首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
During the 1970s, the Florida legislature enacted some of the nation's most innovative and comprehensive state and local land-planning and regulatory programs. The Environmental Land and Water Management Act of 1972 adopted large parts of an early draft of article 7 of the ALI Model Land Development Code, thereby asserting a state regulatory role in areas of critical state concern and for developments of regional impact; Florida's Local Government Comprehensive Planning Act of 1975 introduced planning and regulatory innovations that, if ever fully implemented, could place Florida in the vanguard of land regulatory reform at the local governmental level. This study, which is the concluding part of a study of the evolution of federal, state, and local regulatory roles in the management of coastal land resources, examines the intergovernmental, interagency, and separate-branch tensions that have emerged as Florida moves to implement its new laws. Included, inter alia, is an analysis of the Florida Supreme Court's controversial nondelegation decision in Askew v. Cross Key Waterways. Although Florida can claim some limited successes in program implementation, its land management systems are still not adequately integrated and coordinated, and they have not been implemented as successfully as their proponents thought possible. For example, the state has several alternatives for complying with the federal requirements for an approved management program under the Federal Coastal Zone Management Act of 1972—the comprehensive land management system examined in this study being only one of the available ones. Yet Florida still has been unable to obtain federal approval, and, if it ever does, will be one of the last of the major coastal states to do so. Much of Florida's difficulty in forging a well-integrated coastal land management process is attributable to substantial disagreements on two basic propositions: because of Florida's unique ecological characteristics, coastal land management should not be divorced from comprehensive land management for other purposes; and because of substantial regional diversities within the state, coastal land management in Florida should include a significant planning and regulatory role for local governments as well as for regional and state agencies.  相似文献   

2.
Knowledge of task-irrelevant information influences judgments of forensic science evidence and thereby undermines their probative value (i.e., forensic confirmation bias). The current studies tested whether laypeople discount the opinion of a forensic examiner who had a priori knowledge of biasing information (i.e., a defendant's confession) that could have influenced his opinion. In three experiments, laypeople (N = 765) read and evaluated a trial summary which, for some, included testimony from a forensic examiner who was either unaware or aware of the defendant's confession, and either denied or admitted that it could have impacted his opinion. When the examiner admitted that the confession could have influenced his opinion, laypeople generally discounted his testimony, as evidenced by their verdicts and other ratings. However, when the examiner denied being vulnerable to bias, laypeople tended to believe him—and they weighted his testimony as strongly as that of the confession-unaware examiner. In short, laypeople generally failed to recognize the superiority of forensic science judgments made by context-blind examiners, and they instead trusted examiners who claimed to be impervious to bias. As such, our findings highlight the value of implementing context management procedures in forensic laboratories so as not to mislead fact-finders.  相似文献   

3.
Abstract: Archived slides of cell smears treated with histological stains for sperm detection are often the only source of DNA available when cold cases are reopened. There have been conflicting reports as to the negative effects of particular histological stains on DNA recovery and quality from human cells, making stain selection an important consideration for forensic laboratories. This study investigates the effect of several staining systems on DNA recovery from histological slide samples stored from 0 to 10 weeks. DNA profiles obtained after analysis of these samples with AmpFlSTR® Identifiler? and increased cycle AmpFlSTR® SGM Plus? short tandem repeat (STR) profiling systems and the effects that these stains have on DNA quantity and quality over time are described. Results indicate that Christmas Tree and Hematoxylin and Eosin stains do not have significantly different effects on DNA quality after 10‐week storage of slides. This research will assist scientists to select staining systems that have minimal deleterious effects on the DNA recovered.  相似文献   

4.
The use of search engines and associated search functions to locate content online is now common practice. As a result, a forensic examination of a suspect's online search activity can be a critical aspect in establishing whether an offense has been committed in many investigations. This article offers an analysis of online search URL structures to support law enforcement and associated digital forensics practitioners interpret acts of online searching during an investigation. Google, Bing, Yahoo!, and DuckDuckGo searching functions are examined, and key URL attribute structures and metadata have been documented. In addition, an overview of social media searching covering Twitter, Facebook, Instagram, and YouTube is offered. Results show the ability to extract embedded metadata from search engine URLs which can establish online searching behaviors and the timing of searches.  相似文献   

5.
This article is an introduction to the United States Supreme Court's standard of admissibility of forensic evidence and testimony at trial, known as the Daubert standard, with emphasis on how this standard applies to the field of forensic podiatry. The author, a forensic podiatrist, provided law enforcement with evidence tying a bloody sock‐clad footprint found at the scene of a homicide to the suspect. In 2014, the author testified at a pretrial hearing, known as “a Daubert hearing,” to address the admissibility of this evidence in court. This was the first instance of forensic podiatry being the primary subject of a Daubert hearing. The hearing resulted in the court ordering this evidence admissible. The expert's testimony contributed to the suspect's conviction. This article serves as a reference for forensic podiatrists and experts in similar fields that involve impression evidence, providing evidentiary standards and their impact on expert evidence and testimony.  相似文献   

6.
The tables presented below for the reader's attention were prepared using materials included in the Public Opinion Foundation (POF) pamphlets titled What Kind of Authoritarian Regime is Possible in Russia? and Russia's Regions: The Population's Economic and Political Orientations,1 as well as materials from a survey carried out by the foundation in the fall of 1993. The tables are accompanied by brief commentary by POF analysts.  相似文献   

7.
Pseudologia fantastica, a psychological phenomenon that has been described in the literature for at least a century, is an understudied and poorly understood entity. Sometimes referred to as pathological lying, pseudologia fantastica involves disproportionate fabrication that may be present for many years or a lifetime. In a forensic context, it can significantly complicate the evaluation of capacity to stand trial and, in certain jurisdictions, criminal responsibility. We review the current literature regarding pseudologia fantastica and present a case to highlight the clinical and forensic challenges it may create. We specifically discuss the complications that pseudologia fantastica may have on the assessment of a defendant's rational ability to consult with an attorney, a required element of capacity to stand trial. In addition, we discuss the implications of pseudologia fantastica in the evaluation of criminal responsibility.  相似文献   

8.
Frontal sinuses (FSs) have been studied in radiology, anthropology, and forensic anthropology. This study aimed to determine whether it was possible to predict the age and sex of an individual using FS volume. Sixty‐nine anonymized CT scans were imported to MIMICS 10.01® software (Materialise N.V.), and each FS volume was calculated in mm3. There was an absence of significant difference between right and left FS volume (p = 0.173) and an absence of correlation between age and FS volume (Pearson's test; p = 0.705). Sexual dimorphism was significantly different (p = 0.001). However, the most discriminant datum for determining sex was found to be the total FS volume (sum of an individual's right and left FS volumes) with linear discriminant Fisher's function coefficients of ?2.759 for the male group and ?1.275 for the female group. With this model, 72.5% of our sample was correctly classified according to sex.  相似文献   

9.
Using validated carving techniques, we show that popular operating systems (e.g. Windows, Linux, and OSX) frequently have residual IP packets, Ethernet frames, and associated data structures present in system memory from long-terminated network traffic. Such information is useful for many forensic purposes including establishment of prior connection activity and services used; identification of other systems present on the system’s LAN or WLAN; geolocation of the host computer system; and cross-drive analysis. We show that network structures can also be recovered from memory that is persisted onto a mass storage medium during the course of system swapping or hibernation. We present our network carving techniques, algorithms and tools, and validate these against both purpose-built memory images and a readily available forensic corpora. These techniques are valuable to both forensics tasks, particularly in analyzing mobile devices, and to cyber-security objectives such as malware analysis.  相似文献   

10.
Web storage or browser storage, a new client-side data storage feature, was recommended as a part of the HTML5 specifications and now widely adopted by major web browser vendors. Web storage with native browser support has changed the paradigm of web application development unprecedentedly because persistent data storage with increased data size can be realized on the client. Web storage is poised to quickly become an area of particular interest for forensic investigators due to the potential to discover critical information from web browser artifacts at client side. However, the literature work on web browser forensics has traditionally focused on browsing history, browser cache, and cookie files (Oh et al., 2011). Therefore, we first discuss the prevalence of web storage implementation in widely used websites. Then, we compare and contrast the web storage technology currently implemented in the five major web browsers, Google Chrome, Internet Explorer, Mozilla Firefox, Opera, and Apple's Safari. Moreover, in order to provide more insights into web storage and enable unified forensic analysis, a proof-of-concept tool, named as BrowStEx (Browser Storage Extractor), is described with implementation details. The commonalities, differences, and the proof-of-concept tool discussed in this paper can be useful in developing advanced forensic tools that can extract browser storage artifacts.  相似文献   

11.
Invalid expert witness testimony that overstated the precision and accuracy of forensic science procedures has been highlighted as a common factor in many wrongful conviction cases. This study assessed the ability of an opposing expert witness and judicial instructions to mitigate the impact of invalid forensic science testimony. Participants (N = 155) acted as mock jurors in a sexual assault trial that contained both invalid forensic testimony regarding hair comparison evidence, and countering testimony from either a defense expert witness or judicial instructions. Results showed that the defense expert witness was successful in educating jurors regarding limitations in the initial expert's conclusions, leading to a greater number of not-guilty verdicts. The judicial instructions were shown to have no impact on verdict decisions. These findings suggest that providing opposing expert witnesses may be an effective safeguard against invalid forensic testimony in criminal trials.  相似文献   

12.
The Internet has already changed people's lives considerably and is likely to drastically change forensic research. We developed a web‐based test to reveal concealed autobiographical information. Initial studies identified a number of conditions that affect diagnostic efficiency. By combining these moderators, this study investigated the full potential of the online ID‐check. Participants (n = 101) tried to hide their identity and claimed a false identity in a reaction time‐based Concealed Information Test. Half of the participants were presented with personal details (e.g., first name, last name, birthday), whereas the others only saw irrelevant details. Results showed that participants′ true identity could be detected with high accuracy (AUC = 0.98; overall accuracy: 86–94%). Online memory detection can reliably and validly detect whether someone is hiding their true identity. This suggests that online memory detection might become a valuable tool for forensic applications.  相似文献   

13.
There has been a great deal of concern recently about validity and reliability in forensic science. This paper reviews for a broad target audience metrics of validity and reliability (accuracy and precision) which have been applied in forensic voice comparison and which are potentially applicable in other branches of forensic science. The metric of validity is the log likelihood-ratio cost (Cllr), and the metric of reliability is an empirical estimate of credible intervals. A revised procedure for the calculation of credible intervals is introduced.  相似文献   

14.
CCTV surveillance systems are IoT products that can be found almost everywhere. Their digital forensic analysis often plays a key role in solving crimes. However, it is common for these devices to use proprietary file systems, which frequently hinders a complete examination. HIKVISION is a well-known manufacturer of such devices that typically ships its products with its proprietary file system. The HIKVISION file system has been analyzed before but that research has focused on the recovery of video footage. In this paper, the HIKVISION file system is being revisited regarding the log records it stores. More specifically, these log records are thoroughly examined to uncover both their structure and meaning. These unexplored pieces of evidence remain unexploited by major commercial forensic software, yet they can contain critical information for an investigation. To further assist digital forensic examiners with their analysis, a Python utility, namely the Hikvision Log Analyzer, was developed as part of this study that can automate part of the process.  相似文献   

15.
The concept of a substance acting as a prodrug for an intended drug is not new and has been known and utilized with particular benefits within medicine for efficacy and patient safety. Prodrugs of psychoactive substances are also not particularly new but this has also extended to considerations of prodrugs of new psychoactive substances (NPS). The continuing evolution of NPS has been a constant forensic challenge. In some countries, this constant evolution has led to the introduction of various alternative methods of drug control. Whether for this reason or in the pursuit of user experimentation, prodrugs of NPS have been discussed, developed, and exploited, posing some distinct forensic challenges. This is especially the case within toxicological analysis of biological fluids and for some substances, also forensic chemical analysis, through inherent instability of the prodrug or metabolism in the body. Particular examples of NPS prodrugs include 1-propanoyl-LSD, 1-butanoyl-LSD, 1-acetyl-LSD, and 2C-B-AN. This is in addition to associated substances and medicines that may be used for an intended pharmacological effect. Various prodrugs for stimulant and hallucinogenic substances in particular have appeared in the literature and have been discussed within drug user forums and made available for purchase online. Presently, drug monitoring data from national and international systems indicate that prodrugs are not widely available or problematic. Nevertheless, it is important that there is sufficient awareness of the prodrug concept and potential impact and associated forensic implications, not just for chemical analysis but also for toxicological considerations when a substance has been used.  相似文献   

16.
Age estimation is one of the challenges in forensic sciences. There are many techniques to estimate the age. Molecular biology approach is one of these techniques. Signal joint T‐cell receptor excision circles gene (sjTRECs), is one of this approach. We aimed to use sjTRECs as a suitable marker for age estimation among Egyptian population. TaqMan qPCR approach was used to quantify sjTREC levels in blood samples obtained from 153 healthy Egyptian individuals ranging from a few weeks to 70 years. Our results showed a significant negative correlation between sjTREC levels and age with p ≤ 0.05. Moreover, the individual's age can be determined through this formula Age = ?30.671+ (?5.998Y) (Y is dCtTBP ? sjTREC) with standard error ±7.35 years. Within the forensic context, sjTREC' levels can be used to estimate the Egyptian individual's age accurately.  相似文献   

17.
Within the context of medical examiner's offices, forensic anthropologists are increasingly being asked to assist with the interpretation of traumatic skeletal injury. This case study presents an example of trauma analysis performed by forensic anthropologists at the Maricopa County Forensic Science Center in Phoenix, Arizona. The primary goal of this study is to document an uncommon pattern of traumatic injury—severe grinding abrasions of the lower appendage that macroscopically resemble sharp force trauma, especially as observed in dismemberment cases—resulting from an individual being dragged beneath a Light Rail train for c. 1.7 miles. The abraded skeletal elements include a femoral shaft fragment, a femoral head portion, and the right foot. Second, this study aims to illustrate the efficacy of forensic anthropological analysis of patterned skeletal trauma. Finally, this study demonstrates the critical importance of analyzing scene information before drawing conclusions as to the etiology of a traumatic injury pattern.  相似文献   

18.
Network forensics is an investigation technique looking at the network traffic generated by a system. PyFlag is a general purpose, open source, forensic package which merges disk forensics, memory forensics and network forensics.This paper describes the PyFlag architecture and in particular how that is used in the network forensics context. The novel processing of HTML pages is described and the PyFlag page rendering is demonstrated. PyFlag's novel processing of complex web applications such as Gmail and other web applications is described. Finally PyFlag's report generation capabilities are demonstrated.  相似文献   

19.
Network forensics is an investigation technique looking at the network traffic generated by a system. PyFlag is a general purpose, open source, forensic package which merges disk forensics, memory forensics and network forensics.This paper describes the PyFlag architecture and in particular how that is used in the network forensics context. The novel processing of HTML pages is described and the PyFlag page rendering is demonstrated. PyFlag's novel processing of complex web applications such as Gmail and other web applications is described. Finally PyFlag's report generation capabilities are demonstrated.  相似文献   

20.
DNA is one of the fastest growing tools in forensic sciences, increasing reliability in forensic reports and judgments. The use of DNA has increased in different areas of the forensic sciences, such as investigation of plant species, where plastid DNA has been used to elucidate and generate evidence in cases of traceability of genetically modified and controlled plants. Even with several advances and the practice of using DNA in forensic investigations, there are just few studies related to the identification of genetic tools for the characterization of drug and nondrug-types of Cannabis. Herein, the whole plastomes of two drug-type Cannabis are presented and have their structures compared with other Cannabis plastomes deposited in the GenBank, focusing in the forensic use of plastome sequences. The plastomes of Cannabis sativa “Brazuka” and of the hybrid Cannabis AK Royal Automatic presented general structure that does not differs from the reported for other C. sativa cultivars. A phylogenomic analyses grouped C. sativa “Brazuka” with the nondrug C. sativa cultivars, while the hybrid Cannabis AK Royal Automatic placed isolated, basal to this group. This suggests that the analysis of plastomes is useful toward genetic identification of hybrids in relation to C. sativa.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号