首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Fatal suffocation by rubber balloons in children: mechanism and prevention   总被引:2,自引:0,他引:2  
The increase in the use of photographs on individual identification credentials such as driving licences, credit cards, security passes and passports has led, for the purpose of criminal activities, to the falsification of genuine documents bearing photographs of the perpetrating criminal. These photographs may be used as valuable physical evidence when compared with known photographs of a suspect as they form somewhat of a signature of the suspect that is left behind on the evidence. The comparison of ID photographs requires the cooperation of two predominantly visual disciplines; forensic photography and morphological anatomy. This paper describes a photographic technique which allows accurate anatomical measurement and tracing of facial features, which allows direct physical comparison of ID document images.  相似文献   

2.
Abstract: Anyone with a computer, scanner, and color printer has the capability for creating documents such as identification cards, passports, and counterfeit currency. Laser desorption mass spectrometry (LDMS) has been demonstrated as a powerful tool for colorant analysis. Inkjet printers are now moving largely toward the use of pigments as colorants; their insolubility makes analysis by simpler methods such as thin‐layer chromatography no longer an option. Recent developments in pigmented inkjet printer inks, such as gloss optimizers that coat pigment particles, may prohibit colorant analysis by LDMS. We demonstrate here that pigments used in inks from two Epson printers can be detected and analyzed by LDMS. Also, LDMS spectra of various colors created using a 4‐cartridge (cyan/magenta/yellow/black, CMYK) inkset are evaluated, to begin to develop an approach for unraveling LDMS data from real samples, to determine the number of inks used by a printer, and the chemical composition of the colorants.  相似文献   

3.
《Science & justice》2022,62(5):624-631
Counterfeiting of banknotes is still a severe crime problem in many countries. One of the most significant issue for solving the crime is to classify the counterfeit types and identify the sources. Most of the current methods to classify counterfeit banknotes rely on manual examination that is time-consuming and labor-intensive. Moreover, these methods only detect surface features which can be easily imitated through advanced printing technology. In this study, an automated method based on optical coherence tomography (OCT) and machine-learning algorithms was proposed to classify different types of banknotes based on the internal features. A spectral-domain OCT (SD-OCT) system was employed for sub-surface imaging and quantitative assessment of banknotes. A total of 29 Chinese 100-Yuan banknotes were collected, in which 4 of them were real and 25 of them were counterfeiting by three different printing processes. Each banknote was imaged 10 times in 3 distinct regions, which resulted in a dataset of 290 samples. Each sample was characterized by extracting 2 A-scan (OCT signal intensity along depth) based features and 14B-scan (cross-sectional OCT images) based features. Several machine-learning models, including logistic regression (LR), support vector machines (SVM), K-nearest neighbor (KNN) and random forest (RF), were built and optimized as the classifiers that were trained using 203 samples and applied to predict 87 testing samples. The best performance was achieved by SVM classifier in which the sensitivity of 96.55% and specificity of 98.85% were obtained in discriminating between authentic and counterfeit banknotes, and the sensitivity of 94.67% and specificity of 98.22% were obtained in predicting the types of counterfeit banknotes. These classifiers were also evaluated using the receiver operating characteristic (ROC) curves. To the best of our knowledge, this is the first study where A-scan and B-scan derived features from OCT images have been used for the detection and classification of different types of counterfeit banknotes.  相似文献   

4.
Magnetic swipe card technology is used for many purposes including credit, debit, store loyalty, mobile phone top-up and security identification cards. These types of cards and the details contained on them are often relied upon as a form of identification and personal authentication. As such reliance is placed upon them it is surprising that they do not incorporate more stringent security features, and because of this lack of features it is not surprising that they attract the attention of people who wish to exploit them for illegal gain. The paper introduces the type of technology, and range of devices available for manipulating magnetic swipe card data. It proposes the use of Digital Evidence Bags as a suitable format for the evidential storage of information obtained from them, thus further illustrating the flexibility of the format and demonstrating the diverse range of devices that have to be handled within the digital investigation and law enforcement community.  相似文献   

5.
Rapidly increasing foreign direct investment from China within the European Union over the past decade has been, in general, greatly fostered by an open and non-discriminatory legal regime. However, 28 Member States retain control over the review of such investment for purposes of evaluating national security concerns within their respective borders. Current trends reveal a strong likelihood of substantial increases within the coming years in Chinese investment touching upon so-called “strategic” or “sensitive” sectors within the European Union nations. Similar Chinese investment in the United States has raised some strong opposition from the federal government on national security grounds. Accordingly, this article compares and contrasts the European Union’s current fragmented system of national security review with that of the United States — a centralized legal regime which provides for exclusive federal government national security review of foreign investment. The question is then posed as to the likelihood of the European Union adopting an American-style unified national security review system to replace the existing fragmented system, especially in light of the newly enhanced legal competence of European Union authorities over issues concerning foreign investment. This article then concludes with an analysis of the advantages to Chinese investors stemming from the creation of such a European-wide system of national security review.  相似文献   

6.
Determining the sequence of intersecting lines is a significant issue in the forensic document examination that can reveal the fraud or distinguish between different allegations. Optical coherence tomography (OCT) is a high-resolution cross-sectional imaging technique that has been introduced into forensic science field recently. The potential of OCT as a novel method to determine the sequence of intersecting lines was examined for the first time. In this study, a spectral-domain OCT system with a center wavelength of 900 nm was employed to perform nondestructive examination on determining the sequence of 18 heterogeneous intersecting line samples produced using three types of gel pens and three brands of stamp pad ink seals. Two-dimensional (2D) cross-sectional, and three-dimensional (3D) volumetric images of the intersecting lines were obtained by the OCT system. Several features were noted and analyzed to successfully determine the sequence of all the 18 samples. Blind tests were also conducted to demonstrate the effectiveness of OCT technique. The results illustrate that OCT technology can provide an effective and accurate method for sequencing intersecting lines of gel pen ink and seal ink, which may complement the conventional methods used in the examination of questioned documents.  相似文献   

7.
沈洁 《中国司法鉴定》2011,(4):62-63,79
通过分析两例喷墨打印文件是否一次形成的重新鉴定案件,说明了在该类案件的检验、鉴定过程中,应当把握纸张、字迹墨迹深浅、颜色、墨迹分布等打印文件的主要特征,并综合考量行字迹横轴线倾斜、行间距、页边距、字库特征等非特异性差异点的价值,以系统鉴定的理念综合检验分析,才能形成出客观的鉴定结论。  相似文献   

8.
《Digital Investigation》2014,11(3):143-153
While one would not even consider them alike, payment cards are one of the most valuable and widely used embedded systems. Payment card systems are probably the most attacked and counterfeited. In fact, even though the use of smart cards have introduced high security capabilities, criminal activity has not been deterred and payment card fraud remains a lucrative activity.From low-tech (carding) to high-tech (man in the middle attack) fraud, all payment card based frauds require stealing or modifying card data and reusing it with a direct profit. Physical forms of fraud, such as Automated Teller Machine (ATM) withdrawals or in store payments, are mostly based on and associated with manipulated cards. Through their nefarious actions, that may include overwriting the magnetic strip data or injecting attacks on the embedded microcontroller, criminals are able to realise significant monetary gains.To effectively deal with these fraud cases, investigators have to quickly determine whether a card is authentic or a counterfeit. Currently no known easy forensic tool exists that provides a quick effective and accurate response.In this article, after having conceptualised payment cards as multi-interface embedded systems, we propose simple and fast forensic analysis methods to finally provide investigators with associated desktop and mobile forensic tools.  相似文献   

9.
The phrase "military law" perhaps seems strange. In international law—and even in national law—there is no consensus on the recognition of such a branch. Yet over half of the operative documents of international law adopted since the creation of the Commonwealth [of Independent States; CIS] have concerned military-political relationships. There are at present almost one hundred and fifty multipage, and dozens of two-page, documents. A new phenomenon has emerged in international law and is evolving.  相似文献   

10.
我国知识产权刑事保护面临国际与国内双重压力,形势严峻。公安机关作为刑事执法部门,应加大对知识产权领域犯罪的打击力度,但目前仍面临着刑事立法缺陷以及公安经侦自身条件、公安与行政执法、与国际刑事司法部门沟通协作方面的重重障碍。公安机关必须积极开展经侦基础理论研究,重塑侦查理念与侦查模式,密切与行政执法部门的协作关系,并不断拓展境内外知识产权执法合作空间。  相似文献   

11.
Forensic identification techniques include the examination of ID cards, the decedent's private belongings, fingerprints, footprints, lip marks, dental findings, red blood cell enzymes, performing photograph matching, facial reconstruction, visual identification, and DNA "fingerprinting." As part of forensic examinations, the identification of corpses that are fresh, decomposed, fragmented, or skeletonized as well as individual body parts and human remains can be requested. Identification becomes a challenging task for forensic terms particularly in mass-disaster situations. Each identification case should be considered to its own merit and the way to do that should be based on the effectiveness and cost of each method used. In Turkey, one of the major duties of the medicolegal system on the investigation of deaths is to identify the deceased if unknown.This study is undertaken to investigate the procedures, as well as their validities, used to deal with individualization of dismembered bodies directly sent to the Council of Forensic Medicine, Ministry of Justice, for autopsy and/or visual identification, as well as those received from peripheral districts for forensic identification. According to the Turkish Penal Procedural Law, a positive identification of the deceased is mandatory before performing an autopsy. According to the law, the ID cards are not taken to be sufficient for recognition of the deceased, and the major way of identification in daily practice is visual identification by a relative or any recognizant person to approve the identification to the prosecutor. If visual identification fails, fingerprints, dental x-rays or body x-rays, and DNA "fingerprinting" can be used to establish identity when compared with known records of the individual obtained by law enforcement.This retrospective study was carried out into 421 dismembered bodies, among 3063 autopsies performed in year 2002 by the Department of Morgue at the Council of Forensic Medicine, with particular insight into the identification procedures undertaken and their results. The overall negative identification rate was 30.4%, and in 1% of the cases, the visual identification by relatives were not confirmed by DNA identification and taken as misidentified.  相似文献   

12.
Infectious diseases are a long-standing and continuing threat to health and welfare, with their containment dependent on national disease surveillance and response capacities. This article discusses infectious disease surveillance in the United States and the United Kingdom, examining historical national traditions for identifying and controlling infectious disease risks and how globalization and technical advances have influenced the evolution of their respective approaches. The two systems developed in different but parallel ways. In the United States, surveillance remained quite localized at the state level until the early twentieth century and still retains many of those features. The U.K. approach became centralized from the latter part of the nineteenth century and has principally remained so. In both cases, disease surveillance was traditionally conceived as a public good, where national or local authorities held sovereign rights and power to protect public health. With the increasing globalized nature of infectious disease, such notions shifted toward surveillance as a global public good, with countries responding in turn by creating new global health governance arrangements and regulations. However, the limitations of current surveillance systems and the strong hold of national interests place into question the provision of surveillance as a global public good. These issues are further highlighted with the introduction of new surveillance technologies, which offer opportunities for improved disease detection and identification but also create potential tensions between individual rights, corporate profit, equitable access to technology, and national and global public goods.  相似文献   

13.
With increasing interest in employing iris biometrics as a forensic tool for identification by investigation authorities, there is a need for a thorough examination and understanding of postmortem decomposition processes that take place within the human eyeball, especially the iris. This can prove useful for fast and accurate matching of antemortem with postmortem data acquired at crime scenes or mass casualties, as well as for ensuring correct dispatching of bodies from the incident scene to a mortuary or funeral homes. Following these needs of forensic community, this paper offers an analysis of the coarse effects of eyeball decay done from a perspective of automatic iris recognition. We analyze postmortem iris images acquired for a subject with a very long postmortem observation time horizon (34 days), in both visible light and near-infrared light (860 nm), as the latter wavelength is used in commercial iris recognition systems. Conclusions and suggestions are provided that may aid forensic examiners in successfully utilizing iris patterns in postmortem identification of deceased subjects. Initial guidelines regarding the imaging process, types of illumination, and resolution are also given, together with expectations with respect to the iris features decomposition rates. Visible iris features possible for human, expert-based matching persists even up to 407 h postmortem, and near-infrared illumination is suggested for better mitigation of corneal opacity while imaging cadaver eyes (Post-mortem iris decomposition and its dynamics in morgue conditions. ArXiv pre-print, 2019).  相似文献   

14.
The field of operations psychology has predominantly been concerned with supporting military operations. However, with the evolving role of policing from traditional patrolling roles to major planned security operations, operations psychology is gaining importance in enhancing police deployments and crisis management operations. This paper documents the Singapore Police’s experience with using operations psychology in major operations and proposes an Operations Psychology Framework to think about the possible operations psychology contributions in enhancing major police operations.  相似文献   

15.
Two hundred prepaid cards, which had been used in Nagoya-city's subway in Japan, and another 32 prepaid cards (11 were real turnpike cards, 20 were counterfeit cards and 1 was a white card) were evaluated by X-ray fluorescence (XRF) without any pre-treatment. A preliminary investigation was performed on 200 prepaid cards in order to find an identification method for the turnpike cards. By plotting the relative intensity of titanium versus that of iron obtained by XRF, the cards were clearly classified into seven groups. On the other hand, the cards could be divided into four groups by a multivariate analysis using the relative intensities of five elements such as chlorine, calcium or tin, titanium, iron and barium. Using these results to classify the Japanese turnpike cards, they were divided into three groups or two groups. One of three groups or two groups was the counterfeit card group.  相似文献   

16.
The personal ID card is a document carried by most Germans, but rarely used. This could change in the future: According to the new law on identification cards and electronic proof of identity (Gesetz über Personalausweise und den elektronischen Identitätsnachweis, PAuswG), the ID card, with its proof of identity, will gain a new functionality, making it applicable for diverse Internet transactions. Functionally, the electronic proof of identity corresponds to existing non-electronic personal proof of identity guidelines in legal and business connections. However, its concrete, technical application opens up many issues regarding contracts and data privacy laws. On both the legal and the technical level, the German approach departs from other European countries, as it strictly distinguishes the electronic proof of identity from the electronic signature function, which the new ID card also provides. It remains to be seen whether the various projects of the EU Member States will become legally and technically interoperable in the near future.  相似文献   

17.
全球数字货币正沿着两个方向飞速发展,技术驱动下私人数字货币的自发秩序仍在不断生长,而国家规制下法定数字货币的公权扩张也日趋明显。纵观数字货币规制的全球格局,虽然各国在数字货币ICO和交易所监管思路及其最新发展各不相同,但都是在促进金融创新与防范风险之间寻求最优平衡。因地制宜,我国亦不应采取单一的监管或控制思维,而应更多地寻求公权力机构和私权力平台合作,规制理念宜从政府监管向共同治理模式变革:从链下管制走向链上链下相结合的全域治理,从政府直接监管走向“第三方护卫”的间接治理,从国家规制走向超国家规范的规制治理。  相似文献   

18.
The nature and prevalence of insurance fraud has been studied only to a limited extent, even in the USA and Europe. Nevertheless, national authorities have pressed ahead with various approaches to control such fraud. This paper briefly outlines the nature and difficulties around measurement of insurance fraud and reviews key international trends in the regulation of fraud. It then presents the findings of an empirical study of insurance fraud in Taiwan and recent proposals for anti-fraud control. It analyses these findings in the context of actual practices of insurance companies which give evidence to the idea that ‘moral hazard’ is embedded in the institutional arrangements, social relationships, and moral economies of private insurance.  相似文献   

19.
The author proposes a nondestructive and highly precise method of measuring the thickness of a film pasted on a passport using a confocal-type laser profile microscope. The effectiveness of this method in passport examination is demonstrated. A confocal-type laser profile microscope is used to create profiles of the film surface and film–paper interface; these profiles are used to calculate the film thickness by employing an algorithm developed by the author. The film thicknesses of the passport samples—35 genuine and 80 counterfeit Japanese passports—are measured nondestructively. The intra-sample standard deviation of the film thicknesses of the genuine and counterfeit Japanese passports was of the order of 1 μm The intersample standard deviations of the film thicknesses of passports forged using the same tools and techniques are expected to be of the order of 1 μm. The thickness values of the films on the machine-readable genuine passports ranged between 31.95 μm and 36.95 μm. The likelihood ratio of this method in the authentication of machine-readable Japanese genuine passports is 11.7. Therefore, this method is effective for the authentification of genuine passports. Since the distribution of the film thickness of all forged passports was considerably larger than the accuracy of this method, this method is considered effective also for revealing the relation among the forged passports and acquiring proof of the crime.  相似文献   

20.
针式打印机是一种常用的办公机具,从针式打印机的结构和打印原理出发,阐述了针式打印文件种类鉴别和个体识别所依据的打印特征,为针式打印文件的检验鉴定进行操作层面的探讨。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号