首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Often, criminal acts involving a vehicle are caught on digital video surveillance systems. While potentially useful for an investigation, the recording conditions are typically less than optimal for the extraction of key information for the identification of the perpetrator, such as a license plate. Providing the make, model and year of a questioned vehicle is a common request for examiners, to narrow the field of potential suspect vehicles. This study seeks to compare the performance of a nonpeer-reviewed make, model, and year determination between two separate groups, specifically, trained forensic image examiners and nontrained individuals. Results show that even with varied image capture conditions and quality, the trained forensic image examiners more correctly and completely identified the test group of questioned vehicles make, model, and year.  相似文献   

2.
With the advent of new legislation in the United Kingdom – as well as several high-profile criminal cases – the issue of Internet grooming has been the subject of much recent focus. Of particular interest to the forensic examiner is the ability to trace back from a known suspect's computer system to identify contact with his alleged victims. Specifically, when an allegation of grooming is made, one of the first things the examiner should do is to determine that the suspect's computer system was used to contact the informant's account in the first place. This a strong evidential link between victim and suspect and clearly demonstrates that the suspect was responsible for that contact rather than a third party who may have taken control of the suspect's chat account.  相似文献   

3.
This case report sets forth an authenticity examination of 35 encrypted, proprietary-format digital audio files containing recorded telephone conversations between two codefendants in a criminal matter. The codefendant who recorded the conversations did so on a recording system he developed; additionally, he was both a forensic audio authenticity examiner, who had published and presented in the field, and was the head of a professional audio society's writing group for authenticity standards. The authors conducted the examination of the recordings following nine laboratory steps of the peer-reviewed and published 11-step digital audio authenticity protocol. Based considerably on the codefendant's direct involvement with the development of the encrypted audio format, his experience in the field of forensic audio authenticity analysis, and the ease with which the audio files could be accessed, converted, edited in the gap areas, and reconstructed in such a way that the processes were undetected, the authors concluded that the recordings could not be scientifically authenticated through accepted forensic practices.  相似文献   

4.
B. Found  D.K. Rogers   《Science & justice》2005,45(4):199-206
Many forensic document examiners are hesitant to express authorship opinions on photocopied handwriting as the photocopying process results in less feature information than original writing. This study aimed to test the accuracy of 15 examiners' opinions regarding whether photocopied questioned signatures were genuine or simulated. Each examiner received the same set of original signature exemplars, from one individual, and a set of eighty questioned photocopied signatures comprising of genuine and simulated signatures. The overall misleading (error) rate for the grouped examiners' opinions was 0.9% providing strong evidence that examiners can make accurate observations regarding the authorship of non-original handwriting.  相似文献   

5.
A mock-theft experiment was designed to examine the efficiency of the Guilty Knowledge Test when (a) the examiner was aware of some of the crime-relevant items; (b) target items (i.e., items that are significant to participants for reasons other than crime-relevance) were incorporated into the test; (c) the motivation of guilty participants to appear innocent was manipulated. Results indicated that (a) participants yielded weaker responses to relevant items when the examiner was aware of them than when he did not have the knowledge; (b) the inclusion of target items had no overall effect on the responses to the relevant items: (c) within the guilty condition, highly motivated participants were more responsive to the relevant items than less motivated participants, and the inclusion of target items significantly decreased detection accuracy of low motivated participants.  相似文献   

6.
7.
《Digital Investigation》2005,2(3):175-179
This article covers the basics of acquiring a disk image from a Macintosh computer. It details a number of techniques that are available to the forensic examiner and covers other related issues. These include the use of open Firmware to determine the date and time of the internal computer clock. Once the disk image has been obtained, the article then considers a number of ways that the Macintosh can be used in the examination of the image. The article concludes with a look at the future of the Macintosh computer in the light of the move to the Intel chipset.  相似文献   

8.
A scheme for the computerization of rifling specifications of firearms has been proposed to automate the search for the probable make and model of the firearm responsible for discharging a crime bullet. The practical feasibility of the scheme has been demonstrated by computerizing the rifling specification data reported by Mathews (Firearms Identification, Vol. III, University of Wisconsin Press, 1973, pp. 4–66) using the BDP-100 computer facility of the Central Forensic Science Laboratory, Calcutta. The system lends itself to future enlargement possibilities as more and more rifling specification data become available. A programme flow chart has been presented and the logic of the programme flow has been explained.  相似文献   

9.
Abstract

The present study examined the effects of automating the Relevant–Irrelevant (RI) psychophysiological detection of deception test within a mock-screening paradigm. Eighty participants, recruited from the local community, took part in the study. Experimental design was a 2 (truthful/deceptive) by 2 (human/automation) factorial. Participants in the deceptive conditions attempted deception on two items of an employment application. Examinations conducted with the automated polygraph examination were significantly more accurate than examinations conducted by the human polygraph examiner. Statistical analyses revealed different patterns of physiological responses to deceptive items depending upon the automation condition. Those results have potentially interesting theoretical implications. The results of the present study are clearly supportive of additional efforts to develop a field application of an automated polygraph examination.  相似文献   

10.
GB18667-2002《道路交通事故受伤人员伤残评定》标准(以下简称“标准”)中有关眼损伤的条款较为原则和笼统。随着“标准”的广泛应用,加之法医学和临床眼科学技术的不断进步,对眼损伤后遗症的检验技术和认识水平已有较大的提高。建议采用视力表投影仪代替国际视力表进行行为视力检查,存在屈光不正的应了解屈光度后再检查其矫正视力;疑有伪盲或伪装视力降低时,可行伪盲试验或伪装视力降低的检验,视觉电生理技术是测试伪盲或伪装视力降低的有效方法。运用电脑视野计可进行视野检查,动态视野检查结果可通过视野有效值换算为残存视野半径(或直径);视野检查存在一定的干扰因素,分析时应密切结合原发损伤及其他检查结果。对于遗留复视等双眼视障碍的,可采用同视机等检查方法,检验结果应考察功能障碍与眼肌等原发性损伤的符合性。泪器损伤后遗留溢泪症状的,应采用相应的检查方法证实泪道狭窄或梗阻。眼睑下垂及眼睑畸形分为轻度及重度;眼睑畸形包括闭合不全、眼睑缺损及眼睑外翻等情形。影响视力的外伤性白内障符合“标准”相关条款的规定。根据现行“标准”对道路交通事故所致眼损伤进行伤残评定,应进行视觉功能检测、眼球结构检查、伪盲试验及视觉电生理检测,最后综合病史材料及既往情况综合分析,得出评定结果。统一对现行“标准”的理解,规范检测手段和结果评价原则,有助于道路交通事故眼损伤伤残评定的标准化和规范化。  相似文献   

11.
对一份文件最早制成时间的检验一直以来都是全世界文检界的难题之一。核实可疑文件的制成时间没有统一的方法,目前主要通过对纸张、墨迹、打字机、复印机、打印机、传真机、印刷品,以及笔迹和签名等因素的检验来确定一份文件的制成时间。文件检验人员需要充分利用他们手中的文件的内容及文件周边信息所反映出来的条件和材料,进而得出结论。  相似文献   

12.
对一份文件最早制成时间的检验一直以来都是全世界文检界的难题之一。核实可疑文件的制成时间没有统一的方法,目前主要通过对纸张、墨迹、打字机、复印机、打印机、传真机、印刷品,以及笔迹和签名等因素的检验来确定一份文件的制成时间。文件检验人员需要充分利用他们手中的文件的内容及文件周边信息所反映出来的条件和材料,进而得出结论。  相似文献   

13.
Self-neglect is the inability or unwillingness to provide for oneself the goods and services needed to live safely and independently. It is the most common allegation reported to Adult Protective Services agencies throughout the United States. Unfortunately, it seems that most medical examiners and their teams are not trained appropriately on self-neglect and forget to ask pertinent questions and document relevant observations. The most important aspect of self-neglect for the medical examiner is to recognize the diagnosis to avoid confusion with other forms of elder abuse, particularly neglect from a third party. In this context, a self-neglect scale could be a useful tool to assist the death investigation team. In the clinical field, a self-neglect severity scale was developed by the Consortium for Research in Elder Self-Neglect of Texas. It is here proposed that a self-neglect severity scale for medical examiners should be developed, to assist the investigative team in assessing these common cases. This scale is developed by modifying the clinical scale to adapt it to the particular needs of death investigation. This scale can help the medical examiner and his team in approaching these deaths in a systematic and comprehensive way.  相似文献   

14.
The efficiency of detection of blood in stains on material evidence by spectrofluorometry and fluorescent hemotest developed at Bureau for Forensic Medical Expert Evaluations of the Leningrad region and by traditional methods used in Russia and abroad is compared. The proposed methods are 1000 times more effective than the methods routinely used in Russia; moreover, they allow objective computer recording and processing. These methods are 50-70 times cheaper than the methods used in foreign countries and are virtually as sensitive. Fluorescent hemotest persuasively proves the presence of blood in stains on material evidence under laboratory conditions, at the site of accident, and even under field conditions (express analysis).  相似文献   

15.
Abstract:  For any measurement of a person's height in an image, a difference exists between the actual height of the person and the image measurement. In order to gain knowledge about statistical behavior of differences between actual and measured heights it is necessary to make reference recordings, e.g., of test persons under the same recording conditions. To test whether the differences are dependent on camera and further circumstances, an experiment was set up which involved the measurement of 22 test persons using three cameras of varying quality. Reproducibility of measurements per image appears to be strongly dependent on the camera (quality), whereas systematic bias differs with the view point of the camera. Operator dependency of the measurement process is found, so its repetition by different operators is recommended.  相似文献   

16.
17.
袁燕谊 《政法学刊》2004,21(6):69-70
摄像构图是使主题思想和创作意图形象化,可视化的过程,是依靠一系列造型手段,并通过摄像机的取景框以构成画面造型上的表现形式。熟练掌握摄影构图是提高刑事录像水平的关键,因此,我们有必要来探讨一下摄像构图的特点、动态构图的表现形式以及刑事录像构图的操作技巧。  相似文献   

18.
Russian and foreign methods used in forensic medicine for detection of the semen in stains on material evidences are compared. The potentialities of quantitative immunofluorescence test for detection of the semen in stains on material evidences, developed at Bureau for Forensic Medical Expert Evaluations of the Leningrad region, are described. Unlike other methods used in Russia, this method detects the semen in stains in the absence of spermatozoa and in stains with very low amount of the semen. Our modification allows objective recording of the results with computer processing. The method is cheaper than its foreign analogs and its sensitivity is similar to them.  相似文献   

19.
The Technology Safety Project of the Washington State Coalition Against Domestic Violence was designed to increase awareness and knowledge of technology safety issues for domestic violence victims, survivors, and advocacy staff. The project used a “train the trainer” model and provided computer and Internet resources to domestic violence service providers in order to (1) increase safe computer and Internet access for domestic violence survivors in Washington; (2) reduce the risk posed by abusers by educating survivors about technology safety and privacy; and (3) increase the ability of survivors to help themselves and their children through information technology. Evaluation of the project suggests that the program is needed, useful, and effective. Consumer satisfaction was high and there was perceived improvement in computer confidence and knowledge of computer safety. Areas for future program development and further research are discussed.  相似文献   

20.
A review of results obtained from standard guilty and innocent treatment conditions in 14 mock crime studies of the control question polygraph technique revealed accuracies ranging from chance to 100% correct. The present study examined several factors that may have contributed to the observed variability in detection rates across studies. Those included sampling error, differences in the populations from which subjects were drawn (Subjects), differences in the nature of incentives provided to subjects for passing the polygraph test (Incentives), and differences in the methods for diagnosing truth or deception (Decision Policy). A meta-analysis revealed that approximately 24% of the variance in detection rates could be attributed to sampling error, and detection rates were correlated with types of Subjects (r=.61). Incentives (r=.73), and Decision Policies (r=.67). The highest diagnostic accuracies were obtained from nonstudent subject samples, when both guilty and innocent subjects were offered monetary incentives to convince the examiner of their innocence, and when conventional field methods were used for interpreting the physiological recordings and diagnosing truth and deception. Together, differences in Subjects, Incentives, and Decision Policies may account for as much as 65% of the observed variance in detection rates. The present findings highlight the importance of conducting mock crime experiments that closely approximate field conditions.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号