Forensic Ballistics – Case Study via Forensic’s blog

Case 1 (Russ Columbo Killed) The case related to Fatal injuries & Ricocheting: A notable example of the power of a ricochet was given by the fatal accident which occurred in the fall of 1933 when an actor Russ Columbo was accidentally killed by the explosion of the charge in an old muzzle-loading pistol which […]

Forensic Ballistics – Case Study — Forensic’s blog
Advertisement

Principles of Forensic Science

Sources:A Closer Look On Forensic Science written by Archana Singh

laws.pngLaws and Principles of Forensic Science

Introduction

Forensic Science is the science which has developed its own Laws and Principles. The Laws and Principles of all the natural sciences are the bases of Forensic Science.

Every object, natural or man-made, has an individuality which is not duplicated in any other object.

1. Law of Individuality

Anything and everything involved in a crime, has an individuality. If the same is established, it connects the crime and the criminal.

This principle at first sight appears to be contrary to common beliefs and observations. The grains of sand or common salt, seeds of plants or twins look exactly alike.

2. Principle of exchange

Contact exchange traces is principle of exchange. It was first enunciated by the French scientist, Edmond Locard. Commonly known as Edmond Locard’s maxim on Interchange.

According to the principle, when a criminal or his instruments of crime come in contact with the victim or the objects surrounding him, they leave traces. Likewise, the criminal or his instruments pick up traces from the same contact.

3. Law of progressive change

“Change is inevitable” , this also applies to object. Different types of objects may take different time spans.

The criminal undergoes progressive changes. If he is not apprehended in time, he becomes unrecognizable.

The scene of occurrence undergoes rapid changes. The weather, the vegetable growth, and the living beings make extensive changes in comparatively short periods.

Samples degrade with time, Bodies decompose, tire tracks & bite marks fade, the firearm barrel loosen, metal objects rust, etc.

4. Principle of comparison

“Only the likes can be compared” is the principle of comparison.

It emphasize the necessity of providing like samples and specimens for comparisons with the questioned items.

A questioned hair can only be compared to another hair sample, same with tool marks, bite marks, tire marks, etc.

For example

A specimen obtained by writing on the same wall, at the same height and with the same instrument and then photographed. It can be matched.

Once handwriting available on a photograph allegedly written on a wall was compared with the specimen written on paper. It did not give worthwhile results.

5. Principle of analysis

The Analysis can be no better than the sample analyzed.

Improper sampling and contamination render the best analysis useless.

The principle emphasizes the necessity of correct sampling and correct packing for effective use of experts.

6. Law of probability

All identification, definite or indefinite, are made, consciously or unconsciously, on the basis of probability.

Probability is mostly misunderstood. If we say that according to probability a particular fingerprint has come from the given source, but it is not a definite opinion.

Probability is a mathematical concept. It determines the chances of occurrence of a particular event in a particular way.

If “P” represents probability, “Ns” the number of ways in which the event can successfully occur (with equal facility) and “Nf” the number of ways in which it can fail ( with equal facility) , the probability of success is given by the formula:

7. Law Of Circumstantial Facts

“facts do not lie, men can and do”

Evidences given by eye witnesses or victims may not always be accurate.

Sometimes victims may intentionally lie or sometimes because of poor senses (such as low sight, unclear hearing), exaggeration & assumptions.

According to Karl Marx “True belief only becomes knowledge when backed by some kind of investigation and evidence”.

Watch it🤳, share it ✌and subscribe it 👇 : –

Laws & Principles of Forensic Science

Know More Details of Laws and Principles of Forensic Science; Read

“A Closer Look On Forensic Science”

  • Share
  • 17Comments

 

Forensic Science is the science which has developed its own Laws and Principles. The Laws and Principles of all the natural sciences are the bases of Forensic Science…READ MORE….

via Laws and Principles of Forensic Science — Forensic’s blog

Variables to consider when Determining Post Mortem Blood Alcohol Levels via True Crime Rocket Science / #tcrs

Immediately following the release of the autopsy reports on November 19th, I contacted Thomas Mollett, a forensic investigator, fellow true crime author and friend, and asked him his opinion on Shan’anns Blood Alcohol Levels. They were found to be three times the legal limit for driving. How likely was it, I asked, that these apparently high levels were from “normal” decomposition?

SUPPLEMENTAL

Autopsy reports show Shanann Watts, daughters were asphyxiated – TimesCall

Fullscreen capture 20181217 233710

Pathology is an extremely complex science, and many factors play into the biological processes that occur after death.

image001

The three basic pillars one uses to calculate whether the BAC is “normal” or not are related to:

  1. the time the body is exposed to the elements [here time of death is a factor, unknown in this case, but with a relatively short window either way]
  2. the ambient conditions of the body [temperature, humidity etc.]
  3. circumstantial evidence is also a vital tool to gauge alcohol content, including eye witnesses, Shan’ann’s drinking habits, and her appearance in the Ring camera footage when she arrived home [described but not released thus far]

During our first communication I miscommunicated to Mollett that Shan’ann’s corpse was recovered after only 48 hours, which I guessed wasn’t enough time to reflect the high alcohol levels found. This was an initial error on my part; it took closer to 70 hours for Shan’ann’s corpse to be discovered and exhumed.

Based on this initial miscommunication, Mollett also believed the BAC level was likely higher than a natural rate [which as I say, was also what I suspected].

I asked Mollett to investigate the BAC levels and I’m grateful to him for doing so in detail. Obviously part of his thorough investigation corrected the original 48 hour error.

Below is Mollet’s unabridged report on the BAC levels.

Fullscreen capture 20181217 230915Fullscreen capture 20181217 230922Fullscreen capture 20181217 230928Fullscreen capture 20181217 230933Fullscreen capture 20181217 230940Fullscreen capture 20181217 231003Fullscreen capture 20181217 231009Fullscreen capture 20181217 231013Fullscreen capture 20181217 231022Fullscreen capture 20181217 231028

Fullscreen capture 20181217 235348Fullscreen capture 20181217 235321Fullscreen capture 20181217 231033Fullscreen capture 20181217 231105

20181119__20TCAAUTw_1

  • Share
  • 9Comments
9 COMMENTS
  • Helen

    Helen

    I think Chris tied Shanann to the bed after she fell asleep, put a pillow case over her mouth to prevent her from screaming, made sure she watched through the monitor how he smothered Bella and Celeste, and then came back to the bedroom to strangle her.

    Reply
  • BAMS13

    BAMS13
    Helen

    You’re going to get in trouble from Nick now… lol.

    Reply
  • nickvdl

    nickvdl
    BAMS13

    Bams, can I let you take it from here? I can’t always be the one cracking the whip 😉

    Reply
  • BAMS13

    BAMS13
    nickvdl

    Haha! Always happy to try and exert my low ranking power anytime. You’d think those virtual whip cracks can be heard loud and clear though. 😉

    Reply
  • Syzia

    Syzia

    Helen took it to the next level here

    Reply
  • Marie

    Marie
    Syzia

    Oh yes syzia, I agree

    Reply
  • Karen

    Karen

    Well, that report certainly cleared up so many things. Now we know. The body certainly is a fascinating animal in death as much as life. I do know that when officer Coonrod was in the kitchen he didn’t have a peek in the sink to see if there were breakfast dishes in there to find out if the kids had eaten so we couldn’t see if there was a wine glass. Nor did I see any at all throughout his whole walk through the house. Thorough report

    Reply
  • Sylvester

    Sylvester

    “Important moments at Watt’s well site” is really stunning. I hope everyone can blow it up on a computer monitor rather than a cell phone. You really get the sense of vastness of that site – miles and miles in every direction of land dotted with wildflowers. The tank battery site even seems dwarfed in proportion to the land. As the drone makes it’s lazy pass from the air you then see the sheet, hugging the scrub. Look a little closer and you see the black garbage bags. It was rather stupid of him to discard the sheet on top of the land after it had fulfilled it’s purpose to conceal and drag. Same with the garbage bags. Maybe he thought in the vastness of the land those items, like his family, would simply vanish.

    Reply
  • Karen

    Karen
    Sylvester

    Sylvester, do you know if they sent the drone out before Chris said anything or after? For the life of me, I can’t remember. Thank you kindly

    Reply

JZ Logistics @ The Internet Truck Stop


SEND

Immediately following the release of the autopsy reports on November 19th, I contacted Thomas Mollett, a forensic investigator, fellow true crime author and friend, and asked him his opinion on Shan’anns Blood Alcohol Levels. They were found to be three times the legal limit for driving. How likely was it, I asked, that these apparently high […]

via Thomas Mollett’s Forensic Report on Shan’ann Watts’ Post Mortem Blood Alcohol Level — True Crime Rocket Science / #tcrs

Focused Digital Forensic Methodology — Forensic Focus – Articles

Abstract

Since the end of the 19th Century until the current time, law enforcement has been facing a rapid increase in computer-related crimes. In the present time, digital forensics has become an important aspect of not only law enforcement investigations, but also; counter-terrorism investigations, civil litigations, and investigating cyber-incidents. Due to rapid developing and evolving technology, these types of forensic investigations can become complex and intricate. However, creating a general framework for digital forensic professionals to follow during those investigations would lead to a successful retrieval of relevant digital evidence. The digital forensic framework or methodologies should be able to highlight all the proper phases that a digital forensic investigation would endure to ensure accurate and reliable results. One of the challenges that digital forensic professionals have been facing in the recent years is the volume of data submitted for analysis. Few digital forensic methodologies have been developed to provide a framework for the entire process and also offer techniques that would assist digital forensic professionals to reduce the amount of analyzed data. This paper proposes a methodology that focuses mostly on fulfilling the forensic aspect of digital forensic investigations, while also including techniques that can assist digital forensic practitioners in solving the data volume issue.

Focused Digital Forensic Methodology

Modern society has become very dependent on computers and technology to run all aspects of their lives. Technology has had a very positive impact on humanity, which can be easily proven with a short visit to any hospital and witnessing how computers and technology have become tools used to treat and save lives. However, computers have an indisputable disadvantage of being used as a tool to facilitate criminal activities. For instance, the sexual exploitation of children can be performed using the Internet, which would allow criminals to remain anonymous while preying on innocent children. The number of digital related crimes are increasing, which makes law enforcement agencies engaged in a constant battle against criminals who use this technology to commit crimes. As a result, digital forensics has become an important part of law enforcement investigations. Digital forensics is not only performed during law enforcement investigations but can also be conducted during the course of civil matters.

The fact that the information obtained from digital forensic investigations would and can be used as evidence during legal proceedings means that the entire process must be performed according to the legal standards. Perumal (2009) explained that the legal system requires digital forensic processes to be standardized and consistent. One of the issues that Perumal highlighted was the fact that digital evidence is very fragile and the use of improper methods could potentially alter or eliminate that evidence. There are a huge number of methodologies that have been developed all over the world, many of them were designed to target a specific type of technology (Selamat, Yusof, and Sahib, 2008). Also, many methodologies were developed to address requirements imposed by the legal system in certain jurisdictions. One of the methodologies that did not base their theory on technology or the law is the Integrated Digital Investigation Process (IDIP) Model. Carrier and Spafford (2003) explained that the IDIP Model is based on the Locard Exchange Principle, which is used to retrieve evidence from physical crime scenes. The IDIP Model uses the idea that when software programs were being executed in an electronic environment, electronic artifacts would most likely be created on the underlying device. Those artifacts can be retrieved and analyzed to obtain information about a certain incident or event.

This paper examines different literatures that present different types of digital forensic methodologies. Some of these methodologies have taken the focus away from the forensic aspect of digital forensic investigations. Instead, these methodologies have addressed crime scenes and other processes that are not related to the digital forensic field. Also, much research has been focused on creating solutions to the challenges that digital forensic practitioners are facing when conducting digital forensic investigations. One of the main challenges that multiple literatures have addressed is the constant increase in the volume of data that practitioners are acquiring and examining during investigations. This paper proposes a digital forensic methodology that would allow forensic practitioners to overcome the data volume issue and eliminate the lack of focus found in many methodologies.

Previous Work

As it was mentioned above, there are a large number of digital forensic methodologies that were developed all over the world. One of the first serious attempts to develop a standardized methodology that could be used during digital forensic investigations was in 1995. Pollitt (1995) utilized processes that were originally developed to handle physical evidence as a framework to create a methodology for digital forensic investigations. The author’s approach to creating different phases being conducted during an investigation was inspired by many factors that the legal system considers when evaluating any type of evidence. The court would evaluate; whether the seizure was properly conducted, was there any alteration that occurred with the evidence, and what methods were used to examine the evidence. The proper performance of all these steps would allow any type of evidence to be admitted by the court. Pollitt (1995) developed a methodology that consisted of four phases; acquisition, identification, evaluation, and admission as evidence. This methodology focused mostly on the forensic aspect of the investigation and did not extend to other processes that other researchers have considered in their methodology; preparation, planning, and the search of physical crime scene.

Many digital forensic methodologies were developed after Pollitt’s methodology. Some of those methodologies have used different terminology and sequencing of the phases that a forensic practitioner would have to perform throughout their investigations. Most of the methodologies have agreed on certain processes that are related to the forensic aspect of digital forensic investigations (Selamat et al., 2008). Selamat et al. studied 11 different digital forensic methodologies and concluded that all of them had common phases; preservation, collection, examination, analysis, and reporting. This means that all these researchers have agreed on these specific phases and any newly developed methodology would have to include similar phases.

According to Ruibin, Yun, and Gaertner (2005), the proper completion of any digital forensic investigation is directly related to conducting the processes that are similar to the ones highlighted by Selamat et al. (2008). Ruibin, Yun, and Gaertner also explained that in order to properly perform these phases, proper technique must be used. These techniques would ensure that the authenticity and reliability of the evidence is acceptable by the legal standards of the jurisdiction where the methodologies are being implemented. The use of the term legal is not foreign to digital forensic methodologies, as many researchers have addressed the importance of performing digital forensic investigations using the proper legal authorizations. For instance, the Integrated Digital Investigation Process (IDIP) Model has included obtaining legal authorization to perform a digital forensic investigation as one of the sub-phases of the Deployment Phase (Baryamureeba and Tushabe, 2004).

The IDIP Model was revised by Baryamureeba and Tushabe (2004) after noticing some practicality and clarity problems. Baryamureeba and Tushabe named the revised version as the Enhanced Integrated Digital Investigation Process (EIDIP) Model. In the EIDIP Model, the authors focused on two aspects, the sequence of the phases and clarity in regard to processing multiple crime scenes. The EIDIP proposed a modification to the deployment phase of the IDIP Model and included investigation of the physical and digital scenes as a way to arrive at the confirmation phase. Also, Baryamureeba and Tushabe added the Traceback phase, which aims at using information obtained from the victim’s machine to trace back other machines used to initiate the incident.

Challenges Facing Current Methodologies

Technology has been developing on two aspects; hardware and software. For instance, a mobile device hardware has seen great advances that allows these devices to be able to perform complex operations efficiently. At the same time, the software operates on mobile devices has also undergone great advancements to be able to support the consumers’ demand. However, these enormous changes in technology have affected the digital forensic methodologies, especially the ones that evolved around a certain set of technologies. Selamat et al. (2008) explained that there are many digital forensic methodologies that have been developed to target certain devices or a specific type of technology. The main problem with this type of methodology is the rapid changes of the underlying technology, which render these methodologies obsolete.

The legal system in different jurisdictions view digital forensics differently, which reflects on the methodologies used by forensic practitioners in those jurisdictions. According to Perumal (2009), “As computer forensic is a new regulation in Malaysia, there is a little consistency and standardization in the court and industry sector. As a result, it is not yet recognized as a formal ‘Scientific’ discipline in Malaysia” (p. 40). This means that the most affected jurisdictions are ones that have not developed a full understanding of computer forensics and the processes used to preserve and analyze electronic evidence. Also, the lack of understanding by the legal system would reduce the influence that the legal system has on shaping methodologies and making them acceptable by legal standards.

One of the other challenges related to digital forensic methodologies had been caused by the researchers who develop these methodologies. Some researchers have used titles and terminology in naming their methodologies that is not related to digital forensics. For instance, Baryamureeba and Tushabe (2004) named the fourth stage of the EIDIP Model as the Dynamite Phase, which includes Reconstruction and Communication as sub-phases. This lack of clarity in terminology would have a negative impact on any effort to help groups outside the digital forensic arena to have a better understanding of the processes used in the digital forensic field. As it was explained above, some jurisdictions across the globe are still unsure about digital forensics and the evidence obtained from a digital forensic investigation. This means that there would be advantages for researchers to utilize more modest and familiar terminology when addressing digital forensic methodologies. This simplicity in the terminology would assist the legal system in having a better understanding of the digital forensic processes.

The same challenges that the digital forensic field is currently facing can also be seen as challenges to digital forensic methodologies. Some of those challenges are; volume of data, encryption, anti-forensic techniques, and lack of standards. The reason these factors are perceived as challenging is because they have been slowing down the progression of digital forensic investigations. For instance, a fully encrypted computer system and an undisclosed encryption key would prevent practitioners from gaining access to the data, which ultimately imposes a challenge on the entire digital forensic process. One of the challenges that has been addressed by many researchers is the volume of data examined by forensic practitioners during digital forensic investigation. Examining a large amount of information during a digital forensic investigation would slow down the entire forensic process and affect the flow of operations for forensic laboratories.

Volume of Data

The increase in the volume of data was caused by the increasing sizes of electronic storage devices and at the same time the significant decrease in prices of those devices. According to Quick and Choo (2014), digital forensic practitioners have seen a significant increase in the amount of data that is being analyzed in every digital forensic examination. The authors explained that three factors have contributed to the volume of data that has become an issue for digital forensic practitioners; increase in the number of electronic devices for each investigation, the increase in the size of memory for those devices, and the number of investigations that require digital forensic examinations.

The significant increase in the volume of data has caused a great burden on forensic laboratories. Digital forensic practitioners are forced to spend longer times examining and analyzing larger data sets, which cause huge delays in completing digital forensic investigations. Quick and Choo (2014) explained that forensic laboratories have backlogs of work caused by the amount of time spend on each single examination. Some may argue that the increased amount of data can be an advantage as consumers are not forced to delete any data. However, Quick and Choo (2014) highlighted the seriousness of the data volume issue and stated, “Serious implications relating to increasing backlogs include; reduced sentences for convicted defendants due to the length of time waiting for results of digital forensic analysis, suspects committing suicide whilst waiting for analysis, and suspects denied access to family and children whilst waiting for analysis” (p. 274).

Current Solutions to the Data Volume Issue

Ruibin et al. (2005) offered a way to reduce the amount of data for each case by determining the relevant data based on the preliminary investigation. The relevant data for a certain case can be determined through two sources; case information and the person investigating the matter. Combining the information from both sources would assist in building a case profile, which can then be used to determine what type of information would be relevant for each forensic examination. The solution proposed by Ruibin et al. (2005) did not focus on using the technology to reduce the amount of data; however, there were other proposed solutions that suggested using technology to eliminate the data volume issue.

Neuner, Mulazzani, Schrittwieser, and Weippl (2015) proposed a technique that depends on technology to reduce the data volume. Their technique is based on the idea of file deduplication and file whitelisting. Deduplication and file whitelisting techniques would allow digital forensic practitioners to reduce the number of files that would have to be reviewed. Reducing the number of files would reduce the amount of time needed to complete the entire process. The authors defined the whitelisting technique as a way to compare a known list of hash values to the evidence and exclude any matches, as the contents of those files have already been determined. This list of hash values can either represent safe files or known contraband. The method offered by Neuner et al. (2015) is completely automated, and it would not require any human intervention, which means that no manpower is required to perform this task. Both solutions explained above are not controversial, as they utilize standard methods to locate the evidence. However, that is not the case with all solutions proposed to solve the data volume issue.

Quick and Choo (2014) explained that many researchers have addressed the issue of data volume through the use of the term sufficiency of examination. Those researchers did not focus on reducing the amount of data to be examined. Instead, they proposed limiting the search for electronic information only to the amount that would answer the main questions of the investigation. In other words, if a digital forensic practitioner examining a computer system for any evidence related to a child pornography investigation, the examination can be stopped once enough evidence was found to charge the suspect. This means that not all of the computer system would be examined and practitioners would be able to complete more examinations in a shorter period of time.

Some may argue that conducting a partial examination of the data could potentially lead to missing valuable digital evidence. For instance, in the example above concerning conducting a partial examination of child pornography evidence, conducting a full exam may lead to discovering pictures and videos of minors that are being sexually exploited. Those victims can potentially be identified and rescued. This means that conducting a partial examination of the evidence could possibly prevent those victims from being rescued. Still, assuming a full exam could lead to identifying other victims does not stand when confronted by the facts presented by Quick and Choo’s (2014), which highlighted the fact that delaying the results of a forensic exam has grievous negative effects. These effects can be seen on suspects who are waiting a long time for forensic practitioners to conclude their exams. The same goes for the victims, as they are not able to get any closure during the investigation, as they all have to await the exam to be concluded.

The Proposed Methodology

Digital forensic practitioners continue to face a great deal of pressure from the challenges explained earlier. These challenges are placing obstacles in the way of examinations, in return causing practitioners to spend an extensive amount of time working on each investigation. However, it appears that researchers have not invested much effort into creating methodologies that would support practitioners to ease the pressure and eliminate the challenges. However, some may impose a compelling argument that not all challenges can be resolved in the context of the methodologies. For instance, data encryption is one of the issues that prevents practitioners from accessing the evidence and can be categorized as a technical challenge. This means that researchers would not be able to address this challenge in the context of a digital forensic methodology as methodologies are supposed to address higher level processes that occur during digital forensic investigations. Even though this argument seems compelling, practitioners can still create methodologies that are at least capable of reducing the workload pressure away from practitioners.

Selamat et al. (2008) described the Extended Model presented by Ciardhuain (2004) as a complete framework that provides clear stages for digital forensic investigations. Ciardhuain (2004) suggested that there are multiple steps that must be taken throughout digital forensic investigations; awareness, authorization, planning, notification, search and identification of evidence, collection, transport, storage, examination, hypotheses, presentation, proof/defense, and dissemination. Selamat et al. (2008) also explained that the Extended Model included all five phases that were agreed upon by many researchers. This means the remaining phases of the Extended Model are not related to digital forensics and removing them would not affect the authenticity or reliability of the electronic evidence. However, some may argue that the Extended Model was not intend to be conducted by only digital forensic practitioners, as many phases of the model can be performed by non-digital forensic practitioners. For instance, in a criminal investigation, completing the authorization phase can be performed by law enforcement personnel to grant forensic practitioners lawful access to the evidence. This means that the Extended Model, is a framework that is not only for practitioners, but is for all investigations that involve digital evidence.

This paper proposes a new methodology, Focused Digital Forensic Methodology (FDFM), that is capable of eliminating the data volume issue and the lack of focus with the current digital forensic methodologies. The FDFM is designed to be a reflection of the current workflow of law enforcement and civil investigations. The FDFM focuses on ensuring that digital forensic investigations are being conducted properly without overloading practitioners with unrelated activities. Further, the FDFM proposes techniques to reduce the volume of data to cut on time required to complete examinations of electronic evidence, especially on larger data sets. This paper proposes a new methodology, Focused Digital Forensic Methodology (FDFM), that is capable of eliminating the data volume issue and the lack of focus with the current digital forensic methodologies. The FDFM is designed to be a reflection of the current workflow of law enforcement and civil investigations. The FDFM focuses on ensuring that digital forensic investigations are being conducted properly without overloading practitioners with unrelated activities. Further, the FDFM proposes techniques to reduce the volume of data to cut on time required to complete examinations of electronic evidence, especially on larger data sets.

A quick review of the Extended Model would lead to a conclusion that it focuses on activities related to evidence that is considered common knowledge in the law enforcement field and digital forensic field. For instance, the transportation and storage activities of the EIDIP are two parts of evidence handling that is being trained to law enforcement personnel and digital forensic practitioners. So, it would not be of value to emphasiz the idea that digital forensic practitioners must transport and store the evidence after it was collected. For that reason, the FDFM has excluded aspects that can be considered common knowledge in the digital forensic field, which are related to the proper handling of evidence.

Phases of the FDFM

The FDFM is designed in a way similar to the IDIP and EIDIP, as it is broken down into multiple phases, which are further broken down into sub-phases. The FDFM is designed in a way similar to the IDIP and EIDIP, as it is broken down into multiple phases, which are further broken down into sub-phases.

Preparation Phases. The preparation phase can be applied in two situations; when creating a new digital forensic team and after completing a digital forensic investigation. This phase is mainly aimed at ensuring that digital forensic teams, no matter what their mission might be, are capable of initiating and completing an investigation properly and without any problems. Just as the case for the EIDIP, the focus in this phase is ensuring that the forensic team is trained and equipped for their assigned mission.

Training. To ensure the forensic team is executing a forensic methodology properly, they must have all the training that would equip all team members with the knowledge needed. This training does not only focus on how to collect or search evidence properly but also trains the members on how to use the tools needed during those processes. For instance, the team should have the knowledge needed regarding the value of preserving data. They should also be able to utilize any software or hardware tools that are capable of preserving and acquiring data from different platforms.

Equipment. There are many tools that digital forensic professionals utilize during investigations that are capable of serving different purposes. One of the functions that those tools are able to accomplish is automating different processes during the investigation, and completing those jobs in a timely manner. Depending on the main mission of the forensic team, tools and equipment must be available to ensure a proper and fast completion of any digital investigation.

On-Scene Phases. This phase focuses on processes that would be accomplished in the event that a digital forensic team was called in to assist with executing search warrants or even preserving data for a civil litigation.

Physical Preservation. During this phase, digital forensic practitioners ensure that any item that may contain electronic information of value is protected. This protection would ensure that no damage would be inflected on any electronic device that can cause the loss of the information within. For instance, if a digital forensic practitioner found one of the items sought during the search of a residence, this item must be kept in a location under the control of the searching team. This means that any occupant in the residence would not be able to cause any damage to the device, which they would possibly attempt if they believed that it contained incriminating evidence.

Electronic Isolation. The other part of the preservation is ensuring that the information within the collected device is preserved by eliminating any electronic interference. An item like a mobile device would have to be isolated from the cellular network to ensure that no one is capable of damaging or changing the data remotely. The same case applies to computers or other items with network connectivity, as suspects could connect remotely to those devices and attempt to eliminate any information that is potentially damaging to their case. Electronic Isolation. The other part of the preservation is ensuring that the information within the collected device is preserved by eliminating any electronic interference. An item like a mobile device would have to be isolated from the cellular network to ensure that no one is capable of damaging or changing the data remotely. The same case applies to computers or other items with network connectivity, as suspects could connect remotely to those devices and attempt to eliminate any information that is potentially damaging to their case.

Electronic Preservation. The last part of preservation is creating a complete or partial duplicate of the targeted electronic information. The created copy would ensure that the electronic evidence is preserved in a forensic image. In the event that the devices were not supposed to be removed from the scene, forensic images would have to be created on scene, which can then be taken back to the laboratory for examination. A partial collection can also be conducted during this phase, which would be especially advantageous for civil litigation purposes. In those cases, the collection of an entire computer system is not recommended, and practitioners would have to search for and collect only the relevant data.

Laboratory Phases. These phases are conducted when the team is at the laboratory and have all the evidence or forensic images collected from the scene. Prior to interacting with the evidence, an attempt would be made to reduce the volume of data that an examiner would have to process and analyze. The reduction of data volume is crucial for cases that have a huge number of electronic devices and a large volume of storage for electronic information. As it was explained earlier, reducing the volume of data would expedite the examination of the evidence and allow for a better workflow. Once the reduction of data has been completed, examiners can begin processing and analyzing data.

Building Case Profile. This phase is somewhat similar to the creation of a case profile presented by Ruibin et al. (2005). These authors suggested using input from the investigation to identify the type of information that a digital forensic practitioner would need to focus on finding during the examination. For instance, if the case is related to pictures of evidentiary value, then a practitioner would need to be focused on reviewing all the pictures found on a device, without the need to focus on any other type of electronic information. For the FDFM, building a case profile would begin, just as the case for Ruibin et al. (2005), with obtaining information from the investigating agency regarding their investigation. The obtained information must focus specifically on the relationship between the electronic evidence and the incident under investigation. In other words, the investigating agency would have to provide information about what role the devices played in the incident. For instance, a mobile device would be submitted to the digital forensic team as part of a rape investigation. The investigating agency would have to prove how the mobile device was related to the rape incident. In these situations, the phone could have been used by the suspect to communicate with or lure the victim into a certain location. Building Case Profile. This phase is somewhat similar to the creation of a case profile presented by Ruibin et al. (2005). These authors suggested using input from the investigation to identify the type of information that a digital forensic practitioner would need to focus on finding during the examination. For instance, if the case is related to pictures of evidentiary value, then a practitioner would need to be focused on reviewing all the pictures found on a device, without the need to focus on any other type of electronic information. For the FDFM, building a case profile would begin, just as the case for Ruibin et al. (2005), with obtaining information from the investigating agency regarding their investigation. The obtained information must focus specifically on the relationship between the electronic evidence and the incident under investigation. In other words, the investigating agency would have to provide information about what role the devices played in the incident. For instance, a mobile device would be submitted to the digital forensic team as part of a rape investigation. The investigating agency would have to prove how the mobile device was related to the rape incident. In these situations, the phone could have been used by the suspect to communicate with or lure the victim into a certain location.

Once all the information was obtained regarding the investigation and the evidence, the type of data relevant to the investigation can be determined. In the example above regarding the rape case, the suspect may have used text messages to communicate with the suspect, which makes any text base communication between both parties relevant and must be reviewed and analyzed. In some cases, determining the approximate size of information sought can also be relevant and would allow for the examination to be even more focused. For instance, an investigating agency submitted one 500 gigabyte external drive and one 8 gigabyte thumb drive to the digital forensic team for examination. The investigation was seeking documents approximately 30 gigabytes in size relevant to a fraud case. In this situation, a forensic practitioner would focus on the external drive as it most likely contains the documents because it is more than 20 gigabytes in size. In the same sense, the 8-gigabyte thumb drive most likely does not have the documents because of its small size.

The next step of the case profile is determining the most relevant type of devices based on the information obtained thus far about the investigation. If the examination is seeking text-based messages sent to the victim, then it likely means that a mobile device was used to send those messages. However, this does not mean that a computer cannot be used to send such messages, but a mobile device is the most likely suspect in this situation. Then, the profile can provide further emphasis on the possibility of a mobile device being the source of the relevant messages. It is apparent from the above that building a case profile would require an experienced digital forensic practitioner, using prior experience and knowledge while building the case profile would result in a more accurate and realistic conclusion. The next step of the case profile is determining the most relevant type of devices based on the information obtained thus far about the investigation. If the examination is seeking text-based messages sent to the victim, then it likely means that a mobile device was used to send those messages. However, this does not mean that a computer cannot be used to send such messages, but a mobile device is the most likely suspect in this situation. Then, the profile can provide further emphasis on the possibility of a mobile device being the source of the relevant messages. It is apparent from the above that building a case profile would require an experienced digital forensic practitioner, using prior experience and knowledge while building the case profile would result in a more accurate and realistic conclusion.

The final step of the case profile is setting goals that the investigation is hoping to accomplish at the end of the examination. These goals are based on all the information gathered thus far and how the evidence was going to prove or disprove an incident or event. For instance, in the example of the rape investigation mentioned above, retrieving the text messages from the mobile device is the first goal to show that the suspect had lured the victim to the crime scene. The timeline of those messages is another piece of information that would corroborate the victim’s statement regarding different events prior to the incident. While examining the mobile device, these goals would make it clear to the digital forensic practitioner what the expected results following the examination of the device. The final step of the case profile is setting goals that the investigation is hoping to accomplish at the end of the examination. These goals are based on all the information gathered thus far and how the evidence was going to prove or disprove an incident or event. For instance, in the example of the rape investigation mentioned above, retrieving the text messages from the mobile device is the first goal to show that the suspect had lured the victim to the crime scene. The timeline of those messages is another piece of information that would corroborate the victim’s statement regarding different events prior to the incident. While examining the mobile device, these goals would make it clear to the digital forensic practitioner what the expected results following the examination of the device.

In civil litigation cases and even criminal cases, it would be beneficial during this phase to generate a list of keyword searches that could be used during the examination process. Those keywords must be related directly to the evidence and based on the information obtained about the evidence. When dealing with civil litigation cases, the keyword list would become the main method used to locate any responsive and relevant electronic information. The words added to the list must also be related to the goals setup to be accomplished at the end of the investigation. For instance, if the civil case is related to patent infringement, then the keywords would reveal documents or data that could prove or disprove the allegations submitted by one party against the other.

Evaluation of the Evidence. This evaluation of the evidence would have to occur based on the case profile that was created during the previous phase. The main goal of this phase is to exclude any device that does not match the case profile and most likely would not hold any information sought during the examination of the evidence. Excluding items that do not have relevant information from being examined would reduce the amount of information that a digital forensic practitioner examines in each case. This would ultimately cut on the amount of time needed to complete the examinations and give the investigators faster results. As it was explained above, the case profile would determine the type of electronic information, the timeline related to the information, the size of the electronic information, and other aspects of the evidence. Using the generated profile, the items of evidence can be listed in a way that the device most likely containing the information would be placed on the top of the list. The rest of the devices would be placed in the same way, which is based on the likelihood that they would contain the targeted data. Based on this list, the last item of the list would be least likely to contain information relevant to the investigation.

Forensic Acquisition. During this phase, any data that was not acquired or preserved on scene would be imaged. The imaging process would focus on the items that are on the top of the list that was generated during the Evaluation of the Evidence phase. This means that only items that are believed to hold the relevant data would be acquired and not the entire list of items. This would save on the storage space required to save all the forensic images to and also reduce the time required for imaging.

Partial Examination/Analysis. Many digital forensic models separate the examination phase from the analysis phase, just as the case for the Abstract Digital Forensic Model (Reith, Carr, and Gunsch, 2002). Those models assume that a digital forensic practitioner would search the evidence for any relevant data during the examination phase. Then, an analysis would be conducted during the analysis phase to determine the significance of the information found during the examination phase. In the FDFM, those two phases are combined in one phase as they cannot be separated since they occur at the exact same moment during the search for the evidence. The FDFM proposes creating a case profile prior to examining the evidence, which means that a digital forensic practitioner would know what to search for and the significance of the information beforehand. So, while searching for the evidence, examiners would be able to determine the significance of the information as it is being located.

An example of the situation explained above is the rape incident that was mentioned earlier and the mobile device that holds the information related to the incident. At the time when the practitioner they had prior knowledge that the targeted information related to luring the victim to the incident location was in the text messages. While reviewing the text messages, the digital forensic practitioner found a message that showed how the suspect and victim had met. Then, on the day of the incident, other messages were found showing how the victim was lured to the location of the incident. As the forensic practitioner is reviewing the messages, they are evaluating the information simultaneously and weighing the significance of the pieces of information as it is being found. As each text message is going to add another piece of information related to the incident. At the end of this phase, the forensic practitioner will have a full picture of what happened on that day and any other information related to the incident. It would not be practical for the forensic practitioner to go back and reanalyze information that was previously analyzed as the information was being found. It is also worth mentioning that digital forensic practitioners usually mark the relevant data as it is being found to ensure that it is being included in the final report generated by the tool used to review the evidence. An example of the situation explained above is the rape incident that was mentioned earlier and the mobile device that holds the information related to the incident. At the time when the practitioner they had prior knowledge that the targeted information related to luring the victim to the incident location was in the text messages. While reviewing the text messages, the digital forensic practitioner found a message that showed how the suspect and victim had met. Then, on the day of the incident, other messages were found showing how the victim was lured to the location of the incident. As the forensic practitioner is reviewing the messages, they are evaluating the information simultaneously and weighing the significance of the pieces of information as it is being found. As each text message is going to add another piece of information related to the incident. At the end of this phase, the forensic practitioner will have a full picture of what happened on that day and any other information related to the incident. It would not be practical for the forensic practitioner to go back and reanalyze information that was previously analyzed as the information was being found. It is also worth mentioning that digital forensic practitioners usually mark the relevant data as it is being found to ensure that it is being included in the final report generated by the tool used to review the evidence.

The FDFM suggests the use of a method that was referenced by Quick et al. (2014), which aims at conducting a partial examination and analysis of the evidence as a solution for the data volume issue. According to Quick et al. (2014), the digital forensic practitioner would be, “doing enough examination to answer the required questions, and no more” (p. 282). The same concept can be applied using the FDFM, as digital forensic practitioners conduct examinations only to accomplish the goals setup during the Building Case Profile phase. The examination would be performed in the same sequence of relevance as determined during the Evaluation of the Evidence phase. This means that the examination would begin with the more relevant items and continue down the list until all the goals are accomplished. One of the greatest benefits of conducting partial examinations of the evidence is maintaining the privacy of the owners. For instance, mobile devices contain a vast amount of private information about the owners. This means that the more information to be reviewed, the more loss of privacy that would occur. Limiting the examination to the need of the investigation would assist in maintaining a certain limit of privacy for the owner of the data.

Reporting. During this phase, all the information found during the examination would be placed in a report to inform the investigating agency of the findings. There are many report formats used by different agencies. However, all formats have one thing in common, which is that they are all driven by the findings of the examination and not opinions. Reports that are supported by solid evidence are hard to dispute, as the evidence behind the information in those reports would suppress any arguments.

Conclusions and Future Research

There are many literatures that propose different types of methodologies that have different focuses. However, many of those methodologies have included phases that are not related to the forensic aspect of those methodologies. Many researchers also addressed the issue of the volume of data that is causing huge delays with digital forensic exams. The proposed methodology, FDFM, allows digital forensic professionals to be focused more on forensics during any digital forensic investigation. This methodology has excluded any phases that were included in other methodologies and are considered common knowledge within the digital forensic field. The proposed methodology also addressed one of the biggest challenges for digital forensic investigations, which is the volume of data. The FDFM proposed two methods that would allow for reduction in the volume of data, excluding devices that do not contain relevant information and conducting partial examinations. Both techniques can be applied only after a case profile has been generated based on the information obtained by the investigating agency. Future research can be conducted by focusing on integrating other techniques to the FDFM that would eliminate other challenges of digital forensic investigations.

References

Agarwal, A., Gupta, M., & Gupta, S. (2011). Systematic digital forensic investigation model. International Journal of Computer Science and Security (IJCSS), 5(1), 118-131.

Baryamureeba, V., & Tushabe, F. (2004). The Enhanced Digital Investigation Process Model. Proceedings of the Digital Forensic Research Conference. Baltimore, MD.

Carrier, B., & Spafford, E. H. (2003). Getting physical with the Digital Investigation Process. International Journal of Digital Evidence, 2(2), 1-20.Carrier, B., & Spafford, E. H. (2003). Getting physical with the Digital Investigation Process. International Journal of Digital Evidence, 2(2), 1-20.

Ciardhuain, S. O. (2004). An extended model of cybercrime investigations. International Journal of Digital Evidence, 3(1), 1-22.

Neuner, S., Mulazzani, M., Schrittwieser, S., & Weippl, E. (2015). Gradually improving the forensic process. In the 10th International Conference on Availability, Reliability and Security, 404-410. IEEE.

Perumal, S. (2009). Digital forensic model based on Malaysian investigation process. International Journal of Computer Science and Security (IJCSS), 9(8), 38-44.

Pollitt, M. M. (1995). Computer forensics: An approach to evidence in cyberspace. In the 18th National Information Systems Security Conference, 487-491. Baltimore, MD.

Quick, D., & Choo, K. R. (2014). Impact of increasing volume of digital forensic data: A survey and future research challenges. Digital Investigation, 11(4), 273-294.

Reith, M., Carr, C., & Gunsch, G. (2002). An examination of the digital forensic models. International Journal of Digital Evidence, 1(3), 1-12.

Ruibin, G., Yun, T., & Gaertner, M. (2005). Case-relevance information investigation: binding computer intelligence to the current computer forensic framework. International Journal of Digital Evidence, 4(1), 147-67.

Selamat, S. R., Yusof, R., & Sahib, S. (2008). Mapping process of digital forensic investigation framework. International Journal of Computer Science and Network Security, 8(10), 163-169.

About the Author

Haider Khaleel is a Digital Forensics Examiner with the US Army, previously a field agent with Army CID. Haider received a Master’s Degree in Digital Forensics Science from Champlain College. The ideas presented in this article do not reflect the polices, procedure, and regulations of the author’s agency.

Correspondence concerning this article should be addressed to Haider H. Khaleel, Champlain College, Burlington, VT 05402. haider.khaleel@mymail.champlain.edu

by Haider H. Khaleel Abstract Since the end of the 19th Century until the current time, law enforcement has been facing a rapid increase in computer-related crimes. In the present time, digital forensics has become an important aspect of not only law enforcement investigations, but also; counter-terrorism investigations, civil litigations, and investigating cyber-incidents. Due to […]

via Focused Digital Forensic Methodology — Forensic Focus – Articles

Counteranalysis via Freud

In psychology, the term was first employed by Sigmund Freud‘s colleague Josef Breuer (1842–1925), who developed a “cathartic” treatment using hypnosis for persons suffering from extensive hysteria. While under hypnosis, Breuer’s patients were able to recall traumatic experiences, and through the process of expressing the original emotions that had been repressed and forgotten, they were relieved of their hysteric symptoms. Catharsis was also central to Freud’s concept ofpsychoanalysis, but he replaced hypnosis with free association.[16]

The term catharsis has also been adopted by modern psychotherapy, particularly Freudian psychoanalysis, to describe the act of expressing, or more accurately,experiencing the deep emotions often associated with events in the individual’s past which had originally been repressed or ignored, and had never been adequately addressed or experienced.

There has been much debate about the use of catharsis in the reduction of anger. Some scholars believe that “blowing off steam” may reduce physiological stress in the short term, but this reduction may act as a reward mechanism, reinforcing the behavior and promoting future outbursts.[17][18][19][20] However, other studies have suggested that using violent media may decrease hostility under periods of stress.[21] Legal scholars have linked “catharsis” to “closure”[22] (an individual’s desire for a firm answer to a question and an aversion toward ambiguity) and “satisfaction” which can be applied to affective strategies as diverse as retribution, on one hand, and forgiveness on the other.[23] Interestingly, there’s no “one size fits all” definition of “catharsis”,[24] and this doesn’t allow a clear definition of its use in therapeutic terms.

COUNTERANALYSIS
counteranalysis.org

Patty Hearst crime history: September 18, 1975

On this date in 1975, heiress-turned-hostage-turned- revolutionary Patty Hearst was arrested by the FBI in San Francisco. And so began her transformation from radical chic to jailhouse geek. She was tried, convicted, and given a seven year sentence that was commuted in 1979. She was pardoned in January 2001 .

Further reading:

Wikipedia entry on Patty Hears

Nobody Move!

PattyMugshot

On this date in 1975, heiress-turned-hostage-turned- revolutionary Patty Hearst was arrested by the FBI in San Francisco. And so began her transformation from radical chic to jailhouse geek. She was tried, convicted, and given a seven year sentence that was commuted in 1979 (thanks, Jimmy!). She was pardoned in January 2001 (thanks, Bill!).

Further reading:

Wikipedia entry on Patty Hearst

Patty Hearst, actress

View original post

this day in crime history: august 26, 1980

On this date in 1980, two men made an early morning delivery of what appeared to be computer equipment to the Harvey’s Resort and Casino in Stateline, NV. Harvey’s employees soon discovered the “computer equipment” and the note attached to it. The note informed them that the large package was a bomb, and that it would go off unless the bombers were paid $3 million by the casino.

Police, the FBI, and the ATF were called in. Bomb squad personnel examined the object and confirmed that it was a bomb. The device, which was very sophisticated, contained a large amount of dynamite.

The decision was made to pay the ransom, then concentrate on tracking down the extortionists later. Unfortunately, the delivery of the ransom money – which was to be done by police helicopter – didn’t go off as planned. This left the bomb squad with the task of figuring out how to disarm the largest dynamite bomb anyone in law enforcement had ever seen.

After x-raying the equipment and carefully examining it, the explosive ordnance disposal experts decided that the best was to disarm it way to quickly disconnect the detonators before they could set off the dynamite. To do this, they rigged shaped charges of C-4 and positioned them so they would blow the detonators off. Sand bags were stacked around the bomb to minimize the damage in case the plan didn’t work. This was a good idea, as the plan didn’t work. The shaped charges set the bomb off, destroying most of the casino and causing some damage to the neighboring hotel. Thankfully, there were no injuries from the explosion.

As the ensuing investigation unfolded, a suspect soon emerged: a Hungarian immigrant from Clovis, CA named John Birges. Birges, as it turned out, lost thousands of dollars gambling at Harvey’s. (note to all you high rollers out there: You can lose. That’s why they call it “gambling.”) In the summer of 1981, investigators received a tip that Birges had stolen dynamite from a construction site. Forensic examination matched the dynamite used at the site with that used in the Harvey’s Casino bomb. John Birges was arrested in August 1981, almost a year after the bombing. His three accomplices were soon arrested as well. It wasn’t long before they flipped and agreed to testify against Birges in exchange for lighter sentences. John Birges was convicted of multiple state and federal crimes. He died in prison of liver cancer in 1996.

Nobody Move!

On this date in 1980, two men made an early morning delivery of what appeared to be computer equipment to the Harvey’s Resort and Casino in Stateline, NV. Harvey’s employees soon discovered the “computer equipment” and the note attached to it. The note informed them that the large package was a bomb, and that it would go off unless the bombers were paid $3 million by the casino.

Police, the FBI, and the ATF were called in. Bomb squad personnel examined the object and confirmed that it was a bomb. The device, which was very sophisticated, contained a large amount of dynamite.

The decision was made to pay the ransom, then concentrate on tracking down the extortionists later. Unfortunately, the delivery of the ransom money – which was to be done by police helicopter – didn’t go off as planned. This left the bomb squad with the task of figuring…

View original post 275 more words

this day in crime history: April 20, 1986

Memorial to the incident in Edmond, OK036750-police-raid

On April 20, 1986, Postal Service employee Patrick Sherrill went on a shooting spree in a post office in Edmonds, OK. Twenty people were shot, leaving fourteen dead and six injured. At the conclusion of his rampage, Sherrill turned the gun on himself and committed suicide. It is believed that the shooting may have been motivated by a reprimand that Sherrill had received the day before. The incident is often credited with inspiring the phrase “going postal.”

Further reading:

Murderpedia – Patrick Henry Sherrill

Wikipedia – Patrick Sherrill

Time – “Crazy Pat’s” Revenge

Nobody Move!

USPSmemorial Memorial to the incident in Edmond, OK

On this date in 1986, Postal Service employee Patrick Sherrill went on a shooting spree in a post office in Edmonds, OK. Twenty people were shot, leaving fourteen dead and six injured. At the conclusion of his rampage, Sherrill turned the gun on himself and committed suicide. It is believed that the shooting may have been motivated by a reprimand that Sherrill had received the day before. The incident is often credited with inspiring the phrase “going postal.”

Further reading:

Murderpedia – Patrick Henry Sherrill

Wikipedia – Patrick Sherrill

Time“Crazy Pat’s” Revenge

View original post

Duck! via Sky News

A Chinese bus driver has died after a flying piece of metal smashed through his windscreen. He managed to put the brakes on, saving his passengers.
Category
News & Politics

The science behind forensic toxicology

(AP Photo/Julie Jacobson) Featured Image -- 122
WRITTEN BY: Katherine Ellen Foley

When we get our blood tested for cholesterol, it doesn’t take long to get the results. And if someone turns up at the hospital with what looks like a drug overdose, doctors can perform a quick test to verify their suspicions before treatment.
But unlike popular crime series like CSI, in which investigators whip up test results in the span of a quick montage, most forensic toxicology reports take anywhere from a few weeks to a few months. This can be an excruciating wait after mysterious deaths and unsolved crimes. Why does it take so long?
Quartz spoke with Robert Middleberg, a toxicologist from NMS Labs in Willow Grove, Pennsylvania, to find out.
Unlike other medical tests, where technicians isolate a specific compound like cholesterol, Middleberg says that you don’t always know what you’re looking for with forensic toxicology. “If you have a young person who is found dead in bed and there’s no history of drug abuse, you’re looking for the proverbial needle in a haystack,” he tells Quartz.
Testing times

After a body is found and an autopsy is performed by a pathologist, a separate lab will look for any environmental or pharmaceutical toxins that could be the killers. Without any clear clues, Middleberg says they will start testing for about 400 different substances. “We never know what we’re going to get,” he notes. It takes creative intuition to guide a cycle of testing and interpreting the results of tests to inform further testing.
Once an initial analysis returns a match for a particular substance, toxicologists must gather more specifics for the official report. Bodies that have already started decaying produce some toxins naturally, like ethanol (another name for the alcohol we drink) and cyanide, so toxicologists may have to perform additional tests to determine whether these played an active role in the cause of death.
All of this is further complicated by the fact that samples often arrive in less than ideal conditions. “If somebody is pulled out of the water after being missing for two or three weeks, these samples are very, very bad,” Middleberg says.
Unlike testing in an emergency room to confirm an overdose, pathology focuses on specifics. “For [medical toxicologists], sometimes it doesn’t really matter exactly what’s there,” Middleberg says. “In our world, the pathologists want to know exactly what it is and how much.”
Not every test is a complicated affair—despite all of the unknowns, Middleberg says that most labs try to have a turnaround time of 3-5 days for ruling things out and 7-10 days for identifying the specific factors leading to death.
Looking for clues

Like detectives, toxicologists look for clues to narrow down which tests are necessary. Knowing a subject’s history with drug or alcohol use obviously helps. There are also several somewhat macabre rules of thumb that tip toxicologists off to seek substances they wouldn’t normally test for:
Bright red blood as a sign of carbon monoxide poisoning
A green brain as a sign of exposure to hydrogen sulfide
Chocolate brown blood as a sign of excess methemoglobin poisoning
Hair falling out can be a sign of chronic arsenic or thallium poisoning
Blue skin can be a sign of gadolinium poisoning
Cocaine and methamphetamines can change the shape of the heart
MOST POPULAR
Dear Jeff Bezos: My husband needed therapy after working for Amazon
SPONSOR CONTENTBY CITI
Green tech is helping restore Florida’s $40 billion economic catalyst: the Everglades