首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
The recent expansion of the Italian wolf population through the Apennine and western Alps, after centuries of contractions, is causing conflicts with human activities leading to a rise in poaching or illegal killings. Here we show how molecular population genetics has been used to identify a suspect serial wolf killer. We analysed DNA extracted from a necklace made of ten presumed wolf canine teeth, confiscated in 2008 to a man living in the northern Italian Apennine (Liguria Region). Individual genotypes were determined using 12 unlinked autosomal microsatellites (STRs), mtDNA control-region sequences, a male-specific ZFX/ZFY restriction-site and three Y-linked STRs. Results indicate that the teeth belonged to six different individuals (three males and three females), which were assigned to the Italian wolf population with p > 0.90 by Bayesian procedures. One of these genotypes matched with the genetic profile of a male wolf previously found-dead and already non-invasively sampled in the same area. Another genotype matched with that of a female wolf non-invasively sampled twice in the same area 1 year before. These data are being used as forensic genetic evidence in the ongoing criminal trial against the suspect serial wolf killer.  相似文献   

2.
《Digital Investigation》2014,11(4):295-313
Distributed filesystems provide a cost-effective means of storing high-volume, velocity and variety information in cloud computing, big data and other contemporary systems. These technologies have the potential to be exploited for illegal purposes, which highlights the need for digital forensic investigations. However, there have been few papers published in the area of distributed filesystem forensics. In this paper, we aim to address this gap in knowledge. Using our previously published cloud forensic framework as the underlying basis, we conduct an in-depth forensic experiment on XtreemFS, a Contrail EU-funded project, as a case study for distributed filesystem forensics. We discuss the technical and process issues regarding collection of evidential data from distributed filesystems, particularly when used in cloud computing environments. A number of digital forensic artefacts are also discussed. We then propose a process for the collection of evidential data from distributed filesystems.  相似文献   

3.
The anthropocentric nature of forensic sciences has been changing continuously over the years and this process is continuing today. Due to its universality and multilateral implementation, and the fragmented nature of forensic epistemology, the information provided by forensic genetics can play a pivotal role in forensic science. At the same time, the link between forensic genetics and non-human forensic biological evidence has become unquestionable. It may highlight the modern requirements of forensic science, and this connection is also able to provide useful and sufficient examples for developmental processes in wildlife forensics. Obviously, the local formations, organizations, and operations of wildlife forensics can be different worldwide, but the detection and punishment of wildlife-related criminal behavior, as well as the prevention of further crimes, play a relevant role in these processes everywhere.  相似文献   

4.
We report a recent case in which a wildlife warden had suspected that some people had killed and cooked a peacock. Cooked meat, intestine of bird and the wooden block used for chopping were seized from the site of crime and forwarded to our laboratory for DNA testing. Mitochondrial cytochrome b sequence analysis revealed that the cooked meat and remnants of the bird were of a chicken, but the DNA obtained from the wooden block was of an Indian Peafowl (Peacock) testifying that the wooden chopping block was used to chop the meat of an endangered bird, thus bringing to light a wildlife crime.  相似文献   

5.
6.
In canine population studies for forensics, the mitochondrial DNA is profiled by sequencing the two hyper variable regions, HV1 and HV2 of the control region.In a first effort to create a Belgian population database some samples showed partially poor sequence quality. We demonstrated that a nuclear pseudogene was co-amplified with the mtDNA control region. Using a new combination of primers this adverse result was no longer observed and sequencing quality was improved. All former samples with poor sequence data were reanalyzed. Furthermore, the forensic canine population study was extended to 208 breed and mixed dogs. In total, 58 haplotypes were identified, resulting in an exclusion capacity of 0.92. The profile distribution of the Belgian population sample was not significantly different from those observed in population studies of three other countries.In addition to the total population study 107 Belgian registered pedigree dogs of six breeds were profiled. Per breed, the obtained haplotypes were supplemented with those from population and purebred studies. The combined data revealed that some haplotypes were more or less prominent present in particular dog breeds. The statistically significant differences in haplotype distribution between breeds and population sample can have consequences on mtDNA databasing and matching probabilities in forensics.  相似文献   

7.
The paper reports on molecular biological investigations in a case of poaching which resulted in considerable damage for property. Blood traces from poaching sites have been analysed and compared with blood from two knives and a pair of trousers of the suspects. In two of three poaching sites, genomic DNA could be amplified by PCR and assigned to fallow deer. The authors could demonstrate identical allelic combinations between one of the poaching sites and a part of the traces. Problems of the legal appreciation in this case are described.  相似文献   

8.
Innovation and internationalization: the case of Italy   总被引:1,自引:0,他引:1  
The aim of this paper is to analyze the impact of international activities on knowledge output. For this purpose, we employ a dataset containing exclusively qualitative information about a sample of small and medium Italian manufacturing firms. In the econometric analysis, a probit model is used. The results of the estimations highlight that firms active in international markets generate more knowledge than their counterparts which sell in the national market only. There are two possible explanations of this result. First, globally engaged firms employ more knowledge inputs, such as higher innovation expenditures. Second, international firms are more innovative because they can access to a larger flow of ideas from external sources.  相似文献   

9.
10.
《Global Crime》2013,14(3-4):391-397
Professor Marcello Saija is the director of the Department of European and International Studies at the University of Messina; Dr Daniela Irrera is a researcher at the Department of European and International Studies of the University of Messina.  相似文献   

11.
The big data era has a high impact on forensic data analysis. Work is done in speeding up the processing of large amounts of data and enriching this processing with new techniques. Doing forensics calls for specific design considerations, since the processed data is incredibly sensitive. In this paper we explore the impact of forensic drivers and major design principles like security, privacy and transparency on the design and implementation of a centralized digital forensics service.  相似文献   

12.
Over the past decades, university-industry relationships have become an important subject due to the essential role played by technological progress in the economic development of countries. From a theoretical point of view, several studies have shown the close relationship between investments in research and innovative activities of universities and the economic growth of specific territories. Indeed, the strong linkages between universities and a country’s production system encourage the process of technology transfer and the commercial use of the research results. For this reason, the European Union has implemented a series of measures to promote the adoption of research findings in the real economic and social context, strengthening the linkages between universities, industries and government. As a starting point for enhancing this link, specific mechanisms have been devised by universities. In particular, technology transfer offices (TTOs) have been created to stimulate and encourage the dissemination of the research outcomes, translate them into practise, and facilitate their interrelations with the other two agents of the innovation systems: industries and government. Within this context, the present paper aims to gain knowledge on the determinants of spin-off creation in Italy with special attention to the role played by university TTOs. Specifically, an econometric probability model has been built merging the extant literature into four distinct strands. The analysis, based on the NetVal indicators and primary data survey, has allowed us to assess the Italian experience at an aggregate and disaggregate level.  相似文献   

13.
DNA-based analysis was performed using partial mitochondrial cytochrome b genes of five mammalian specimens and Chromo-Helicase-DNA-binding (CHD) genes of five pheasants to determine whether specimens were from illegally hunted animals. Mammalian specimens were identified as being those of horse, roe deer, and cow through gene amplification using cytb981f and cytb981r primer set and sequencing. CHD genes were revealed to be those of three male and two female pheasants through polymerase chain reaction amplification. Because hunting of roe deers and female pheasants is prohibited in Korea, these results provided forensic evidences of illegal wild animal hunting.  相似文献   

14.
15.
《Digital Investigation》2014,11(3):234-248
Interpretation of traces found on Android devices is an important aspect of mobile forensics. This is especially true for timestamps encountered on the device under investigation. In the presence of both naive and UTC timestamps, some form of timestamp normalisation is required. In addition, the investigator needs to gain some understanding of potential clock skew that may exist, especially when evidence from the device under investigation has to be correlated to real world events or evidence from other devices. A case study is presented where the time zone on the Android device was set incorrectly, while the clock was set to correspond to the time zone where the device was actually located. Initially, the fact that both time zones enforced daylight saving time (DST) at different periods was expected to complicate the timestamps normalisation. However, it was found that the version of the Time Zone Database on the device was outdated and did not correspond to the actual time zone rules for the given period. After the case study, the results of experiments on a broader range of devices are presented. Among other things, these results demonstrate a method to detect clock skew based on the mmssms.db database. However, it was also found that the applicability of this method is highly dependent on specific implementation choices made by different vendors.  相似文献   

16.
In the present work we show a forensic case study carried out in a mountainous environment. Main objective was to locate a clandestine grave which is around 10–20 years old and contains human remains of one individual and a metallic tool, probably a pick. Survey design started with an experimental burial of a pick at the expected depth (1 m) as well as the calculation of synthetic radargrams in order to know if the 250 MHz antenna was suitable for its detection and to have a record of the reflection of the pick. Conclusions extracted from the experiments together with rough terrain conditions suggested the use of the 250 MHz antenna which allowed a good compromise between target detection and dense grid acquisition of an extensive survey area.  相似文献   

17.
Body fluid identification has become a field of interest in forensic casework as it can add value to particular investigative scenarios. Identifying the source of the biological material is not always an upfront task using conventional methods; therefore, profiling of specific mRNA markers can provide the answer. The implementation of RNA based analyses in forensic casework must focus on the quality and sensitivity of methods, starting with nucleic acid extraction, and without loss of DNA for STR profiling. In this work, two methods for DNA and RNA co-extraction were tested and compared: a commercial kit that uses a spin, mini column methodology, and a quick, simple nucleic acid isopropanol precipitation based protocol. Both methods simultaneously extract DNA and RNA, crucial for forensic casework and were tested in semen samples. Nucleic acid quantifications as well as purity assessment ratios (OD260/OD230 and OD260/OD280) were obtained by both methods to infer on the use of extracts in downstream applications such as PCR. The performance of the two tested protocols was further evaluated by analyzing two semen mRNA specific markers, PRM1 and SEMG1. When compared to the commercially developed kit, results suggest that the literature adapted protocol allowed more carryover of contaminants absorbing at 230 nm and 280 nm as the purity ratios were below the accepted standard ranges. Negative results for mRNA profiling supported the QC results obtained by spectrophotometry. On the hand, PRM1 and SEGM1 were positive in RNA samples extracted with the commercial kit.  相似文献   

18.
Remote live forensics has recently been increasingly used in order to facilitate rapid remote access to enterprise machines. We present the GRR Rapid Response Framework (GRR), a new multi-platform, open source tool for enterprise forensic investigations enabling remote raw disk and memory access. GRR is designed to be scalable, opening the door for continuous enterprise wide forensic analysis. This paper describes the architecture used by GRR and illustrates how it is used routinely to expedite enterprise forensic investigations.  相似文献   

19.
The CYber DEfenSe Trainer (CYDEST) is a virtualized training platform for network defense and computer forensics. It uses virtual machines to provide tactical level exercises for personnel such as network administrators, first responders, and digital forensics investigators. CYDEST incorporates a number of features to reduce instructor workload and to improve training realism, including: (1) automated assessment of trainee performance, (2) automated attacks that respond dynamically to the student's actions, (3) a full fidelity training environment, (4) an unrestricted user interface incorporating real tools, and (5) continuous, remote accessibility via the Web.  相似文献   

20.
Poaching of wildlife animals for subsistence and commercial purposes has lead to population declines in Africa. In forensic cases, a need exists to identify the species of origin of carcasses, meat or blood. In the study presented here, the mitochondrial COI gene was sequenced to determine the species of unknown samples in three suspect South African forensic wildlife cases. In two cases the unknown samples were identified as originating from domestic cattle (Bos taurus) and in the third case the sample was identified as common reedbuck (Redunca arundinum). This is the first report of the COI sequence of common reedbuck. The study highlights the need for accurate wildlife reference material from each country in order to convict wildlife cases.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号