7 Countries with the Best Forensic Technologies via iTHINK

Civilizations that have thousands of years invested in perfecting a field tend to NAIL IT with more accuracy….

Many research and development solutions can be obtained through information sharing from countries that have had centuries of trial and error based experiementation. Seek to learn from mentors in the field, and save yourself from complicating your analysis.

7 Countries with the Best Forensic Technology

7. China

Technology

China has been investing time, energy and resources into forensic science since the 1980’s and globally-renowned forensic scientist Henry Chang-yu Lee believes it’s about to pay off tipping China to become a world leader in high-tech evidence collection.

“I believe the technology in China will be more advanced than ever in the United States within five years,” the Chinese-American expert said in a recent interview with China Daily.

Lee, who has racked up more than five decades of experience in forensic science, has worked on a number of high-profile criminal cases in the US, but has also shared his wealth of knowledge with students, lawyers, judges and law enforcement in China over the years.

“The apparatus and devices used to identify fingerprints or footprints, for example, were very simple when I first visited Chinese forensic laboratories,” he said.

However, he has seen the technology improve over the years and there have been many advances, particularly in electronic evidence collection and fraud prevention by means of real-time monitoring.

In 2016, Lee and several other experts established the Silk Road Forensic Consortium in Xi’an, Shaanxi province, to fight crime and safeguard security by boosting scientific exchanges among countries involved in the Belt and Road Initiative.

The consortium, which has 150 members from 30 countries and regions, provides an open platform for forensic specialists, police officers and judges to share ideas and difficulties as well as experiences in DNA identification studies.

Lee, who acts as chairman, said, “Although we speak different languages in our daily lives, we all speak the same ‘language’ at work, and that’s the language of the criminal investigation. We share the same goal – to speak for the dead using forensic science.”

In September, at the organisation’s third annual conference in Yantai, Shandong province, Lee announced plans to unify DNA identification standards among its members to try and build a mutual DNA database that can better solve criminal cases.

Unified standards are essential to the world of forensic science, he told China Daily.

“If we can achieve unification in China, it can be extended across Asia, to the consortium and finally the world,” he added. “It would mean a brighter future for forensic science.”

6. European Network of Forensic Institutes

Although not a country, the European Network of Forensic Institutes (ENFSI) is recognized as a pre-eminent voice in forensic science worldwide. It is a network of forensic specialists covering a broad range of fields of expertise, from 38 countries geographically spread across Europe:

Austria, Armenia, Azerbaijan, Belgium, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Georgia, Germany, Greece, Hungary, Ireland, Italy, Latvia, Lithuania, Former Yugoslav Republic of Macedonia, Malta, Montenegro, The Netherlands, Norway, Poland, Portugal, Romania, Russia, Serbia, Slovenia, Slovakia, Spain, Sweden, Switzerland, Turkey, Ukraine and the United Kingdom.

The ENFSI has seventeen Expert Working Groups working on a diverse range of forensic specialisms, from textiles and hair to explosives and firearms. It also provides invaluable training to police officers and crime scene investigators.

5. Germany

Technology

Police in the German state of Bavaria have the power to use forensic DNA profiling after a controversial law passed in 2018 in the Landtag, the state parliament in Munich. The law was the first in Germany to allow authorities to use DNA to help determine the physical characteristics, such as eye colour, of an unknown culprit.

The new DNA rules are part of a broader law which has drawn criticism of the wide surveillance powers it gives the state’s police to investigate people they deem an “imminent danger,” people who haven’t necessarily committed any crimes but might be planning to do so.

The move was prompted, in part, by the rape and murder of a medical student in Freiburg, Germany, in late 2016. An asylum seeker, originally from Afghanistan, was convicted of the murder and sentenced to life in prison.

But some authorities complained that they could have narrowed their search more quickly if they had been able to use trace DNA to predict what the suspect would look like.

Federal and state laws previously only allowed investigators to use DNA to look for an exact match between crime scene evidence and a potential culprit, either in a database of known criminals or from a suspect.

Germany also forms part of the aforementioned ENFSI.

4. South Korea

To say that smartphones have changed the digital forensic landscape is an understatement. The device has become the core of every criminal investigation and helped propel digital forensics as a serious, scientific investigation tool.

South Korea is leading the way in digital forensics, with its largest digital forensic firm, Hancom GMD, playing a crucial role in prosecuting some of the country’s most powerful politicians.

In late 2016, South Korea was rocked by one of its biggest political corruption scandals in history – its President Park Guen-hye was accused of bribery and by law, investigators only had 60 days to investigate and prosecute.

They had confiscated over 300 smartphones as from suspects and needed to analyse tens of thousands of phone records and chat messages within a tight deadline. Hancom GMD successfully analysed all of the data in the 300 smartphones and extracted crucial evidence that led to several convictions.

With 5G set to be rolled out globally this year, forensic teams in South Korea are already preparing for this further growth in the collection of digital evidence.

Hancom GMD is planning to launch a service that recovers data from the cloud, though privacy regulations in each country are expected to be a challenge to overcome.

3. United Kingdom

Technology

Prior to its closure in 2012, the UK Forensic Science Service (FSS) was a world-leader in forensic technology. It pioneered the use of the handheld breath alcohol roadside tester and the DNA national database was first worked on and initially tested on all staff and police forces to ensure its reliability.

The organisation later pioneered the use of large scale DNA profiling for forensic identification and crime detection when it moved the facilities to Birmingham.

This enabled the launch of the world’s first DNA database on 10 April 1995. The FSS’s innovative and highly sensitive DNA profiling technique called LCN (low copy number) was used in convicting Antoni Imiela (the M25 rapist).

As well as,  Ronald Castree (for the murder of Lesley Molseed in 1975) but the organisation came under attack when it failed to recover blood stains from a shoe in the murder of Damilola Taylor.

Forensic laboratories in the UK are now privately-owned but are experiencing similar financial difficulties, a recent inquiry by the House of Lords heard.

Mark Pearse, the commercial director in the forensics division of Eurofins, one of the three major providers in the UK, described an “unsustainable toxic set of conditions” when he appeared before the inquiry.

Representatives from the two other largest providers – Key Forensics, which had to be bailed out by police last year after going into administration, and Cellmark – raised similar concerns.

However, that’s not to say that the UK is not involved in researching and implementing new forensic technologies.

Forensic scientists are currently working with the British military to open the United Kingdom’s first body farm — a site where researchers will be able to study the decomposition of human remains.

Details are not yet finalized, but the plans are at an advanced stage: project leaders hope this year to open the farm, also known as a forensic cemetery or taphonomy facility, after the discipline devoted to the study of decay and fossilization.

Such sites generate data on tissue and bone degradation under controlled conditions, along with chemical changes in the soil, air and water around a corpse, to help criminal and forensic investigators.

2. The Netherlands

The Netherlands Forensic Institute (NFI) is one of the world’s leading forensic laboratories. From its state-of-the-art, purpose-built premises in The Hague, the NFI provides products and services to a wide range of national and international clients.

To ensure that their work remains at the forefront of developments, the Netherlands Forensic Institute invests heavily in Research and Development. In this way, it lays the foundations for innovative forensic methods and technologies that will play an important part in the coming decades.

Amongst these innovative forensic technologies is the invention of Hansken, a system that can store large quantities and diverse data easily from different sources. All data is stored, indexed, enriched and made rapidly searchable, cutting down the turnaround time of forensic evidence.

It now contains over 150 samples of glass from a large number cases. In several cases, this glass database has linked suspects to several crimes.

Offenders who carry out robberies, smash-and-grab raids or ARM gas attacks may have splinters of glass on their clothes or in the soles of their shoes and these splinters of glass can remain in place for months, even though they are barely visible to the naked eye, if at all.

These splinters can be of great value. The composition of each piece of glass is unique because of minuscule contaminants in the raw materials for making glass.

By comparing the unique composition of splinters of glass found on a suspect to glass from the database, it is possible to check whether that glass originates from a crime committed earlier.

The glass analysts of the NFI measure the concentration of twenty elements in each piece of glass. This produces a kind of ‘chemical fingerprint’ of the material.

1.United States of America

Technology

It will come as no surprise that at the forefront of cutting-edge forensic technology is the USA, home to over 400 crime labs and the biggest crime lab in the world, the FBI Laboratory.

 

To help train government and industry organisations on cyberattack prevention, as part of a research project for the U.S. Army, scientists at The University of Texas at San Antonio, have developed the first framework to score the agility of cyber attackers and defenders.

“The DOD and U.S. Army recognize that the cyber domain is as important a battlefront as ground, air and sea,” said Dr. Purush Iyer, division chief, network sciences at Army Research Office, an element of the Army Futures Command’s Army Research Laboratory.

“Being able to predict what the adversaries will likely do provides opportunities to protect and to launch countermeasures. This work is a testament to successful collaboration between academia and government.”

The framework developed by the researchers will help government and industry organizations visualize how well they out-maneuver attacks.

Their work is published in IEEE Transactions on Information Forensics and Security, a top journal for cybersecurity.

Education and training programs in the field of forensics are also on the rise, supported by organisations such as The Forensic Sciences Foundation and the American Academy of Forensic Sciences.

In fact, there are 485 Forensic Science schools in the US, so it’s no wonder that it is the home of the some of the most influential forensic scientists, such as Dr. Michael M. Baden and Ellis R. Kerley, and is sure to produce a great deal more talent in the future.

This is certainly an exciting time to be working in forensic science, with the challenges presented by the world of AI, Smartphones and Cloud data calling for rapid improvements to existing technology.

With these challenges comes the need for those countries with more developed forensic facilities to provide training and education opportunities to those in less developed areas so that science can play its rightful part in the criminal justice system.

For now, these are among the 7 countries who have the most advanced forensic technology and it is not the end. As the world continues to evolve, so will technology and the forensic industry itself.

Hi! I’m Isabella and I’m an Italian living in the UK studying for a Masters in Crime & Justice. I currently work in the prison education sector and have a background in teaching, having completed a PGCE after reading languages at the University of Durham. I love travelling, cooking, reading and playing the piano.

Technology is at its peak moment and with it has bought about some of the finest forensic techs. Here are 7 countries with the best forensic technology.

via 7 Countries with the Best Forensic Technology — iTHINK

Do Inmates Need Educational Protocols?

ISO 13485
ISO 13485 Medical devices — Quality management systems — Requirements for regulatory purposes is an International Organization for Standardization standard published for the first time in 1996; it represents the requirements for a comprehensive quality management system for the design and manufacture of medical devices.

This standard supersedes earlier documents such as EN 46001 and EN 46002, the previously published ISO 13485, and ISO 13488.

The essentials of validation planning, protocol writing, and change management will be explained.

via ESSENTIALS OF VALIDATION – Do You Really Need It? — Compliance4all

How to Evaluate a Statistic and avoid Bias / False Presumptions via Mathematical Software

A counting statistic is simply a numerical count of the number of some item such as “one million missing children”, “three million homeless”, and “3.5 million STEM jobs by 2025.” Counting statistics are frequently deployed in public policy debates, the marketing of goods and services, and other contexts. Particularly when paired with an emotionally engaging story, counting statistics can be powerful and persuasive. Counting statistics can be highly misleading or even completely false. This article discusses how to evaluate counting statistics and includes a detailed list of steps to follow to evaluate a counting statistic.

Checklist for Counting Statistics

  1. Find the original primary source of the statistic. Ideally you should determine the organization or individual who produced the statistic. If the source is an organization you should find out who specifically produced the statistic within the organization. If possible find out the name and role of each member involved in the production of the statistic. Ideally you should have a full citation to the original source that could be used in a high quality scholarly peer-reviewed publication.
  2. What is the background, agenda, and possible biases of the individual or organization that produced the statistic? What are their sources of funding?What is their track record, both in general and in the specific field of the statistic? Many statistics are produced by “think tanks” with various ideological and financial biases and commitments.
  3. How is the item being counted defined. This is very important. Many questionable statistics use a broad, often vague definition of the item paired with personal stories of an extreme or shocking nature to persuade. For example, the widely quoted “one million missing children” in the United States used in the 1980’s — and even today — rounded up from an official FBI number of about seven hundred thousand missing children, the vast majority of whom returned home safely within a short time, paired with rare cases of horrific stranger abductions and murders such as the 1981 murder of six year old Adam Walsh.
  4. If the statistic is paired with specific examples or personal stories, how representative are these examples and stories of the aggregate data used in the statistic? As with the missing children statistics in the 1980’s it is common for broad definitions giving large numbers to be paired with rare, extreme examples.
  5. How was the statistic measured and/or computed? At one extreme, some statistics are wild guesses by interested parties. In the early stages of the recognition of a social problem, there may be no solid reliable measurements; activists are prone to providing an educated guess. The statistic may be the product of an opinion survey. Some statistics are based on detailed, high quality measurements.
  6. What is the appropriate scale to evaluate the counting statistic? For example, the United States Census estimates the total population of the United States as of July 1, 2018 at 328 million. The US Bureau of Labor Statistics estimates about 156 million people are employed full time in May 2019. Thus “3.5 million STEM jobs” represents slightly more than one percent of the United States population and slightly more than two percent of full time employees.
  7. Are there independent estimates of the same or a reasonably similar statistic? If yes, what are they? Are the independent estimates consistent? If not, why not? If there are no independent estimates, why not? Why is there only one source? For example, estimates of unemployment based on the Bureau of Labor Statistics Current Population Survey (the source of the headline unemployment number reported in the news) and the Bureau’s payroll survey have a history of inconsistency.
  8. Is the statistic consistent with other data and statistics that are expected to be related? If not, why doesn’t the expected relationship hold? For example, we expect low unemployment to be associated with rising wages. This is not always the case, raising questions about the reliability of the official unemployment rate from the Current Population Survey.
  9. Is the statistic consistent with your personal experience or that of your social circle?If not, why not? For example, I have seen high unemployment rates among my social circle at times when the official unemployment rate was quite low.
  10. Does the statistic feel right? Sometimes, even though the statistic survives detailed scrutiny — following the above steps — it still doesn’t seem right. There is considerable controversy over the reliability of intuition and “feelings.” Nonetheless, many people believe a strong intuition often proves more accurate than a contradictory “rational analysis.” Often if you meditate on an intuition or feeling, more concrete reasons for the intuition will surface.

(C) 2019 by John F. McGowan, Ph.D.

About Me

John F. McGowan, Ph.D. solves problems using mathematics and mathematical software, including developing gesture recognition for touch devices, video compression and speech recognition technologies. He has extensive experience developing software in C, C++, MATLAB, Python, Visual Basic and many other programming languages. He has been a Visiting Scholar at HP Labs developing computer vision algorithms and software for mobile devices. He has worked as a contractor at NASA Ames Research Centerinvolved in the research and development of image and video processing algorithms and technology. He has published articles on the origin and evolution of life, the exploration of Mars (anticipating the discovery of methane on Mars), and cheap access to space. He has a Ph.D. in physics from the University of Illinois at Urbana-Champaign and a B.S. in physics from the California Institute of Technology (Caltech).

 

 

A counting statistic is simply a numerical count of the number of some item such as “one million missing children”, “three million homeless”, and “3.5 million STEM jobs by 2025.” Counting statistics are frequently deployed in public policy debates, the marketing of goods and services, and other contexts. Particularly when paired with an emotionally engaging […]

via How to Evaluate a Counting Statistic — Mathematical Software

Factors Affecting The Intensity Of Poisoning via Forensic’s blog

By @forensicfield

Introduction

The resultant of poisoning depends on many factors.

There are number of reasons which can affect intensity of poisoning are further explained, such as;

  • Dose.
  • Time of intake
  • Way of taking
  • Environmental factors, etc.

Dose

Amount of the poison is determine the affect of it on the body. Smaller the dose, lighter the effect and larger the dose, severe the effect.

Resistance

After doing continuous use of some drugs, such as opiates, tobacco, alcohol, etc. person develop a resistance towards some drugs.

Incompatible Combination of Drugs

Ingestion of some incompatible combination of Medicines may be fatal. Such As; Prozac and Tramadol, Thyroid medication and proton pump inhibitors, Nonsteroidal anti-inflammatory drugs and antihypertensive, etc.

Hypersensitivity

Some of persons show abnormal response (idiosyncrasy) to a drug like morphine, quinine, aspirin etc. due to inherent personal hypersensitivity.

Allergy

Some persons are allergic (acquired hypersensitivity) towards certain drugs like penicillin, sulpha, etc.

Incompatible Combinations

Ingestion of certain medications like anti – ulcerous gels with aspirin may lead to fatal effects.

Tolerance

People develop a marked tolerance in the case of opium, alcohol, strychnine, tobacco, arsenic and some other narcotic drugs by repeated and continued use.

Synergism

Some poisonous drugs can be toxic when taken together may cause lethal effect. Such as; Alcohol and Benzodiazepines, Heroine and Cocaine, Benzodiazepines and Opioids, Alcohol and Opioids

Slow Poisons

The continuous small amount of poison ingestion like arsenic, strychnine, lead, etc. accumulate in body and may cause death.

Conditions of The Body

  • Conditions of the body, i.e. age, health, etc. also affect the action of the poison.
  • Generally old persons, weaker persons and children severly affected by low dose of poison then young and healthy person.

Cumulative Action

The repeated small doses of cumulative poisons like arsenic, lead, mercury, strychnine, digitalis etc. may cause death or chronic poisoning by cumulative action.

Shock

Some times, a large dose of a poison acts differently from a small dose, for example; a large dose of arsenic may cause death by shock while a small dose results in diarrhoea.

Forms of Poison

  • Gases/Vapours Poisons
  • Liquid Poisons
  • Powder Poisons
  • Chemical Combination
  • Mechanical Combination

Gases / Vapours Poisons

These types of poison absorbed immediately and act quickly.

Liquid Poisons

These act better than solids.

Powder Poisons

Fine powdered poison act fast than coarse powdered poison.

Chemical Combination

Some substances in combination act like lethal, such as; acids and alkali’s, strychnine and tannic acid, etc.

Mechanical Combination

The action of a poison is altered when combined mechanically with inert substances, such as; when alkaloid when taken with charcoal, it does not act.

Methods Of Administration

A poison acts more rapidly when inhaled in gaseous form or when injected intravenously.

Next when inject intramuscularly or subcutaneously.

A poison acts slowly when swallowed or applied on skin.

Watch it🤳, share it ✌and subscribe it 👇 : –

NO COMMENTS – add the first!

JZ Logistics via AP Editor


SEND

https://youtube.com/watch?v=mCQh87wx_xA%3Fversion%3D3%26rel%3D1%26fs%3D1%26autohide%3D2%26showsearch%3D0%26showinfo%3D1%26iv_load_policy%3D1%26wmode%3Dtransparent

By @forensicfield Introduction The resultant of poisoning depends on many factors. There are number of reasons which can affect intensity of poisoning are further explained, such as; Dose. Time of intake Way of taking Environmental factors, etc. Dose Amount of the poison is determine the affect of it on the body. Smaller the dose, lighter […]

via Factors Affecting The Intensity Of Poisoning — Forensic’s blog

Biometrics — Forensic’s blog

INTRODUCTION

✴ The term “biometrics” is derived from the Greek words “bio” (life) and “metrics” (to measure).
✴ Biometrics is the technical term for body measurements and calculations.
✴ Biometrics is the measurement and statistical analysis of people’s unique physical and behavioral characteristics.
✴ Biometrics allows a person to be identified and authenticated based on a set of recognizable and verifiable data, which are unique and specific to them.
✴ Biometrics authentication is the process of comparing data for the person’s characteristics in order to determine resemblance.

CHARACTERISTCS

1. UNIVERSAL
2. UNIQUE
3. INVARIABLE
4. RECORDABLE
5. MEASURABLE

HISTORY OF BIOMETRICS

🔘1858 – First systematic capture of hand images for identification purposes is recorded.
🔘1870 – Bertillon develops anthropometries to identify individuals.
🔘1892 – Galton develops a classification system for fingerprints.
🔘1896 – Henry develops a fingerprint classification system
🔘1903 – NY State Prisons begin using fingerprints.
🔘1960s – Face recognition becomes semi-automated.
🔘1960 – First model of acoustic speech production is created.
🔘1963 – Hughes research paper on fingerprint automation is published.
🔘1974- First commercial hand geometry systems become available.
🔘1976 – First prototype system for speaker recognition is developed.
🔘1986 – Exchange of fingerprint minutiae data standard is published.
🔘1988 – First semi-automated facial recognition system is deployed.
🔘1991 – Face detection is pioneered, making real time face recognition possible.
🔘1992 – Biometric Consortium is established within US Government.
🔘1994 – Palm System is benchmarked.
🔘1996 – Hand geometry is implemented at the Olympic Games.
🔘1996 – NIST begins hosting annual speaker recognition evaluations.
🔘1997 – First commercial, generic biometric interoperability standard is published.
🔘1998- FBI launches COOlS (DNA forensic database).
🔘1999 – FBI’s IAFIS major components become operational.
🔘2001 – Face recognition is used at the Super Bowl in Tampa, Florida.
🔘2002 – ISO/IEC standards committee on biometrics is established.
🔘2004 – First statewide automated palm print databases are deployed in the US.
🔘2008 – U.S. Government begin coordinating biometric database use.
🔘2010 – U.S. national security apparatus utilizes biometrics for terrorist identification.
🔘2011 – Biometric identification used to identify body of Osama bin Laden.

TYPES OF BIOMETRICS

Biometrics Can Be Divided Into Three Main Categories Of Characteristics:
1. BIOLOGICAL
2. MORPHOLOGICAL
3. BEHAVIORAL

⏩DNA MATCHING

The identification of an individual using the analysis of segments from DNA.

👂EAR

The identification of an individual using the shape of the ear.

👀EYES – IRIS RECOGNITION & RETINA RECOGNITION

👁IRIS RECOGNITION- The use of the features found in the iris to identify an individual.
👁RETINA RECOGNITION- The use of patterns of veins in the back of the eye to accomplish recognition.

👱‍♂️FACE RECOGNITION

The analysis of facial features or patterns for the authentication or recognition of an individuals identity.

🤘FINGERPRINT RECOGNITION

The use of the ridges and valleys (minutiae) found on the surface tips of a human finger to identify an individual.

👋FINGER GEOMETRY RECOGNITION

The use of 3D geometry of the finger to determine identity.

🤚HAND GEOMETRY RECOGNITION

The use of the geometric features of the hand such as the lengths of fingers and the width of the hand to identify an individual.

🙌VEIN RECOGNITION

Vein recognition is a type of biometrics that can be used to identify individuals based on the vein patterns in the human finger or palm.

👃ODOUR

The use of an individuals odour to determine identity.

✍SIGNATURE RECOGNITION

The authentication of an individual by the analysis of handwriting style, specifically the signature. Technology is available to check two scanned signatures using advances algorithms.

👩‍💻TYPING RECOGNITION

The use of the unique characteristics of a persons typing for establishing identity.

🗣VOICE / SPEAKER RECOGNITION

There are two major applications of speaker recognition:
🙊Voice – Speaker Verification / Authentication
🙊Voice – Speaker Identification
✔In forensic applications, it is common to first perform a speaker identification process to create a list of “best matches” and then perform a series of verification processes to determine a conclusive match.
✔Voice recognition analyzes audio input for specific patterns in speech or sound. Each voice, or common noise, has a recognizable wavelength pattern that can aid in identification of a specific individual.

🚶‍♀️👣GAIT

The use of an individuals walking style or gait to determine identity.

Biometrics allows a person to be identified and authenticated based on a set of recognizable and verifiable data, which are unique and specific to them. This video covers following Points of Biometrics: 💡Introduction 💡Characteristics 💡History & 💡Types.

via Biometrics — Forensic’s blog

Intro to Fingerprints via Forensic’s blog

Fingerprints- An Introduction

By @forensicfield

INTRODUCTION

Everything we touched, leave behind our unique impression on it, which is Our fingerprints.

No two people have exactly the same fingerprints. Even identical twins, with identical DNA, have different fingerprints.

Fingerprint identification also known as “Dactyloscopy”.

Fingerprints are the tiny ridges, whorls and valley patterns on the tip of each fingers. They develop from pressure on a baby’s tiny, developing fingers in the womb.

CLASSIFICATION OF FINGERPRINTS

🧤By FRANCIS GALTON
A well-known British scientist sir Francis Galton published his first book on fingerprint in 1892. His important work include method for classification for fingerprint which are divided into three groups-
a. Arch
b. Loop
c. Whorl

🧤 By WILLIAM J. HERSHEL
While working for the East India Company in Bengal, India, Sir William James Herschel first used fingerprints on native contracts. After a decade, he had accumulated a file of fingerprints.

🧤 By EDWARD HENRY
Henry Classification of Fingerprinting was accepted as common practice throughout England and its territorial holdings and in the United States.
Under the henry system, fingerprints divided into two classes:
•Those which are given numerical value. (whorls and composites).
•Those which doesn’t give numerical value. (loops and arches).

🖐 All patters are divided as follows:

The henry classification system assigns each finger A number according to the order in which it is located in the hand, beginning with the right thumb as number 1 and ending with the left pinky as number 10.
• The system also assigns a numerical value to fingers that contain a whorl pattern; fingers 1 and 2 each have a value of 16,
• Fingers 3 and 4 = 8,
• Fingers 5 and 6 = 4,
• Fingers 7 and 8 = 2,
• Final two fingers = 1.
• Fingers with a non-whorl pattern, such as an arch or loop pattern, have a value of zero.
• The sum of the even finger value is then calculated and placed in the numerator of a fraction.
• The sum of the odd finger values is place in the denominator.
• The value of 1 is added to each sum of the whorls with the maximum obtainable on either side of the fraction begin 32.
• Thus, the primary classification is a fraction between 1/1 to 32/32, where 1/1 would indicate no whorl patterns and 32/32 would mean that all fingers had whorl patterns.

🧤 By JUAN VUCETICH
Vucetich is credited with the first positive criminal identification as, in 1892, he was able to extract a set of prints off a door and thus identify a woman as the culprit in a double homicide.

✴ CHARACTERISTICS OF FINGERPRINT

🖐 Class Characteristics
Class characteristics are the characteristics that narrow the print down to a group but not an individual.

The Three Fingerprint Class Types Are;
1. Arches:
✔Arches are the simplest type of fingerprints that are formed by ridges that enter on one side of the print and exit on the other. No deltas are present.
✔About 5 % of the world’s populations have arch patterns.

Arch pattern

2. Loops:
✔Loops must have one delta and one or more ridges that enter and leave on the same side. These patterns are named for their positions related to the radius and ulna bones.
✔About 60-65 % of the world’s populations have loop patterns.

Loop pattern

3. Whorls:
✔Whorls have at least one ridge that makes (or tends to make) a complete circuit. They also have at least two deltas.
✔About 30-35 % of the world’s populations have whorls patterns.

Whorl Pattern

👍 Individual characteristics:
👉Individual characteristics are those characteristics that are unique to an individual.
👉They are tiny irregularities that appear within the friction ridges and are referred to as Galton’s details.

Individual Characteristics of Fingerprint

Watch it🤳, share it ✌and subscribe it 👇 : –

Fingerprints-An Introduction

https://youtube.com/watch?v=Ae9uQRqOWkc%3Fversion%3D3%26rel%3D1%26fs%3D1%26autohide%3D2%26showsearch%3D0%26showinfo%3D1%26iv_load_policy%3D1%26wmode%3Dtransparent

By @forensicfield INTRODUCTION Everything we touched, leave behind our unique impression on it, which is Our fingerprints. No two people have exactly the same fingerprints. Even identical twins, with identical DNA, have different fingerprints. Fingerprint identification also known as “Dactyloscopy”. Fingerprints are the tiny ridges, whorls and valley patterns on the tip of each fingers. […]

via Fingerprints- An Introduction — Forensic’s blog

Forensic Structural Engineeringg via Australian Business Network

Structural engineering is a specialty within the field of civil engineering which focuses on the framework of structures and on designing those structures to withstand the stresses and pressures of their environment and remain safe, stable and secure throughout their use. To explain a little differently, it can be said that structural and consulting engineers […]

via Understanding The Concept Of Structural Engineering — Australian Business Network

Variables to consider when Determining Post Mortem Blood Alcohol Levels via True Crime Rocket Science / #tcrs

Immediately following the release of the autopsy reports on November 19th, I contacted Thomas Mollett, a forensic investigator, fellow true crime author and friend, and asked him his opinion on Shan’anns Blood Alcohol Levels. They were found to be three times the legal limit for driving. How likely was it, I asked, that these apparently high levels were from “normal” decomposition?

SUPPLEMENTAL

Autopsy reports show Shanann Watts, daughters were asphyxiated – TimesCall

Fullscreen capture 20181217 233710

Pathology is an extremely complex science, and many factors play into the biological processes that occur after death.

image001

The three basic pillars one uses to calculate whether the BAC is “normal” or not are related to:

  1. the time the body is exposed to the elements [here time of death is a factor, unknown in this case, but with a relatively short window either way]
  2. the ambient conditions of the body [temperature, humidity etc.]
  3. circumstantial evidence is also a vital tool to gauge alcohol content, including eye witnesses, Shan’ann’s drinking habits, and her appearance in the Ring camera footage when she arrived home [described but not released thus far]

During our first communication I miscommunicated to Mollett that Shan’ann’s corpse was recovered after only 48 hours, which I guessed wasn’t enough time to reflect the high alcohol levels found. This was an initial error on my part; it took closer to 70 hours for Shan’ann’s corpse to be discovered and exhumed.

Based on this initial miscommunication, Mollett also believed the BAC level was likely higher than a natural rate [which as I say, was also what I suspected].

I asked Mollett to investigate the BAC levels and I’m grateful to him for doing so in detail. Obviously part of his thorough investigation corrected the original 48 hour error.

Below is Mollet’s unabridged report on the BAC levels.

Fullscreen capture 20181217 230915Fullscreen capture 20181217 230922Fullscreen capture 20181217 230928Fullscreen capture 20181217 230933Fullscreen capture 20181217 230940Fullscreen capture 20181217 231003Fullscreen capture 20181217 231009Fullscreen capture 20181217 231013Fullscreen capture 20181217 231022Fullscreen capture 20181217 231028

Fullscreen capture 20181217 235348Fullscreen capture 20181217 235321Fullscreen capture 20181217 231033Fullscreen capture 20181217 231105

20181119__20TCAAUTw_1

  • Share
  • 9Comments
9 COMMENTS
  • Helen

    Helen

    I think Chris tied Shanann to the bed after she fell asleep, put a pillow case over her mouth to prevent her from screaming, made sure she watched through the monitor how he smothered Bella and Celeste, and then came back to the bedroom to strangle her.

    Reply
  • BAMS13

    BAMS13
    Helen

    You’re going to get in trouble from Nick now… lol.

    Reply
  • nickvdl

    nickvdl
    BAMS13

    Bams, can I let you take it from here? I can’t always be the one cracking the whip 😉

    Reply
  • BAMS13

    BAMS13
    nickvdl

    Haha! Always happy to try and exert my low ranking power anytime. You’d think those virtual whip cracks can be heard loud and clear though. 😉

    Reply
  • Syzia

    Syzia

    Helen took it to the next level here

    Reply
  • Marie

    Marie
    Syzia

    Oh yes syzia, I agree

    Reply
  • Karen

    Karen

    Well, that report certainly cleared up so many things. Now we know. The body certainly is a fascinating animal in death as much as life. I do know that when officer Coonrod was in the kitchen he didn’t have a peek in the sink to see if there were breakfast dishes in there to find out if the kids had eaten so we couldn’t see if there was a wine glass. Nor did I see any at all throughout his whole walk through the house. Thorough report

    Reply
  • Sylvester

    Sylvester

    “Important moments at Watt’s well site” is really stunning. I hope everyone can blow it up on a computer monitor rather than a cell phone. You really get the sense of vastness of that site – miles and miles in every direction of land dotted with wildflowers. The tank battery site even seems dwarfed in proportion to the land. As the drone makes it’s lazy pass from the air you then see the sheet, hugging the scrub. Look a little closer and you see the black garbage bags. It was rather stupid of him to discard the sheet on top of the land after it had fulfilled it’s purpose to conceal and drag. Same with the garbage bags. Maybe he thought in the vastness of the land those items, like his family, would simply vanish.

    Reply
  • Karen

    Karen
    Sylvester

    Sylvester, do you know if they sent the drone out before Chris said anything or after? For the life of me, I can’t remember. Thank you kindly

    Reply

JZ Logistics @ The Internet Truck Stop


SEND

Immediately following the release of the autopsy reports on November 19th, I contacted Thomas Mollett, a forensic investigator, fellow true crime author and friend, and asked him his opinion on Shan’anns Blood Alcohol Levels. They were found to be three times the legal limit for driving. How likely was it, I asked, that these apparently high […]

via Thomas Mollett’s Forensic Report on Shan’ann Watts’ Post Mortem Blood Alcohol Level — True Crime Rocket Science / #tcrs

Global Standardization of Forensics will Decrease the Bias Factor of Evidence Collection Procedures and Court Rulings

Interviews – 2018

Angus Marshall, Digital Forensic Scientist

via Angus Marshall
Angus, tell us a bit about yourself. What is your role, and how long have you been working in digital forensics?

Where to begin? I have a lot of different roles these days, but by day I’m a Lecturer in Cybersecurity – currently at the University of York, and also run my own digital forensic consultancy business. I drifted into the forensic world almost by accident back in 2001 when a server I managed was hacked. I presented a paper on the investigation of that incident at a forensic science conference and a few weeks later found myself asked to help investigate a missing person case that turned out to be a murder. There’s been a steady stream of casework ever since.

I’m registered as an expert adviser and most of my recent casework seems to deal with difficult to explain or analyse material. Alongside that, I’ve spent a lot of time (some might say too much) working on standards during my time on the Forensic Science Regulator’s working group on digital evidence and as a member of BSI’s IST/033 information security group and the UK’s digital evidence rep. on ISO/IEC JTC1 SC27 WG4, where I led the work to develop ISO/IEC 27041 and 27042, and contributed to the other investigative and eDiscovery standards.

You’ve recently published some research into verification and validation in digital forensics. What was the goal of the study?

It grew out of a proposition in ISO/IEC 27041 that tool verification (i.e. evidence that a tool conforms to its specification) can be used to support method validation (i.e. showing that a particular method can be made to work in a lab). The idea of the 27041 proposal is that if tool vendors can provide evidence from their own development processes and testing, the tool users shouldn’t need to repeat that. We wanted to explore the reality of that by looking at accredited lab processes and real tools. In practice, we found that it currently won’t work because the requirement definitions for the methods don’t seem to exist and the tool vendors either can’t or won’t disclose data about their internal quality assurance.

The effect of it is that it looks like there may be a gap in the accreditation process. Rather than having a selection of methods that are known to work correctly (as we see in calibration houses, metallurgical and chemical labs etc. – where the ISO 17025 standard originated) which can be chosen to meet a specific customer requirement, we have methods which satisfy much fuzzier customer requirements which are almost always non-technical in nature because the customers are CJS practitioners who simply don’t express things in a technical way.

We’re not saying that anyone is necessarily doing anything wrong, by the way, just that we think they’ll struggle to provide evidence that they’re doing the right things in the right way.

Where do we stand with standardisation in the UK at the moment?

Standardization is a tricky word. It can mean that we all do things the same way, but I think you’re asking about progress towards compliance with the regulations. In that respect, it looks like we’re on the way. It’s slower than the regulator would like. However, our research at York suggests that even the accreditations awarded so far may not be quite as good as they could be. They probably satisfy the letter of the regulator’s documents, but not the spirit of the underlying standard. The technical correctness evidence is missing.

ISO 17025 has faced a lot of controversy since it has been rolled out as the standard for digital forensics in the UK. Could you briefly outline the main reasons why?

Most of the controversy is around cost and complexity. With accreditation costing upwards of £10k for even a small lab, it makes big holes in budgets. For the private sector, where turnover for a small lab can be under £100k per annum, that’s a huge issue. The cost has to be passed on. Then there’s the time and disruption involved in producing the necessary documents, and then maintaining them and providing evidence that they’re being followed for each and every examination.

A lot of that criticism is justified, but adoption of any standard also creates an opportunity to take a step back and review what’s going on in the lab. It’s a chance to find a better way to do things and improve confidence in what you’re doing.

In your opinion, what is the biggest stumbling block either for ISO 17025 specifically, or for standardizing digital forensics in general?

Two things – as our research suggests, the lack of requirements makes the whole verification and validation process harder, and there’s the confusion about exactly what validation means. In ISO terms, it’s proof that you can make a process work for you and your customers. People still seem to think it’s about proving that tools are correct. Even a broken tool can be used in a valid process, if the process accounts for the errors the tool makes.

I guess I’ve had the benefit of seeing how standards are produced and learning how to use the ISO online browsing platform to find the definitions that apply. Standards writers are a lot like Humpty Dumpty. When we use a word it means exactly what we choose it to mean. Is there a way to properly standardise tools and methods in digital forensics?

It’s not just a UK problem – it’s global. There’s an opportunity for the industry to review the situation, now, and create its own set of standard requirements for methods. If these are used correctly, we can tell the tool makers what we need from them and enable proper objective testing to show that the tools are doing what we need them to. They’ll also allow us to devise proper tests for methods to show that they really are valid, and to learn where the boundaries of those methods are.

Your study also looked at some existing projects in the area: can you tell us about some of these? Do any of them present a potential solution?

NIST and SWGDE both have projects in this space, but specifically looking at tool testing. The guidance and methods look sound, but they have some limitations. Firstly, because they’re only testing tools, they don’t address some of the wider non-technical requirements that we need to satisfy in methods (things like legal considerations, specific local operational constraints etc.).

Secondly, the NIST project in particular lacks a bit of transparency about how they’re establishing requirements and choosing which functions to test. If the industry worked together we could provide some more guidance to help them deal with the most common or highest priority functions.

Both projects, however, could serve as a good foundation for further work and I’d love to see them participating in a community project around requirements definition, test development and sharing of validation information.

Is there anything else you’d like to share about the results?

We need to get away from thinking solely in terms of customer requirements and method scope. These concepts work in other disciplines because there’s a solid base of fundamental science behind the methods. Digital forensics relies on reverse-engineering and trying to understand the mind of a developer in order to work out how extract and interpret data. That means we have a potentially higher burden of proof for any method we develop. We also need to remember that we deal with a rate of change caused by human ingenuity and marketing, instead of evolution.

Things move pretty fast in DF, if we don’t stop and look at what we’re doing once in a while, we’ll miss something important.

Read Angus Marshall’s paper on requirements in digital forensics method definition here. Angus Marshall

The hottest topic in digital forensics at the moment, standardisation is on the tip of everyone’s tongues. Following various think pieces on the subject and a plethora of meetings at conferences, I spoke to Angus Marshall about his latest paper and what he thinks the future holds for this area of the industry. You can […]

via Angus Marshall talks about standardisation — scar

Computer Forensics: Data Recovery & Extraction from Scratched Hard Drives via Salvation DATA Blog

[Case Study] Computer Forensics: Data Recovery & Extraction From Platter Scratched Hard Drives. COMPUTER FORENSICS:
Editor’s note: As a forensic data recovery expert, Salvation DATA receives different data recovery cases every day. Our forensic customers usually turn to us for help when they run into a case they are not able to handle. And among all the data lost situations, platter scratch is one of the most difficult kinds of problem to deal with. So in this issue, let’s see what is the correct forensic process for a platter scratched hard drive.

What is platter scratch?

When platters are damaged it is usually in the form of scratching caused by debris and or the read/write heads when they come in contact during the reading-writing process.

This is also known commonly as a head crash, although that term is often mistakenly used by inexperienced individuals to relate to clicking drives or hard drives that need a read/write head replacement.

Once the platters are scratched to a certain degree this will, in turn, damaged the read/write heads and will render the drive unreadable. Oftentimes this results in a clicking, scratching, chirping, or screeching sounds. However, these sounds don’t automatically mean the platters are scratched.

When the platters are scratched in this manner the drive will not be able to be recovered, the files and data contained on the drive will be lost forever. This is known as a catastrophic head crash and most hard drive failure recovery cannot fix this.

SalvationDATA Computer Forensics Scratched Platters

How to work with a hard drive with platter scratch?

Is platter scratch truly unrecoverable? Actually sometimes if the scratches to the platter surface are not too severe, there is still the possibility to recover and extract the data as long as we strictly follow operating procedures.

Stop attempting to read data immediately to avoid further unrecoverable damage.
Open the hard drive in a dust-free environment and inspect for damage.
Remove the damaged read/write head, and replace it with a healthy head. Donor head must be selected by strict matching rule. For example, for Western Digital head replacement, donor drive must match the model number, batch ID, FW version and PN.
After repairing physical damages, we can continue to forensically recover and extract the data from this hard drive with SalvationDATA’s DRS (Data Recovery System).
What tools do you need for this process?

HPE Pro is a hard drive repair tool Head Platter Exchange it is the unarguable and the only equipment built to handle head stack and drive motor issues, in case the drive corruption is not caused by firmware but head stack or drive spin motor. With the pioneer platter exchanger, it can prevent the head from further damage or misalignment due to incorrect operations to maintain the user data intact.

DRS (Data Recovery System) is our next generation intelligent all-in-one forensic data recovery tool that can acquire and recover data from both good and damaged storage media like HDD simply and easily.

Forensic Diagnostics

How do we know if the hard drive is fixed, and can continue to the next step? DRS’s disk diagnostics feature perfectly helps to solve the problem. DRS is able to scan the source disk in advance. With fairly new FastCheck technology, it allows rapid check within 5 seconds, avoiding the risk of second damage made to an important evidentiary storage device.

Insert the hard disk in DRS, and simply click the one-key Diagnose function to complete the process. DRS will tell you the detailed disk health status in no time!

2

Forensic Imaging

After repairing the physical damages, the hard drive could still be fragile and easy to fail again. If not handled with care, we may permanently lose the opportunity to recover and extract the data. Therefore, it is crucial to first secure data stored on the hard drive. DRS also provides the solution. The forensic imaging function of DRS secures the evidentiary digital data by creating a physical level sector-by-sector duplication of the damaged hard drive. Once finished, a forensic image will be exactly the same as the source data and can be stored safely and analyzed at any time appropriate.

3

Important notes:

When dealing with a defective hard drive as in this case, it is recommended to use the Advanced Imaging mode in DRS to help bypass bad sectors and extract as much data as possible. Also, remember to set transmission mode as PIO (low speed) to safely extract the data from such damaged storage device.
Before imaging, we can also check the raw hexadecimal data view in DRS Sector View to make sure data on this damaged hard drive is accessible. Professional data recovery engineers can even acquire more information from this sector view.
SalvationDATA Computer Forensics Scratched Platters

Forensic Recovery

Now with all the problems dealt with, we have one final step to make: recover and extract valuable evidentiary data. Use DRS’s File Recovery & File Carving function to locate and extract important digital files, and generate a forensic report at the end of the process. With DRS’s intelligent recovery technology, investigators can deal with deleted files, formatted partitions, corrupted file system and many other digital data lost situations without any professional skill requirements!

5

Conclusions

Platter scratch is the nightmare for data recovery engineers. However, it is not impossible to recover data from scratched platters. In this issue, we discussed the standard operating procedure to deal with a hard drive with platter scratch to maximize the possibility to recover and extract valuable evidentiary data. We hope the instructions we provide can help you with your work!
You can also visit our official YouTube channel for more videos: https://www.youtube.com/user/SalvationDataOfficia/featured

https://videopress.com/embed/MiSnIzf7?hd=0&autoPlay=0&permalink=0&loop=0

Editor’s note: As a forensic data recovery expert, SalvationDATA receives different data recovery cases every day. Our forensic customers usually turn to us for help when they run into a case they are not able to handle. And among all the data lost situations, platter scratch is one of the most difficult kinds of problem […]

via [Case Study] Computer Forensics: Data Recovery & Extraction From Platter Scratched Hard Drives — SalvationDATA Blog