions among veterinary clinicians, veterinary pathologists, and law enforcement agencies and how future interactions can be improved. The focus is on the United Kingdom, but many of the principles, challenges, and suggestions are applicable to other jurisdictions. Clinicians and pathologists require forensic training to enable them to apply their veterinary knowledge to suspected cases of animal abuse and to subsequently present their findings and conclusions to a court of law in a concise, professional, and unbiased manner, and some opportunities for such advanced training in the United Kingdom are indicated. It is important that forensic veterinary clinicians and pathologists interact in an unbiased and collegial manner to answer the questions posed by courts of law. Opportunities for improved training, communication, and interaction among forensic veterinarians, forensic scientists, and law enforcement are discussed. © The Author(s) 2016.
Human resources and their possible forensic meanings.
Russo, Andrea; Urlić, Ivan; Kasum, Josip
2015-09-01
Forensics (forensic--before the Forum) means the application of knowledge from different scientific fields in order to define facts in judicial and/or administrative procedures. Nowadays forensics, besides this, finds its application even in different economic processes. For example, forensics enters the commercial areas of business intelligence and of different security areas. The European Commission recognized the importance of forensics, and underscored the importance of development of its scientific infrastructure in member States. We are witnessing the rise of various tragedies in economic and other kinds of processes. Undoubtedly, the world is increasingly exposed to various forms of threats whose occurrences regularly involve people. In this paper we are proposing the development of a new approach in the forensic assessment of the state of human resources. We are suggesting that in the focus should be the forensic approach in the psychological assessment of awareness of the individual and of the critical infrastructure sector operator (CISO) in determining the level of actual practical, rather than formal knowledge of an individual in a particular field of expertise, or in a specific scientific field, and possible forensic meanings.
Klonoff, David C
2017-07-01
The Internet of Things (IoT) is generating an immense volume of data. With cloud computing, medical sensor and actuator data can be stored and analyzed remotely by distributed servers. The results can then be delivered via the Internet. The number of devices in IoT includes such wireless diabetes devices as blood glucose monitors, continuous glucose monitors, insulin pens, insulin pumps, and closed-loop systems. The cloud model for data storage and analysis is increasingly unable to process the data avalanche, and processing is being pushed out to the edge of the network closer to where the data-generating devices are. Fog computing and edge computing are two architectures for data handling that can offload data from the cloud, process it nearby the patient, and transmit information machine-to-machine or machine-to-human in milliseconds or seconds. Sensor data can be processed near the sensing and actuating devices with fog computing (with local nodes) and with edge computing (within the sensing devices). Compared to cloud computing, fog computing and edge computing offer five advantages: (1) greater data transmission speed, (2) less dependence on limited bandwidths, (3) greater privacy and security, (4) greater control over data generated in foreign countries where laws may limit use or permit unwanted governmental access, and (5) lower costs because more sensor-derived data are used locally and less data are transmitted remotely. Connected diabetes devices almost all use fog computing or edge computing because diabetes patients require a very rapid response to sensor input and cannot tolerate delays for cloud computing.
Instrument for Real-Time Digital Nucleic Acid Amplification on Custom Microfluidic Devices
Selck, David A.
2016-01-01
Nucleic acid amplification tests that are coupled with a digital readout enable the absolute quantification of single molecules, even at ultralow concentrations. Digital methods are robust, versatile and compatible with many amplification chemistries including isothermal amplification, making them particularly invaluable to assays that require sensitive detection, such as the quantification of viral load in occult infections or detection of sparse amounts of DNA from forensic samples. A number of microfluidic platforms are being developed for carrying out digital amplification. However, the mechanistic investigation and optimization of digital assays has been limited by the lack of real-time kinetic information about which factors affect the digital efficiency and analytical sensitivity of a reaction. Commercially available instruments that are capable of tracking digital reactions in real-time are restricted to only a small number of device types and sample-preparation strategies. Thus, most researchers who wish to develop, study, or optimize digital assays rely on the rate of the amplification reaction when performed in a bulk experiment, which is now recognized as an unreliable predictor of digital efficiency. To expand our ability to study how digital reactions proceed in real-time and enable us to optimize both the digital efficiency and analytical sensitivity of digital assays, we built a custom large-format digital real-time amplification instrument that can accommodate a wide variety of devices, amplification chemistries and sample-handling conditions. Herein, we validate this instrument, we provide detailed schematics that will enable others to build their own custom instruments, and we include a complete custom software suite to collect and analyze the data retrieved from the instrument. We believe assay optimizations enabled by this instrument will improve the current limits of nucleic acid detection and quantification, improving our fundamental understanding of single-molecule reactions and providing advancements in practical applications such as medical diagnostics, forensics and environmental sampling. PMID:27760148
Civil forensic psychiatry - Part 1: an overview.
Samuels, Anthony H
2018-06-01
Objectives This paper provides an overview for general and forensic psychiatrists of the complexity and challenge of working in the civil medico-legal arena. It covers expert evidence, ethics, core concepts in civil forensic psychiatry and report writing. Conclusions Civil forensic psychiatry is an important sub-speciality component of forensic psychiatry that requires specific skills, knowledge and the ability to assist legal bodies in determining the significance of psychiatric issues.
Teaching and Learning with Mobile Computing Devices: Case Study in K-12 Classrooms
ERIC Educational Resources Information Center
Grant, Michael M.; Tamim, Suha; Brown, Dorian B.; Sweeney, Joseph P.; Ferguson, Fatima K.; Jones, Lakavious B.
2015-01-01
While ownership of mobile computing devices, such as cellphones, smartphones, and tablet computers, has been rapid, the adoption of these devices in K-12 classrooms has been measured. Some schools and individual teachers have integrated mobile devices to support teaching and learning. The purpose of this qualitative research was to describe the…
Reel forensic experts: Forensic psychiatrists as portrayed on screen.
Friedman, Susan Hatters; Cerny, Cathleen A; Soliman, Sherif; West, Sara G
2011-01-01
The lay public is much more likely to have encountered a forensic psychiatrist on television or in the movies than to have encountered a real one. Thus, by way of popular culture, the jury's perceptions and expectations of forensic expert witnesses may have been formed long before they take the stand. We describe a typology of five categories of forensic experts portrayed in fiction: Dr. Evil, The Professor, The Hired Gun, The Activist, and the Jack of All Trades. As art imitates life, these categories (aside from Dr. Evil) mirror real-life criticisms that have been made about forensic experts.
A metamodel for mobile forensics investigation domain
Abd Razak, Shukor; Othman, Siti Hajar; Mohammed, Arafat; Saeed, Faisal
2017-01-01
With the rapid development of technology, mobile phones have become an essential tool in terms of crime fighting and criminal investigation. However, many mobile forensics investigators face difficulties with the investigation process in their domain. These difficulties are due to the heavy reliance of the forensics field on knowledge which, although a valuable resource, is scattered and widely dispersed. The wide dispersion of mobile forensics knowledge not only makes investigation difficult for new investigators, resulting in substantial waste of time, but also leads to ambiguity in the concepts and terminologies of the mobile forensics domain. This paper developed an approach for mobile forensics domain based on metamodeling. The developed approach contributes to identify common concepts of mobile forensics through a development of the Mobile Forensics Metamodel (MFM). In addion, it contributes to simplifying the investigation process and enables investigation teams to capture and reuse specialized forensic knowledge, thereby supporting the training and knowledge management activities. Furthermore, it reduces the difficulty and ambiguity in the mobile forensics domain. A validation process was performed to ensure the completeness and correctness of the MFM. The validation was conducted using two techniques for improvements and adjustments to the metamodel. The last version of the adjusted metamodel was named MFM 1.2. PMID:28445486
On Emulation of Flueric Devices in Excitable Chemical Medium
Adamatzky, Andrew
2016-01-01
Flueric devices are fluidic devices without moving parts. Fluidic devices use fluid as a medium for information transfer and computation. A Belousov-Zhabotinsky (BZ) medium is a thin-layer spatially extended excitable chemical medium which exhibits travelling excitation wave-fronts. The excitation wave-fronts transfer information. Flueric devices compute via jets interaction. BZ devices compute via excitation wave-fronts interaction. In numerical model of BZ medium we show that functions of key flueric devices are implemented in the excitable chemical system: signal generator, and, xor, not and nor Boolean gates, delay elements, diodes and sensors. Flueric devices have been widely used in industry since late 1960s and are still employed in automotive and aircraft technologies. Implementation of analog of the flueric devices in the excitable chemical systems opens doors to further applications of excitation wave-based unconventional computing in soft robotics, embedded organic electronics and living technologies. PMID:27997561
On Emulation of Flueric Devices in Excitable Chemical Medium.
Adamatzky, Andrew
2016-01-01
Flueric devices are fluidic devices without moving parts. Fluidic devices use fluid as a medium for information transfer and computation. A Belousov-Zhabotinsky (BZ) medium is a thin-layer spatially extended excitable chemical medium which exhibits travelling excitation wave-fronts. The excitation wave-fronts transfer information. Flueric devices compute via jets interaction. BZ devices compute via excitation wave-fronts interaction. In numerical model of BZ medium we show that functions of key flueric devices are implemented in the excitable chemical system: signal generator, and, xor, not and nor Boolean gates, delay elements, diodes and sensors. Flueric devices have been widely used in industry since late 1960s and are still employed in automotive and aircraft technologies. Implementation of analog of the flueric devices in the excitable chemical systems opens doors to further applications of excitation wave-based unconventional computing in soft robotics, embedded organic electronics and living technologies.
Darwish, Ragaa T; Abdel-Aziz, Manal H; El Nekiedy, Abdel-Aziz M; Sobh, Zahraa K
2017-11-01
In forensic sciences to determine one's sex is quite important during the identity defining stage. The reliability of sex determination depends on the completeness of the remains and the degree of sexual dimorphism inherent in the population. Computed Tomography is the imaging modality of choice for two- and three-dimensional documentation and analysis of many autopsy findings. The aim of the present work was to assess the reliability of Three-dimensional Multislice Computed Tomography (3D MSCT) to determine sexual dimorphism from certain chest measurements; sternum and fourth rib using the 3D MSCT and to develop equations for sex determination from these bones among adult Egyptians sample. The present study was performed on 60 adult Egyptians. Their age ranged from 21 up to 74 years and they were equally divided between both sexes. Sixty virtual chests (reconstructed Multislice Computed Tomography 3D images) were examined for detection of Sternal measurements; Manubrium length (ML), Sternal body length (BL), Manubrium width (MW), Sternal body widths(BWa&BWb), Sternal area (SA) [(ML + BL) × (MW + BWa + BWb)/3]and Fourth rib width (FRW). All the studied measurements were significantly higher in males than in females. Multiple regression analysis was used to and three significant regression equations were developed for predicting sex using the different studied chest measurements; the sternal measurements, the sternal area and the widths of the right and left fourth ribs with their accuracies 96.67%.95.0%.72.68% respectively. Sterunm and fourth rib width revealed significant metric sex differences with the use of Multislice Computed Tomography 3D images thus provide a great advantage in the analysis of skeletal remains and badly decomposed bodies. Copyright © 2017 Elsevier Ltd and Faculty of Forensic and Legal Medicine. All rights reserved.
Familias 3 - Extensions and new functionality.
Kling, Daniel; Tillmar, Andreas O; Egeland, Thore
2014-11-01
In relationship testing the aim is to determine the most probable pedigree structure given genetic marker data for a set of persons. Disaster Victim Identification (DVI) based on DNA data from presumed relatives of the missing persons can be considered to be a collection of relationship problems. Forensic calculations in investigative mode address questions like "How many markers and reference persons are needed?" Such questions can be answered by simulations. Mutations, deviations from Hardy-Weinberg Equilibrium (or more generally, accounting for population substructure) and silent alleles cannot be ignored when evaluating forensic evidence in case work. With the advent of new markers, so called microvariants have become more common. Previous mutation models are no longer appropriate and a new model is proposed. This paper describes methods designed to deal with DVI problems and a new simulation model to study distribution of likelihoods. There are softwares available, addressing similar problems. However, for some problems including DVI, we are not aware of freely available validated software. The Familias software has long been widely used by forensic laboratories worldwide to compute likelihoods in relationship scenarios, though previous versions have lacked desired functionality, such as the above mentioned. The extensions as well as some other novel features have been implemented in the new version, freely available at www.familias.no. The implementation and validation are briefly mentioned leaving complete details to Supplementary sections. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.
Schober, Daniel; Schwendener, Nicole; Zech, Wolf-Dieter; Jackowski, Christian
2017-01-01
Segmentation of the lungs using post-mortem computed tomography (PMCT) data was so far not feasible due to post-mortem changes such as internal livores. Recently, an Osirix plug-in has been developed allowing automatically segmenting lungs also in PMCT data. The aim of this study was to investigate if the Hounsfield unit (HU) profiles obtained in PMCT data of the segmented lung tissue present with specific behaviour in relation to the cause of death. In 105 PMCT data sets of forensic cases, the entire lung volumes were segmented using the Mia Lite plug-in on Osirix. HU profiles of the lungs were generated and correlated to cause of death groups as assessed after forensic autopsy (cardiac death, fatal haemorrhage, craniocerebral injury, intoxication, drowning, hypothermia, hanging and suffocation). Especially cardiac death cases, intoxication cases, fatal haemorrhage cases and hypothermia cases showed very specific HU profiles. In drowning, the profiles showed two different behaviours representing wet and dry drowning. HU profiles rather varied in craniocerebral injury cases, hanging cases as well as in suffocation cases. HU profiles of the lungs segmented from PMCT data may support the cause of death diagnosis as they represent specific morphological changes in the lungs such as oedema, congestion or blood loss. Especially in cardiac death, intoxication, fatal haemorrhage, hypothermia and drowning cases, HU profiles may be very supportive for the forensic pathologist.
[The history of Polish criminalistics and forensic medicine and their links to Austrian science].
Widacki, Jan
2012-01-01
The institution of the medical expert was already known in the early Polish courts. The first Chair of Forensic Medicine on Polish soil was established in 1805 at the Jagiellonian University in Cracow and has existed until today. Among its most prominent forensic scientists are Prof. Fryderyk Hechell (1795-1851), Prof. Leon Blumenstock (1838-1895), who was the first to give regular lectures on forensic medicine for law students, and Prof. Leon Wachholz (1867-1941), who was a student of both Prof. Blumenstock and Prof. Eduard von Hofmann (1837-1897), under whose supervision he worked in Vienna. Under his guidance and supervision, he started to collect material for his habilitation. At that time, Hofmann was considered the pioneer of experimental research in forensic medicine. In Vienna, Wachholz was a guest scientist not only with Prof. von Hofmann, but also in the Psychiatric Hospital of Prof. Richard von Krafft-Ebing. After his return to Cracow, he was head of the Institute of Forensic Medicine of the Jagiellonian University for several decades. Apart from forensic medicine in the strict sense of the word, he also worked in the fields now known as criminalistics, forensic psychiatry and criminology. In these latter fields, the influence of Krafft-Ebing was still noticeable. Three students of Wachholz became professors of forensic medicine: Jan Olbrycht, Stanislaw Horoszkiewicz and Włodzimierz Sieradzki. Their students founded a whole generation of forensic scientists. Today, all Polish forensic scientists are either directly or indirectly students of Professor Wachholz' successors.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-08
... System of Records; Office of Criminal Enforcement, Forensics & Training, National Enforcement..., Office of Criminal Enforcement, Forensics & Training at (303) 462-9051 or Tammy Stein, Infrastructure Section Chief, National Enforcement Investigations Center, Office of Criminal Enforcement, Forensics...
Factors Predicting Organizational Identification with Intercollegiate Forensics Teams
ERIC Educational Resources Information Center
Croucher, Stephen M.; Long, Bridget L.; Meredith, Michael J.; Oommen, Deepa; Steele, Emily L.
2009-01-01
This study examines the relationship between intercollegiate forensics competitors' organizational identification and organizational culture. Through a survey analysis of 314 intercollegiate forensics students, this study reports three major findings. First, this study found male competitors identify with forensics programs more than female…
Specialty Guidelines for Forensic Psychology
ERIC Educational Resources Information Center
American Psychologist, 2013
2013-01-01
In the past 50 years forensic psychological practice has expanded dramatically. Because the practice of forensic psychology differs in important ways from more traditional practice areas (Monahan, 1980) the "Specialty Guidelines for Forensic Psychologists" were developed and published in 1991 (Committee on Ethical Guidelines for Forensic…
Zengerle, Roland; von Stetten, Felix; Schmidt, Ulrike
2015-01-01
Nested PCR remains a labor-intensive and error-prone biomolecular analysis. Laboratory workflow automation by precise control of minute liquid volumes in centrifugal microfluidic Lab-on-a-Chip systems holds great potential for such applications. However, the majority of these systems require costly custom-made processing devices. Our idea is to augment a standard laboratory device, here a centrifugal real-time PCR thermocycler, with inbuilt liquid handling capabilities for automation. We have developed a microfluidic disk segment enabling an automated nested real-time PCR assay for identification of common European animal groups adapted to forensic standards. For the first time we utilize a novel combination of fluidic elements, including pre-storage of reagents, to automate the assay at constant rotational frequency of an off-the-shelf thermocycler. It provides a universal duplex pre-amplification of short fragments of the mitochondrial 12S rRNA and cytochrome b genes, animal-group-specific main-amplifications, and melting curve analysis for differentiation. The system was characterized with respect to assay sensitivity, specificity, risk of cross-contamination, and detection of minor components in mixtures. 92.2% of the performed tests were recognized as fluidically failure-free sample handling and used for evaluation. Altogether, augmentation of the standard real-time thermocycler with a self-contained centrifugal microfluidic disk segment resulted in an accelerated and automated analysis reducing hands-on time, and circumventing the risk of contamination associated with regular nested PCR protocols. PMID:26147196
FORENSIC SCIENCE:: 20 YEARS OF FORENSIC DENTISTRY AT THE UNIVERSITY OF ZAGREB, 1994 - 2014.
Brkić, Hrvoje
2014-06-01
Data from available literature point to an early beginning of Forensic Dentistry in Croatia relating to a post-mortem examination of a female patient after a dental procedure in the 1930s. Later on, there were several mass casualties due to collisions and airplane crashes and a railway accident at the Zagreb Main Railway Station wherein the identity of the victims was established based on dental features. Foreign experts in forensics helped identify those victims, particularly forensic dentists because this specialty was almost unknown in our region at the time. During the twenty-year period of the development of Forensic Dentistry at the University of Zagreb, the School of Dental Medicine, the city of Zagreb and Croatia have become internationally recognised on the forensic map of the world.
Forensic pedology, forensic geology, forensic geoscience, geoforensics and soil forensics.
Ruffell, Alastair
2010-10-10
We now have a confusing set of five commonly used terms for the application of Earth evidence in forensic science. This confusion is resulting in Earth scientists who use these methods mentioning different terms, sometimes for the same type of study. Likewise, forensic scientists, police/law enforcement officers and those employed by courts of law are becoming confused as to what each term means. A nomenclatural framework (based on the first use of each term) is proposed to encourage consistency in the use of terminology. Generally, the number of Earth science applications has grown through time, from soil and sediment analysis to remote sensing and GIS. The issue of where forensic biology and microbiology sits with these uses of Earth evidence is considered. Copyright © 2010 Elsevier Ireland Ltd. All rights reserved.
Computational and experimental studies of LEBUs at high device Reynolds numbers
NASA Technical Reports Server (NTRS)
Bertelrud, Arild; Watson, R. D.
1988-01-01
The present paper summarizes computational and experimental studies for large-eddy breakup devices (LEBUs). LEBU optimization (using a computational approach considering compressibility, Reynolds number, and the unsteadiness of the flow) and experiments with LEBUs at high Reynolds numbers in flight are discussed. The measurements include streamwise as well as spanwise distributions of local skin friction. The unsteady flows around the LEBU devices and far downstream are characterized by strain-gage measurements on the devices and hot-wire readings downstream. Computations are made with available time-averaged and quasi-stationary techniques to find suitable device profiles with minimum drag.
Origin and development of forensic medicine in the Kingdom of Saudi Arabia.
Al Madani, Osama Mohamed; Kharoshah, Magdy Abdel Azim; Zaki, Mamdouh Kamal; Galeb, Sherien Salah; Al Moghannam, Salah Ali; Moulana, Ashraf Abdul Raheem
2012-06-01
The medicolegal death investigation system in the Kingdom of Saudi Arabia (KSA) is unique in the world. It is exclusively derived from Islamic judiciary based on Shari'ah law, which is the definitive Islamic law or doctrine. This law is applied on Saudi citizens as well as foreigners. This is different from other Islamic countries, which have a combination of Islamic and other judiciary systems.The forensic medicine centers in KSA are related administratively to the Ministry of Health (MOH) and its subdivisions in the different governorates. They are concerned with forensic medical examination and autopsy, as well as the clinical forensic medical examination of sexual assault cases, and those injured in civil and criminal cases. The assisting laboratories (forensic histopathology, microbiology, serology, forensic chemistry) are working independently under the funding of MOH, whereas the DNA laboratory and other departments of forensic sciences, for example, counterfeiting and forgery unit are related administratively to the Ministry of Interior represented by the Administration of Criminal Evidences. Efforts concerning crime scene investigations are shared with Administration of Criminal Evidences' crime scene investigators.Forensic medicine education in KSA developed in the past few years after the foundation of Saudi specialty certificate in forensic medicine. The certificate is a postgraduation qualification equivalent to a doctorate degree in forensic medicine and requires completion of a 4-year training program in both MOH- and Ministry of Interior-related departments, as well as passing annual evaluation and examination.This review is aimed at providing in the next decade the medicolegal centers with national forensic specialists throughout the kingdom and granting skillful headships for the next generations. Moreover, this review suggests more scientific associations with the academic universities in the various fields of forensic sciences through academic cooperation.
NASA Technical Reports Server (NTRS)
Hall, William A. (Inventor)
1993-01-01
A bus programmable slave module card for use in a computer control system is disclosed which comprises a master computer and one or more slave computer modules interfacing by means of a bus. Each slave module includes its own microprocessor, memory, and control program for acting as a single loop controller. The slave card includes a plurality of memory means (S1, S2...) corresponding to a like plurality of memory devices (C1, C2...) in the master computer, for each slave memory means its own communication lines connectable through the bus with memory communication lines of an associated memory device in the master computer, and a one-way electronic door which is switchable to either a closed condition or a one-way open condition. With the door closed, communication lines between master computer memory (C1, C2...) and slave memory (S1, S2...) are blocked. In the one-way open condition invention, the memory communication lines or each slave memory means (S1, S2...) connect with the memory communication lines of its associated memory device (C1, C2...) in the master computer, and the memory devices (C1, C2...) of the master computer and slave card are electrically parallel such that information seen by the master's memory is also seen by the slave's memory. The slave card is also connectable to a switch for electronically removing the slave microprocessor from the system. With the master computer and the slave card in programming mode relationship, and the slave microprocessor electronically removed from the system, loading a program in the memory devices (C1, C2...) of the master accomplishes a parallel loading into the memory devices (S1, S2...) of the slave.
Defense Biometric and Forensic Office Research, Development, Test and Evaluation Strategy
2015-01-06
investments in biometric and forensic RDT&E. From refining biometric modalities to exploring ‘ game changing’ forensic technologies such as rapid DNA to the... ASD (R&E)), is to identify, fund, manage and transition projects that support biometric and/or forensic requirements. In the second role, the DBFO...forensic stakeholders cannot fund, to the COIs for consideration. Increase contacts with ASD (R&E) divisions/laboratories focused on basic research
Architectural Considerations for Highly Scalable Computing to Support On-demand Video Analytics
2017-04-19
enforcement . The system was tested in the wild using video files as well as a commercial Video Management System supporting more than 100 surveillance...research were used to implement a distributed on-demand video analytics system that was prototyped for the use of forensics investigators in law...cameras as video sources. The architectural considerations of this system are presented. Issues to be reckoned with in implementing a scalable
An FPGA-Based System for Tracking Digital Information Transmitted Via Peer-to-Peer Protocols
2009-03-01
Sullivan. ISPs are Pressed to Become Child Porn Cops, October 2008. http://www.msnbc.msn.com/id/27198621. DVR07. Hamza Dahmouni, Sandrine Vaton, and David...of child pornography. The Federal Bureau of Investigation’s (FBI) Re- gional Computer Forensics Laboratory states in its 2007 annual report that...cyber- crime, which includes crimes against children and child pornography, is the offense for which law enforcement requested assistance most often
2016-09-07
and the University of Southern California through have been collaborating on a proposal led by Florida International University’s School of Computing...security. We will develop an action plan to identify needs, assess vulnerabilities and address disruptive technologies that could clearly provide a ...Institute of Technology and his Bachelor of Science degree in Aerospace Engineering, Polytechnic University of New York. Mr. Hurtado is a member of the
Forensic Carving of Network Packets and Associated Data Structures
2011-01-01
establishment of prior connection activity and services used; identification of other systems present on the system’s LAN or WLAN; geolocation of the...identification of other systems present on the system?s LAN or WLAN; geolocation of the host computer system; and cross-drive analysis. We show that network...Finally, our work in geolocation was assisted by geo- location databases created by companies such as Google (Google Mobile, 2011) and Skyhook
Drummond, Rachel; Gall, John A M
2017-02-01
Suspected child physical abuse, sexual abuse and neglect are not uncommon presentations. As part of the assessment of these cases, a forensic medical history may be taken. This forensic history is used not only to determine the steps necessary to address the child's wellbeing but also to direct the forensic examination. Currently, there is no clear consensus on whether or not a forensic medical history should consistently be considered an integral element within the paediatric forensic evaluation. This study examines the value derived by the medical practitioner taking a forensic medical history rather than relying on hearsay evidence when a child presents for an assessment. A retrospective review of paediatric cases seen by the Victorian Forensic Paediatric Medical Service (VFPMS) between 2014 and 2015 was undertaken. 274 forensic case reports were reviewed and the data was entered into an Excel spread sheet and analysed using chi squared tests within STATA ® . With increasing age of the child, a forensic medical history is significantly more likely to be taken. Additional information is made available to the medical practitioner what would otherwise have been provided if the medical practitioner relied only on the interview conducted by the police. Discrepancies observed between the official third parties (police or child protection) report of what a child has said and what the child says to the medical practitioner decrease with age, as do discrepancies observed between the child's version of events and a third party's (eg. parents, caregivers, friends) version of events. The study showed that by taking a forensic medical history from the child additional information can be obtained. Further, that there is a value in the examining medical practitioner taking a forensic medical history from children in cases of child physical and sexual abuse and neglect. Copyright © 2017 Elsevier Ltd and Faculty of Forensic and Legal Medicine. All rights reserved.
Adams, Jonathon; Thomas, Stuart D M; Mackinnon, Tobias; Eggleton, Damien
2018-02-07
Routine outcome measures are increasingly being mandated across mental health services in Australia and overseas. This requirement includes forensic mental health services, but their utility in such specialist services and the inter-relationships between the measures remain unclear. This study sought to characterise the risks, needs and stages of recovery of an entire cohort of forensic patients in one jurisdiction in Australia. Local expert groups, comprising of members of the forensic patient treating teams, were formed to gather information about the status and needs of all forensic patients in the State of New South Wales, Australia. The expert groups provided demographic information and completed three assessment tools concerning the risks, needs and stages of recovery of each forensic patient. The cohort of 327 forensic patients in NSW appears to be typical of forensic mental health service populations internationally when considering factors such as gender, diagnosis, and index offence. A number of important differences across the three structured tools for forensic patients in different levels of secure service provision are presented. The DUNDRUM Quartet demonstrated interesting findings, particularly in terms of the therapeutic security needs, the treatment completion, and the stages of recovery for the forensic patients in the community. The CANFOR highlighted the level of needs across the forensic patient population, whilst the HCR-20 data showed there was no significant difference in the mean clinical and risk management scores between male forensic patients across levels of security. To the authors' knowledge this is the first study of its kind in New South Wales, Australia. We have demonstrated the utility of using a suite of measures to evaluate the risks, needs, and stages of recovery for an entire cohort of forensic patients. The data set helps inform service planning and development, together with providing various avenues for future research.
Shamim, Thorakkal
2012-04-01
Forensic odontology is a specialized field of dentistry which analyses dental evidence in the interest of justice. Forensic odontology embraces all dental specialities and it is almost impossible to segregate this branch from other dental specialities. This review aims to discuss the utility of various dental specialities with forensic odontology.
Scudder, Nathan; McNevin, Dennis; Kelty, Sally F; Walsh, Simon J; Robertson, James
2018-03-01
Use of DNA in forensic science will be significantly influenced by new technology in coming years. Massively parallel sequencing and forensic genomics will hasten the broadening of forensic DNA analysis beyond short tandem repeats for identity towards a wider array of genetic markers, in applications as diverse as predictive phenotyping, ancestry assignment, and full mitochondrial genome analysis. With these new applications come a range of legal and policy implications, as forensic science touches on areas as diverse as 'big data', privacy and protected health information. Although these applications have the potential to make a more immediate and decisive forensic intelligence contribution to criminal investigations, they raise policy issues that will require detailed consideration if this potential is to be realised. The purpose of this paper is to identify the scope of the issues that will confront forensic and user communities. Copyright © 2017 The Chartered Society of Forensic Sciences. All rights reserved.
Forensic medical examination of adolescent and adult victims of sexual violence.
Ingemann-Hansen, Ole; Charles, Annie Vesterby
2013-02-01
The acute care and examination of a victim of sexual violence must be carried out by a competent forensic examiner in a setting appropriate for crisis intervention, forensic evidence collection, and medical follow up. The aim of forensic evidence and biological material collection is to document an alleged physical or sexual contact between individuals and to corroborate the victim's and the assailant's history. This is why the forensic examiner is expected to be objective and in possession of specialised technical and scientific skills. These skills are addressed and recommendations are made on how to carry out a forensic examination. This includes medical and assault history, top-to-toe examination, biological material collection, and documenting injuries while obtaining the chain of custody. Yet, consensus on time limitations for forensic evidence collection is lacking. Available forensic evidence has been shown to benefit prosecution. To meet the legal system's needs, an interpretation of the findings in a written legal report is mandatory. Copyright © 2012 Elsevier Ltd. All rights reserved.
Helsloot, Ira; Groenendaal, Jelle
2011-07-01
This study uses the naturalistic decision-making (NDM) perspective to examine how Dutch forensic team leaders (i.e., the officers in charge of criminal forensic research from the crime scene until the use of laboratory assistance) make decisions in real-life settings and identifies the contextual factors that might influence those decisions. First, a focus group interview was conducted to identify four NDM mechanisms in day-to-day forensic decision making. Second, a serious game was conducted to examine the influence of three of these contextual mechanisms. The results uncovered that forensic team leaders (i) were attracted to obtain further information when more information was initially made available, (ii) were likely to devote more attention to emotionally charged cases, and (iii) used not only forensic evidence in the decision making but also tactical, unverified information of the police inquiry. Interestingly, the measured contextual influences did not deviate significantly from a control group of laypeople. © 2011 American Academy of Forensic Sciences.
The state of nuclear forensics
NASA Astrophysics Data System (ADS)
Kristo, Michael J.; Tumey, Scott J.
2013-01-01
Nuclear terrorism has been identified as one of the most serious security threats facing the world today. Many countries, including the United States, have incorporated nuclear forensic analysis as a component of their strategy to prevent nuclear terrorism. Nuclear forensics involves the laboratory analysis of seized illicit nuclear materials or debris from a nuclear detonation to identify the origins of the material or weapon. Over the years, a number of forensic signatures have been developed to improve the confidence with which forensic analysts can draw conclusions. These signatures are validated and new signatures are discovered through research and development programs and in round-robin exercises among nuclear forensic laboratories. The recent Nuclear Smuggling International Technical Working Group Third Round Robin Exercise and an on-going program focused on attribution of uranium ore concentrate provide prime examples of the current state of nuclear forensics. These case studies will be examined and the opportunities for accelerator mass spectrometry to play a role in nuclear forensics will be discussed.
Manycore Performance-Portability: Kokkos Multidimensional Array Library
Edwards, H. Carter; Sunderland, Daniel; Porter, Vicki; ...
2012-01-01
Large, complex scientific and engineering application code have a significant investment in computational kernels to implement their mathematical models. Porting these computational kernels to the collection of modern manycore accelerator devices is a major challenge in that these devices have diverse programming models, application programming interfaces (APIs), and performance requirements. The Kokkos Array programming model provides library-based approach to implement computational kernels that are performance-portable to CPU-multicore and GPGPU accelerator devices. This programming model is based upon three fundamental concepts: (1) manycore compute devices each with its own memory space, (2) data parallel kernels and (3) multidimensional arrays. Kernel executionmore » performance is, especially for NVIDIA® devices, extremely dependent on data access patterns. Optimal data access pattern can be different for different manycore devices – potentially leading to different implementations of computational kernels specialized for different devices. The Kokkos Array programming model supports performance-portable kernels by (1) separating data access patterns from computational kernels through a multidimensional array API and (2) introduce device-specific data access mappings when a kernel is compiled. An implementation of Kokkos Array is available through Trilinos [Trilinos website, http://trilinos.sandia.gov/, August 2011].« less
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-04
... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-769] Certain Handheld Electronic Computing Devices, Related Software, and Components Thereof; Termination of the Investigation Based on... electronic computing devices, related software, and components thereof by reason of infringement of certain...
Forensic postmortem computed tomography: volumetric measurement of the heart and liver.
Jakobsen, Lykke Schrøder; Lundemose, Sissel; Banner, Jytte; Lynnerup, Niels; Jacobsen, Christina
2016-12-01
The purpose of this study was to investigate the utility of postmortem computed tomography (PMCT) images in estimating organ sizes and to examine the use of the cardiothoracic ratio (CTR). We included 45 individuals (19 females), who underwent a medico-legal autopsy. Using the computer software program Mimics ® , we determined in situ heart and liver volumes derived from linear measurements (width, height and depth) on a whole body PMCT-scan, and compared the volumes with ex vivo volumes derived by CT-scan of the eviscerated heart and liver. The ex vivo volumes were also compared with the organ weights. Further, we compared the CTR with the ex vivo heart volume and a heart weight-ratio (HWR). Intra- and inter-observer analyses were performed. We found no correlation between the in situ and ex vivo volumes of the heart and liver. However, a highly significant correlation was found between the ex vivo volumes and weights of the heart and liver. No correlations between CTR and the ex vivo heart volume nor with HWR was found. Concerning cardiomegaly, we found no agreement between the CTR and HWR. The intra- and inter-observer analyses showed no significant differences. Noninvasive in situ PMCT methods for organ measuring, as performed in this study, are not useful tools in forensic pathology. The best method to estimate organ volume is a CT-scan of the eviscerated organ. PMCT-determined CTR seems to be useless for ascertaining cardiomegaly, as it neither correlated with the ex vivo heart volume nor with the HWR.
[National organization of forensic medicine in France].
Chariot, Patrick
2012-06-01
Forensic medicine has long been characterized, in France, by diverse medical practices, which affected its recognition and development. A change was needed, Harmonization procedure includes the development of professional guidelines and allows forensic medicine to look at itself. However, the implementation of the recommendations is still far from complete. A national reform came into effect on 15 January 2011 and has defined a national reform of forensic medicine which includes funding by global budgets instead of fee-for-service. This reform allows easier organization and identification of forensic medicine units. One year later, tangible results are mixed. Forensic medicine is now more clearly identified but properly defined funding criteria are still lacking.
A Review of Forensic Science Management Literature.
Houck, M M; McAndrew, W P; Porter, M; Davies, B
2015-01-01
The science in forensic science has received increased scrutiny in recent years, but interest in how forensic science is managed is a relatively new line of research. This paper summarizes the literature in forensic science management generally from 2009 to 2013, with some recent additions, to provide an overview of the growth of topics, results, and improvements in the management of forensic services in the public and private sectors. This review covers only the last three years or so and a version of this paper was originally produced for the 2013 Interpol Forensic Science Managers Symposium and is available at interpol.int. Copyright © 2015 Central Police University.
Ogden, Rob
2010-09-01
Wildlife DNA forensics is receiving increasing coverage in the popular press and has begun to appear in the scientific literature in relation to several different fields. Recognized as an applied subject, it rests on top of very diverse scientific pillars ranging from biochemistry through to evolutionary genetics, all embedded within the context of modern forensic science. This breadth of scope, combined with typically limited resources, has often left wildlife DNA forensics hanging precariously between human DNA forensics and academics keen to seek novel applications for biological research. How best to bridge this gap is a matter for regular debate among the relatively few full-time practitioners in the field. The decisions involved in establishing forensic genetic services to investigate wildlife crime can be complex, particularly where crimes involve a wide range of species and evidential questions. This paper examines some of the issues relevant to setting up a wildlife DNA forensics laboratory based on experiences of working in this area over the past 7 years. It includes a discussion of various models for operating individual laboratories as well as options for organizing forensic testing at higher national and international levels.
Forensic odontology education:from undergraduate to PhD - a Brazilian experience.
Dietrichkeit Pereira, J G; Frontanilla Recalde, T S; Barreto Costa, P; Jacometti, V; Vigorito Magalhães, L; Alves Da Silva, R H
2017-12-01
Forensic Odontology is a topic present in the majority of Dental Schools in Brazil, and due to this reality, some universities develop activities related to undergraduate and graduate students, from the Dentistry course until the Ph.D. degree. To present the education experience related to Forensic Odontology at School of Dentistry of Ribeirão Preto (USP - University of São Paulo), showing the strategies and activities in the different degrees (Dental course, Forensic Odontology Specialization Program, Specific Professional Training, Master, and Ph.D.). To the undergraduate students, many activities are developed in order to demonstrate all the possibilities that Forensic Dentistry allow, including theoretical and practical activities; in the Forensic Odontology Specialization Program, the dentists are trained to act as Forensic Odontologists in all its amplitude; in the Specific Professional Training, some courses are available, related to specific topics as DVI, Forensic Facial Reconstruction, Auditor in Dental Care Insurance and others; and in the Master and Ph.D. Programs, the professionals receive training in skills like teaching, research, student's guidance and others. In Brazil, Forensic Odontology is a well-known field in Dentistry and universities develop an important role in training a qualified workforce.
Jones, Alan Wayne
2005-03-01
The importance and prestige of a scientific journal is increasingly being judged by the number of times the articles it publishes are cited or referenced in articles published in other scientific journals. Citation counting is also used to assess the merits of individual scientists when academic promotion and tenure are decided. With the help of Thomson, Institute for Scientific Information (Thomson ISI) a citation database was created for six leading forensic science and legal medicine journals. This database was used to determine the most highly cited articles, authors, journals and the most prolific authors of articles in the forensic sciences. The forensic science and legal medicine journals evaluated were: Journal of Forensic Sciences (JFS), Forensic Science International (FSI), International Journal of Legal Medicine (IJLM), Medicine, Science and the Law (MSL), American Journal of Forensic Medicine and Pathology (AJFMP), and Science and Justice (S&J). The resulting forensics database contained 14,210 papers published between 1981 and 2003. This in-depth bibliometric analysis has identified the creme de la creme in forensic science and legal medicine in a quantitative and objective way by citation analysis with focus on articles, authors and journals.
Forensic culture as epistemic culture: the sociology of forensic science.
Cole, Simon A
2013-03-01
This paper explores whether we can interpret the notion of 'forensic culture' as something akin to what Knorr-Cetina called an 'epistemic culture'. Can we speak of a 'forensic culture', and, if so, how is it similar to, or different from, other epistemic cultures that exist in what is conventionally called 'science'? This question has important policy implications given the National Academy Science's (NAS) recent identification of 'culture' as one of the problems at the root of what it identified as 'serious deficiencies' in U.S. forensic science and 'scientific culture' as an antidote to those problems. Finding the NAS's characterisation of 'scientific culture' overly general and naïve, this paper offers a preliminary exploration of what might be called a 'forensic culture'. Specifically, the paper explores the way in which few of the empirical findings accumulated by sociologists of science about research science seem to apply to forensic science. Instead, forensic science seems to have developed a distinct culture for which a sociological analysis will require new explanatory tools. Faithful sociological analysis of 'forensic culture' will be a necessary prerequisite for the kind of culture change prescribed by external reformist bodies like the NAS. Copyright © 2012. Published by Elsevier Ltd.
Fit for purpose quality management system for military forensic exploitation.
Wilson, Lauren Elizabeth; Gahan, Michelle Elizabeth; Robertson, James; Lennard, Chris
2018-03-01
In a previous publication we described a systems approach to forensic science applied in the military domain. The forensic science 'system of systems' describes forensic science as a sub-system in the larger criminal justice, law enforcement, intelligence, and military systems, with quality management being an important supporting system. Quality management systems help to ensure that organisations achieve their objective and continually improve their capability. Components of forensic science quality management systems can include standardisation of processes, accreditation of facilities to national/international standards, and certification of personnel. A fit for purpose quality management system should be balanced to allow organisations to meet objectives, provide continuous improvement; mitigate risk; and impart a positive quality culture. Considerable attention over the last decades has been given to the need for forensic science quality management systems to meet criminal justice and law enforcement objectives. More recently, the need for the forensic quality management systems to meet forensic intelligence objectives has been considered. This paper, for the first time, discusses the need for a fit for purpose quality management system for military forensic exploitation. Crown Copyright © 2018. Published by Elsevier B.V. All rights reserved.
Gbadebo-Goyea, Ernest Ayodele; Akpudo, Hilary; Jackson, Cynthia D.; Wassef, Tamer; Barker, Narviar C.; Cunningham-Burley, Rhonda; Ali, Shahid A.; Jabeen, Shagufta; Bailey, Rahn Kennedy
2012-01-01
The importance and relevance of forensic practice to societal evolution has increased exponentially in recent years. As society evolves in its understanding of the complex relationships between mankind and society, we rely more and more on the services of forensic experts. This article elucidates the professions of forensic psychiatry and forensic psychology. We examine the two distinct professions from the spectrum of collaboration, integration of services, differences, and similarities. We also compare and contrast the educational background and training requirements for these two professions; and present illustrative scenarios and real life examples of the daily functions of both professionals. Lastly, we present demographic data for the areas of employment, numbers, and geographic distribution of the two professions. Forensic psychiatry is the interface between medicine and law, while forensic psychology is the interface between psychology and law. As such, these professions are mired with complexities and challenged by vulnerabilities. Professionals from both fields can serve as expert witnesses in court and therefore face similar challenges in their course of professional practice. Collaboration between these two professions has the potential to increase both the credibility and utility of forensic services to the courts, the individuals served, and the general public. PMID:23162478
The Veterinary Forensic Necropsy: A Review of Procedures and Protocols.
Brownlie, H W Brooks; Munro, R
2016-09-01
Investigation of animal-related crime, and therefore submission of forensic cases to veterinary pathology facilities, is increasing, yet many veterinary pathologists are unfamiliar and often uncomfortable with involvement in the forensic necropsy. This article discusses various aspects of the forensic necropsy without specific attention to any particular species group or crime. General advice is given on procedures, documentation, and recording of the examination, and the article indicates how these features may differ from those used in investigation of natural disease. It also discusses evidence management, including recordkeeping, identification of evidence, labeling of photographs, and use of standard operating procedures and protocols. Various written and visual methods for documentation of the forensic necropsy are covered, and adjunctive topics such as sample collection, assessment, and description of wounds and taphonomy are included. Cause, mechanism, and manner of death are defined, and guidance to the use of these terms is given. The aim of this article is to offer guidance on procedural aspects of the forensic necropsy that will help those developing their forensic services, contribute to standardization of the provision of forensic veterinary pathology, and build the confidence of the "uncomfortable" forensic veterinary pathologist. © The Author(s) 2016.
Energy efficient hybrid computing systems using spin devices
NASA Astrophysics Data System (ADS)
Sharad, Mrigank
Emerging spin-devices like magnetic tunnel junctions (MTJ's), spin-valves and domain wall magnets (DWM) have opened new avenues for spin-based logic design. This work explored potential computing applications which can exploit such devices for higher energy-efficiency and performance. The proposed applications involve hybrid design schemes, where charge-based devices supplement the spin-devices, to gain large benefits at the system level. As an example, lateral spin valves (LSV) involve switching of nanomagnets using spin-polarized current injection through a metallic channel such as Cu. Such spin-torque based devices possess several interesting properties that can be exploited for ultra-low power computation. Analog characteristic of spin current facilitate non-Boolean computation like majority evaluation that can be used to model a neuron. The magneto-metallic neurons can operate at ultra-low terminal voltage of ˜20mV, thereby resulting in small computation power. Moreover, since nano-magnets inherently act as memory elements, these devices can facilitate integration of logic and memory in interesting ways. The spin based neurons can be integrated with CMOS and other emerging devices leading to different classes of neuromorphic/non-Von-Neumann architectures. The spin-based designs involve `mixed-mode' processing and hence can provide very compact and ultra-low energy solutions for complex computation blocks, both digital as well as analog. Such low-power, hybrid designs can be suitable for various data processing applications like cognitive computing, associative memory, and currentmode on-chip global interconnects. Simulation results for these applications based on device-circuit co-simulation framework predict more than ˜100x improvement in computation energy as compared to state of the art CMOS design, for optimal spin-device parameters.
The forensic aspects of sexual violence.
Newton, Mary
2013-02-01
Complainants of sexual assault may disclose to different agencies, the police and health professionals being the most likely. It is possible for certain evidence types to be collected before a clinical forensic assessment takes place that do not require the need for a Forensic Medical Practitioner. If the time frames after the incident and the nature of assault warrant the need for a forensic medical examination of either a complainant or a suspect, this should only be conducted by doctors and nurses who have received relevant, up-to-date specialist theoretical and practical training. Clear evidence shows that few other criminal offences require as extensive an examination and collection of forensic evidence as that of a sexual assault. The forensic evidence in a case may identify an assailant, eliminate a nominated suspect(s), and assist in the prosecution of a case. The elements of forensic medical examination, reviewed in this chapter, are those that are the most varied across jurisdictions around the world currently. Key focus points of this chapter are considerations for early evidence collection, utilising dedicated medical examination facilities for sample collection, contamination issues associated with evidence collection and certain practical aspects of forensic sampling methods which have evolved given results identified by Forensic Scientists processing evidential samples in sexual assault cases, Some of the problems encountered by the forensic science provider will also be discussed. Copyright © 2012 Elsevier Ltd. All rights reserved.
Founding editorial--forensics and TheScientificWorld.
Rowe, W
2001-10-30
At the beginning of a new millennium it seems a good idea to stop for a moment and take stock of the current state of forensic science. As a field of scientific research and scientific application, forensic science is a little more than a century old. Forensic science may be said to have begun in 1887 with the simultaneous publication of A. Conan Doyle's A Study in Scarlet and Hans Gross's Handbuch f1/4r Untersuchungsrichter. Conan Doyle's novel introduced to the world the character of Sherlock Holmes, whose literary career would popularize the use of physical evidence in criminal investigations. Gross's manual for examining magistrates suggests ways in which the expertise of chemists, biologists, geologists, and other natural scientists could contribute to investigations. Gross's book was translated into a number of languages and went through various updated editions during the course of the century. The intervening century saw the development and application of fingerprinting, firearm and tool mark identification, forensic chemistry, forensic biology, forensic toxicology, forensic odontology, forensic pathology, and forensic engineering. Increasingly, the judicial systems of the industrial nations of the world have come to rely upon the expertise of scientists in a variety of disciplines. In most advanced countries, virtually all criminal prosecutions now involve the presentation of scientific testimony. This has had the beneficial effect of diminishing the reliance of courts on eyewitness testimony and defendant confessions.