首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 171 毫秒
1.
目的 找出一字型和十字型齿状钥匙被复制后形成的痕迹特征 ,为检案提供参考。方法 取 1 32把一字型齿状钥匙和 4 4把十字型齿状钥匙进行复制并经OLYMPUS连续变倍立体显微镜观察。结果 被复制钥匙的侧面 ,匙槽沟 ,牙花顶部曲面或钥匙凹窝面上均有明显的痕迹。结论 根据被复制钥匙痕迹特征 ,能为检验认定提供主要依据  相似文献   

2.
目的 探索曲形槽状齿钥匙上的增配痕迹特征及其随开启次数的变化.方法 用被增配过的原配钥匙进行模拟开锁实验,观察开启前后的增配痕迹.结果 发现原配钥匙上的增配痕迹主要为钥匙板侧上的夹持痕迹和齿槽底面、齿槽壁上的擦划痕迹,且齿底面上的擦划痕迹随开启次数增加较稳定,齿壁上的擦划痕迹随开启次数增加呈渐变性变化.结论 原配钥匙上的增配痕迹主要为夹持痕迹和仿形针擦划痕迹,夹持痕迹反映不明显,仿形针擦划痕迹较稳定.  相似文献   

3.
目的探索月牙槽状齿钥匙增配痕迹形成规律、增配痕迹随开启次数的渐变过程以及影响增配痕迹的变化因素。方法用被增配过的原配钥匙进行模拟开锁实验,观察并记录开启前和开启过程中的增配痕迹。结果被增配钥匙的齿面上有明显的磕碰痕迹和擦划痕迹,增配痕迹随开启次数增加呈渐变性变化,且不同区域的增配痕迹变化不同。结论月牙槽状齿钥匙的被增配痕迹为磕碰痕迹和擦划痕迹,齿槽壁上的被增配痕迹随着开启次数增加较稳定。  相似文献   

4.
后配钥匙是借助于手工或机械锉、铣加工复制,齿列关系与原配钥匙相一致的新钥匙。而对用后配钥匙做案案例的研究,往往偏重于后配钥匙在锁芯弹子上形成的痕迹和原配钥匙在复制过程中形成痕迹的分析、研究,最能反映加工复制痕迹的后配钥匙常常被忽视。对其进行科学地分析和检验、识别原配或后配钥匙,这在实践工作中具有很大的应用价值。 1 后配钥匙上复制加工痕迹及其形成机理 后配钥匙一般是使用匙坯加工复制而成的,开齿过程中在钥匙坯上会形成明显的加工痕迹。后配钥匙上的加工痕迹主要有以下5种。  相似文献   

5.
1案例资料2006年2月,某市发生一宗入室盗窃案,门锁完好,窗户防盗网完好无损,经检验,原配钥匙没有配过。对锁检验如下:圆头弹子平端面的一侧边缘有摩擦痕,锁体弹子孔边缘的棱角被倒平。在与被磨损的弹子孔边缘同侧的锁芯孔壁上,有摩擦痕迹。技术人员根据以上痕迹特征,排除了钩状工具等几种常见的开锁方式,难以确定开锁工具。后抓获了案犯,缴获了案犯身上的钥匙坯,通过多次实验,最后确定为用钥匙坯开锁。2讨论2.1钥匙坯开锁的痕迹形成钥匙坯开锁是利用锁具本身的互开率。锁具质量较差,其零件加工精度差,为钥匙坯开锁创造了条件。钥匙坯为“一…  相似文献   

6.
公安部第二研究所痕迹室自1989年10月始对机器配制钥匙痕迹的检验进行研究,随后应用于实际办案。至1994年6月已办理大小案件200余起,其检验原理为:用半自动或自动配匙机增配钥匙后,原钥匙齿面上留有擦划痕迹。半自动配匙机留下的痕迹是纵向和斜向分布的擦划线,横向不等距分布的条状压印痕迹;自动配匙机留下痕迹由平面齿部的纵向擦划和斜向齿部的斜向平行擦划线束痕迹构成,个别有横向等距分布的条  相似文献   

7.
目的探索被增配凸形钥匙上仿形刀痕迹倾斜角度与齿坡角间的关系。方法用铝板制作相同坡长不同齿坡角的钥匙模型,在相同夹持方式下模拟增配过程,观察并总结钥匙上仿形刀痕迹倾斜角度的变化。结果不同齿坡角上仿形刀痕迹倾斜角度不同。结论凸齿钥匙上仿形刀增配痕迹倾斜角度随齿坡角的增大而减小。  相似文献   

8.
在犯罪现场上,常见插片开启暗锁入室作案,但用插片开启挂锁却不多见,由于开锁方式简便易行,一分钟之内即可开锁,且破坏工具痕迹隐蔽,易被误认为是钥匙开锁,从而误导侦查方向。1995年3月至1996年6月期间,我市连续发生插片开防盗门挂锁入室盗窃系列案件21起。通过对这一系列盗窃案开锁痕迹的检验、及对破案后收缴的作案工具检验,进行反复实验研究,总结经验介绍如下: 1 插片开启挂锁的原理及其条件  相似文献   

9.
蔡江 《刑事技术》2009,(5):58-59
近日,笔者在勘验3起入室系列盗窃案时发现现场门窗完好,门上挂锁未见破坏痕迹,可室内财物却被盗,起初以为用钥匙开锁实施盗窃,但在检验挂锁时,发现锁舌上有新鲜带状擦划痕迹,锁舌两侧锁体内壁上有2条线状擦划痕迹,认定这是压锁舌技术开锁,是利用“插片”开锁遗留的痕迹。这类技术开锁留痕不明显不易被发现,容易被被害人和侦查技术人员忽视,笔者也是第一次遇到,现结合本辖区发生的利用“插片”压锁舌技术开锁案件,对“插片”的结构、原理、遗留痕迹进行介绍。  相似文献   

10.
钥匙上复制痕迹的检验要点   总被引:1,自引:1,他引:0  
1 钥匙被复制形成的痕迹类别钥匙被复制形成的痕迹是指在增配钥匙时,配匙机器的有关部件作用于匙模上形成的形态变化,其分为固定夹板的夹待印压痕和定位刀的刮划痕两种.匙模,是指用来当作模型的钥匙,它既可以是原配钥匙,也可以是后配钥匙.1.1 夹持印压痕:位于匙体两侧面,是固定夹板对钥匙匙体的两侧面同时施加对向正压力而形成.痕迹呈长条带状,平行于钥匙轴线,新鲜痕迹反映较好,痕迹发亮,略有发毛.  相似文献   

11.
目的研究内、外铣槽钥匙机械配制后痕迹的出现规律及其影响因素。方法利用传统的痕迹检验方法观察痕迹出现的位置、形态及分布规律。结果内、外铣槽钥匙机械配制后会留下不同于其原始加工痕迹和使用痕迹的增配痕迹,这种痕迹是否明显出现、出现的形态和位置受钥匙材质和结构、配匙机、配匙人员工作经验等因素的影响。结论当未发现内、外铣槽钥匙上有明显增配痕迹时,不能轻易做出钥匙未被增配的判断。  相似文献   

12.
目的探索方形坡状齿钥匙增配痕迹形成规律、增配痕迹随开启次数的渐变过程以及增配痕迹的变化因素。方法用被增配过的原配钥匙和增配钥匙进行模拟开启实验,观察并记录开启前和开启过程中的增配痕迹。结果被增配钥匙的坡面上有明显的印压痕迹和擦划痕迹,增配痕迹随开启次数增加呈渐变性变化,且原配钥匙和增配钥匙上的增配痕迹变化不同。结论增配痕迹为印压痕迹和擦划痕迹,印压痕迹随着开启次数增加而逐渐消失,擦划痕迹较稳定。  相似文献   

13.
目的研究几类常见钥匙增配痕迹特征分布。方法用光学显微镜观察钥匙的增配痕迹。结果几类钥匙的增配痕迹能够观察到。结论通过检验不同种类钥匙上的痕迹特征可以确定是否为增配使用痕迹。  相似文献   

14.
Bite marks have been reported in flesh, foodstuffs and inanimate objects. Those in foodstuffs occur widely in cases of larceny but also occur in serious crimes such as murder.Evaluation of distinctive characteristics in food bites differs from the corresponding assessment of flesh bite marks in that the assessment is made on the impression made by the labial aspect of the teeth and not on the biting edge, because the teeth penetrate the bitten foods to different depths.The terminology used to describe food bite marks is very varied and a classification of food bites has been formulated in an effort to bring a degree of uniformity to the analysis of such marks.  相似文献   

15.
Lanyard chains are commonly worn around the neck to hold keys and identification badges. A ten-year-old Black male child was home alone jumping and swinging of the raised crossbars on his mother's four-poster bed. He commonly did this. He also wore a lanyard around his neck with his house key, which he used to let himself in after school. His mother found him hanging on the corner of the bedpost by the lanyard when she returned from work. The death scene showed that he was jumping on the bed and the lanyard hooked over the top of the corner bedpost, causing first and second cervical vertebrae dislocation of an abrupt "drop-type" hanging with neck abrasion marks. Lanyards, or any loose rope material around the neck, are inherently dangerous due to their strength and ability to catch fixed or moving objects. Safety modifications to the lanyards are easily made with "breakaway" Velcro-type or plastic clip fasteners. This is the first reported case of an accidental hanging after review of the medical literature and files of the U.S. Consumer Products Safety Commission.  相似文献   

16.
刘芳 《政法学刊》2014,(3):120-124
公安学术期刊的特色就是以特色栏目的创建为基础,突出优势学科、选定研究方向,策划重点选题,展开学术争鸣。通过集中优质资源,办好特色栏目,更好地引导公安学术研究向纵深发展。为此必须以特色化为办刊理念,以优秀的编辑团队为主体,以高水平的学术成果为支撑。  相似文献   

17.
Legal context: Community trade marks and registered Communitydesigns have co-existed since April 2003. The relevant Europeanlegislation permits some subject matter to be registered undereither or both of these regimes. Key points In the absence of an express prohibition, it wasperhaps inevitable that the owners of distinctive designs wouldconsider registering them as trade marks and, conversely, thatthe owners of certain non-conventional trade marks might takeadvantage of opportunities for cheap and speedy registrationunder the designs system. The ability to obtain registered Communitydesigns and trade marks for the same subject matter is consideredhere. Practical significance A party seeking to protect the designof a distinctive product shape or its packaging may be ableto register it as a Community trade mark where it has missedthe boat for claiming novelty as a registered design, or wherea pre-existing design right is about to expire. On the otherhand, a distinctive and new logo or get-up which needs quickand cheap protection may benefit from being registered as aCommunity design. Neither the rights owners, nor those againstwhom they seek to assert their rights, should accept the validityof a registered Community design without question since thereis no substantive examination procedure. However, where valid,it can provide a powerful alternative to a trade mark and auseful additional weapon against unfair competition.  相似文献   

18.
The increasing popularity of cryptography poses a great challenge in the field of digital forensics. Digital evidence protected by strong encryption may be impossible to decrypt without the correct key. We propose novel methods for cryptographic key identification and present a new proof of concept tool named Interrogate that searches through volatile memory and recovers cryptographic keys used by the ciphers AES, Serpent and Twofish. By using the tool in a virtual digital crime scene, we simulate and examine the different states of systems where well known and popular cryptosystems are installed. Our experiments show that the chances of uncovering cryptographic keys are high when the digital crime scene are in certain well-defined states. Finally, we argue that the consequence of this and other recent results regarding memory acquisition require that the current practices of digital forensics should be guided towards a more forensically sound way of handling live analysis in a digital crime scene.  相似文献   

19.
The occurrence of distortion in human bite marks is well recognised. A forensic classification of distortion is suggested which is based upon the causative factors and their inter-relationships. The terms primary distortion and secondary distortion are introduced and described. The objective of this classification is to emphasise the need for a scientific approach to the recognition and interpretation of the types of distortion found in human bite marks. The relationships between distortion, distinctive features and superimposition techniques in bite mark analysis are discussed.  相似文献   

20.
There are many techniques available for the recovery of fingermarks at scenes of crime including the possibility of taking casts of the marks. Casts can be advantageous in cases where other destructive recovery techniques might not be suitable, such as when recovering finger marks deposited on valued or immobile items. In this research, Isomark (a silicone-based casting material) was used to recover casts of finger marks placed on a variety of substrates. Casts were enhanced using cyanoacrylate fuming. Good quality marks were successfully recovered from a range of smooth, non-porous surfaces. Recovery from semi-porous surfaces was shown to be inefficient. DNA was subsequently extracted from the casts using QIAamp Mini extraction kits, amplified and profiled. Full DNA profiles were obtained 34% of samples extracted.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号