Most download

  • Published in last 1 year
  • In last 2 years
  • In last 3 years
  • All
  • Most Downloaded in Recent Month
  • Most Downloaded in Recent Year

Please wait a minute...
  • Select all
    |
  • Technical Notes
    SONG Lijuan, ZHAO Peiduo, ZHANG Guanghua
    Forensic Science And Technology. 2015, 40(3): 256-258. https://doi.org/10.16467/j.1008-3650.2015.03.023
    Objective To solve an unusual death case and develop a method for determining concentration of acetone in blood or urine samples from the dead body by headspace gas chromatography (HS-GC), which is quite helpful under certain circumstance when autopsy can’t be performed because of social customs, religious belief or other reasons. Methods A 67-year-old man, who had diabetes, was found dead in a hotel room and his family didn’t agree to perform an autopsy. In order to determine the cause of death, the blood and urine samples were sent to laboratory for poison and drugs analysis, but no common poison was found. Based on the excellent volatility, acetone in blood or urine samples was analyzed by a head-space gas chromatography system with hydrogen fire ionization detector (HS-GC/FID). Qualitative analysis result was obtained according to retention time, and quantitative analysis was performed by internal standard (tert-butyl alcohol) method. The average peak area derived from three replicate injections of each sample was used for the calculation of acetone concentration in blood or urine. Results Concentration of acetone in blood and urine was 6.89 mg/100mL and 57.1 mg/100mL respectively, both were much higher than the normal value. Conclusions Determination of acetone in blood or urine by HS-GC/FID provides a useful evidence for determining the manner of death, which is especially effective when short of pathology data. In such casework, thorough information about the dead should be taken into consideration to ensure the scientific deduction.
  • Forensic Science And Technology. 2013, 38(3): 62-64.
  • Focus
    LIU Shi-quan,LUO Ya-ping,WU Jian
    Forensic Science And Technology. 2015, 40(1): 1-7. https://doi.org/10.16467/j.1008-3650.2015.01.001
    The interpretation of fingerprint evidence depends on the judgments of fingerprint examiners. Basing on fingerprint identification methods, standards and working experience, fingerprint examiner conducts fingerprint analysis, comparison and finally gives expert opinion which is one of the legal forms of evidence.This study assessed the accuracy of different judgments made by fingerprint examiners following the analysis process. 106 agencies were invited to take 4-trail experiment for identification following analysis, comparison and evaluation process. We compared the examiner’s judgments against ground truth and used a net-work based fingerprint identification analysis platform to evaluate how fingerprint examiners document their analysis during the identification process. The experiment information of each agency was recorded during the fingerprint identification process and data was calculated by statistical software R for statistical analysis .The results showed that different examiners demonstrated different accuracy of judgments and different mechanisms to reach them. The results also showed that there is a strong relationship between minutiae selection reliability and minutiae quantity and fingerprint quality.
  • Focus
    ZHANG Ting,YANG Rui-qin
    Forensic Science And Technology. 2015, 40(1): 24-27. https://doi.org/10.16467/j.1008-3650.2015.01.006
    Pores abounds in finger skin’s ridge, through which sweat is excreted and deposited on the surface of the skin. Sometimes, sweat contains special substances including drug and its metabolites. These substances in fingerprints can reflect a possibility of an individual’s ingesting drugs. In recent years, the importance of analyzing some excreted and deposited compounds in fingerprints has drawn more attention because these compounds may provide more significant information of an individual and his/her past behavior. Determination of fingerprints’ residues is helpful for criminal investigation and evidence identification. Many techniques such as FT-IR spectroscopy, infrared spectral imaging, Raman spectroscopy, Raman spectral imaging mass spectrometry, gas chromatography-mass spectrometry, high performance liquid chromatography, liquid chromatography-mass spectrometry, and immunological approach, have been widely used. Among these, the immunological approach can not only make latent fingerprints visualized but also deliver more accurate and sensitive biochemical information from fingerprints. In this article, the recent progress and application of immunological method for developing fingerprints are presented by focusing the determination on amino acid, ingested drug in fingerprints and aged latent fingerprints as well.
  • Forensic Science And Technology. 2016, 41(1): 1-4.
  • Research Articles
    DUAN Yan-bing,LUO Wen-hua
    Forensic Science And Technology. 2015, 40(2): 138-141. https://doi.org/10.16467/j.1008-3650.2015.02.013
    In the practice of digital forensics, the key evidence to prove the criminal facts mostly exists in the mounted USB devices. To obtain the usage traces of inspecting USB devices ever being mounted is a typical identification requirement of digital forensics. There are some existing forensic tools that support the analysis of such information. However, extracting traces in actual work is not accurate (especially USB device serial number) and not complete (such as lacking the information of USB drive letter). It is difficult to meet the need of forensic practice. In order to make up for deficiencies, this paper investigates USB devices usage traces from two aspects based on the perspective of the electronic data forensics. One is using the registry to inspect USB devices usage traces. The registry is the main and important source of USB devices usage traces. This paper describes the forensics of USB key and USBSTOR key in detail, and gives the extracting method of temporal information and correlation method with MountedDevices key. It also provides the analysis of UMB key that is the new increase of Windows 7 system. UMB key covers the important information for USB key and USBSTOR key, which indicates the information of USB drive letter and makes up for the defect of MountedDevices key. The other aspect is using the system files to inspect USB devices usage traces. This also has direct significance for meeting forensic requirements. Setupapi.dev.log file in Windows 7 system partition contains the data about the equipment replacement, the driver change and the important system modification. The investigation and analysis of Setupapi.dev.log file usually obtains the same effect as that of registry. The system log in Windows 7 event log increases the audit to USB devices. It records the unloading information of USB devices. The shortcut files in Recent folder contain the target file attributes and users' operation information, which can change with user behaviors. Using WFA tool and Windows 7 files with extension automaticDestinations-ms can resolve the target file information of the shortcut files in the Recent folder. IconCache.db is the icon cache file for windows system. Users' behaviors using Windows system can gradually add to the IconCache.db file, including the information of file icon, storage path and so on. Using IconCache.db file also can analyze the usage traces of USB devices. When users connect USB storage devices to computer system, the information will be added to the IconCache.db database if the root directory contains executable program. In addition, this paper expounds how to rely on the system files to make a supplementary investigation of USB usage traces in the case of the relevant registry keys being cleared. Proved by practice, the method is accurate and efficient.
  • Forum
    LIU Bing
    Forensic Science And Technology. 2015, 40(4): 318-323. https://doi.org/10.16467/j.1008-3650.2015.04.015
    China national DNA database has a history of 15 years and has kept more than 30 million short tandem repeat (STR) profiles, generating over 1.5 million matches assisting in more than 1 million investigations. In recent years, Y chromosome STR (Y-STR), single nucleotide polymorphism (SNP), single cell testing, and high throughput DNA sequencing technology have been continuously introduced in forensic science. Currently, the DNA database could only allow the traditional direct match and simple mode of familial searching for personal identification, far behind the high-tech assays which is expected. How to utilize these new technologies to develop new stratedgies for China national DNA database? How to further develop China DNA database and maximize its efficiency? This paper discusses the development in the light of 4 issues. First of all, the core loci of database need to be set prior to increasing the number of autosomal STR loci, even though there is a consensus on the quantity change. As for the new genetic markers, such as SNP, the attitude of “good will of expectation” should be in line with “prudent wait-and-see”, since there is few possibility to use SNP commonly in a database with ten-million profiles. It is more likely that the genome-wide analysis will bring the great change to the DNA database in the future. Still, the special familial searching is a supplementation and inevitable choice for DNA database in case of a low coverage of the population. But this searching has to follow strict rule. Finally, Y-STR database development is Objective and urgent, but it must be cautious as personnel sample collection might be involving legal, social and other problems; the pedigree in sociological term may not equal to genetic one; positive evaluations of Y-STR database should be also built on deductive method; a balanced development of database should be considered of both costs and benefits. Therefore, without a theoretical framework constructed with rigorous deduction, especially prior to the mathematical model of evaluation, Y-STR database is only a matter of empirical, rather than scientific, letting alone the difficulty to assess the value of such experience for others. In conclusion, as a DNA database with ten-millions profiles, any change related to fundamental issues concerned with development, security or stability must be dealt with comprehensively and scientifically.
  • Technical Notes
    LI Zhongjie, XU Jie, HE Wei, WU Hu
    Forensic Science And Technology. 2016, 41(2): 170-172. https://doi.org/10.16467/j.1008-3650.2016.02.021
    : Objective To explore the technique and strategy about both investigation of the crime scene and DNA test for such biologically evidential materials as exfoliated cells adhered onto the glove imprints.. Methods DNA, individually extracted from four swabs of glove imprints collected in theft cases by an improved silica-bead method, was amplified by AmpFISTR Identifiler® Plus system, followed to conduct electrophoresis by 3500XL genetic analyzer, and finally undergone the genotyping by GeneMapper® ID-X software. Results DNA genotyping profile was successfully acquired from each of the four swabs. 17 cases were solved through the combination with the evidence of the DNA genotyping profile obtained above. Conclusions Glove imprints, in combination with the efficient DNA test strategy on the basis of their careful examination and extraction at crime scenes, can significantly improve DNA directivity, thereby making such biological trace-evidence exert its function effectively.
  • Focus
    WANG Zhen, LIU Jin, YAN Yu, HE Chenjiao
    Forensic Science And Technology. 2015, 40(4): 269-271. https://doi.org/10.16467/j.1008-3650.2015.04.004
    Toolmark on bone was selected as research object and a new pretreatment method on defatting bone was developed in this paper. The study aims to enhance the characteristics of toolmarks on bone and extend the storage time of similar evidence. The pig claviform bone was selected as the experimental material to generate the tested tool marks. A total of 30 samples were made by the pig bones being sawn with a steel saw and real conditions simulated for toolmarks in crime scene. The influences of different types of organic solvent, steps of defatting and time of treatment on features of toolmarks on bone and defatting ratio were analyzed with simulating experiments in laboratory. The organic solvent, steps of defatting and treatment time were optimized, and a new and effective pretreatment method for defatting bone by absolute alcohol, petroleum benzin and infrared drying was developed. Instead of destroying the features of toolmarks, the method could enhance the contrast of striation present on fracture surface of bone, convenient for further recovering and examining toolmarks on bone by photography. Meanwhile, no pungent smell was produced from a defatted bone after long storage in glassware. This paper presents a new pretreatment technique of defatting bone to safeguard further toolmark determination and storage of evidence.
  • Technical Exchange
    Forensic Science And Technology. https://doi.org/10.16467/j.1008-3650.2003.02.025
  • Technical Notes
    SHI Suidong, LI Meng, LEI Ming
    Forensic Science And Technology. 2015, 40(4): 327-329. https://doi.org/10.16467/j.1008-3650.2015.04.017
    The screening of crime-related smartphones can provide critical clues for case investigation. On examination of an Android smartphone with passcodes set up without turning on USB debugging, it’s hard to obtain evidence if the suspect doesn’t cooperate. A new method using a custom recovery is introduced. Since official recovery doesn’t have functions of backuping, restoring or flashing a custom ROM in light of the safety concern, a custom recovery was flashed on Android smartphone using the backup system function, and then decrypted the passcode file extracted from the backup file, or flashed a path to delete passcode files. Theoretically flashing a custom recovery is safe, as it only modifies the recovery partition without partition data changing. However, it is risky to some extent when flashing a smartphone. Some dos and don’ts are proposed in this paper.
  • Forensic Science And Technology. https://doi.org/10.16467/j.1008-3650.2001.04.001
  • Orginal Article
    Forensic Science And Technology. 2012, 37(3): 12-12.
  • Technical Notes
    TIAN Rui
    Forensic Science And Technology. 2015, 40(1): 79-81. https://doi.org/10.16467/j.1008-3650.2015.01.019
    The pistol of type 64 has been fading out of people’s sight. Yet its modified versions are still found in civil society. Because of the modifications with various means and techniques as well as the dissimilar parts, there are differences from the normal counterparts at both the patterns and positions of marks left by the shot bullet-heads and cartridge, bringing difficulties to investigators. However, these marks can play their effect in identifying the relative guns involved in cases. Here, we describe such a case. Through marking a shell hook with color and testing the shell with homemade primer which was fired by the examined non-systematical type 64 pistol, we confirmed that the examined shell was indeed shot by the examined non-systematical type 64 pistol, providing an example to identify the fired gun with the abnormal mark left on shell hook.
  • Forensic Science And Technology. https://doi.org/10.16467/j.1008-3650.2001.05.037
  • Focus: Forensic Genetics
    WANG Le, YE Jian, BAI Xue, YANG Fan, ZHAO Xingchun
    Forensic Science And Technology. 2015, 40(5): 353-358. https://doi.org/10.16467/j.1008-3650.2015.05.002
    From DNA fingerprinting to multiplex STR amplification and detection, forensic DNA scientists witnessed the rapid advances in DNA technology and the substantial changes in ways of solving criminal cases during the past three decades. As a matter of fact, only incremental developments of forensic DNA technologies and the "passive comparison" mode of using DNA information could not meet current expectations for forensic genetics from crime investigators. It has been unprecedentedly emphasized that great efforts are needed for more powerful solutions that are automatic, high-throughput, precise, rapid and being support to the "active searching" mode of DNA information utilization. Under such circumstances, next generation sequencing (NGS) comes just in time. Chinese authorities and experts have already realized the great potential of NGS applications for forensic purposes, although the application of NGS in forensic science is still at initial stages, compared with its applications in fields of cancer diagnosis, genetic disease diagnosis, de novo sequencing, genome resequencing, transcriptome resequencing and drug discovery. More information can be obtained from a single experiment by analyzing the STR, SNP, Indel and RNA markers simultaneously, which could be impossible on routinely used PCR-CE platforms because of the limited amount of exhibits. In this article, the authors attempt to describe the basic concepts, developmental history and working principles of NGS to Chinese experts in the general field of forensic science and technologies, and share the updates of NGS-based STR typing, SNP typing and whole mtGenome sequencing during the past two years. Representative NGS platforms including the 454/Roche GS FLX system, the Solexa system, the SOLiDTM system, the Ion PGMTM system and the MiSeq FGxTM system were introduced. Annual statistics of research articles on NGS and forensic NGS were described and trends for related research were analyzed. Finally, perspectives of forensic NGS were presented and possible challenges including data analysis methods, openness of NGS systems and ethical issues were discussed in the hope of providing a reference for related research and applications.
  • Research Articles
    ZHAO Lu, KANG Yanrong, GUO Lili, LONG Yuan
    Forensic Science And Technology. 2018, 43(1): 17-21. https://doi.org/10.16467/j.1008-3650.2018.01.003
    Smart watch, widely popular because of its convenient portability and rich functionality, can store plenty of information such as phone-call history, instant messages, GPS records and health data, all those important for digital forensic investigation to get key clues and strong evidence. In this paper, the present situation was summarized on smart watch at its digital forensic researches/applications home and abroad. The technical difficulties were followed to be analyzed according to the hardware architecture and software data structure of smart watches. Therefore, three practical methods were proposed on the basis of experiments that had been carried on extracting and analyzing the selected characteristics-different smart watches so that the practical digital forensic means were thus concluded for obtaining the data from those commonly-seen smart watches in market. Finally, the future direction was put forward on the digital forensic researches about smart watches, with purpose of providing references to relevant both researchers and technicians who are engaging in digital forensics.
  • ZHAO Hai-yu, WANG Xiao-fei
    Forensic Science And Technology. 2014, 39(5): 45-48.
    In this paper, the synthesis method of HMTD was introduced and test techniques such as LC-APCI-MS, DART-TOF-MS, DESI-MS were summarized.
  • Forensic Science And Technology.
  • Forensic Science And Technology. 2013, 38(4): 15-16.
  • Forensic Science And Technology. https://doi.org/10.16467/j.1008-3650.2001.04.035
  • Forensic Science And Technology. https://doi.org/10.16467/j.1008-3650.1993.05.013
    本文初步探讨了原子印章的构成、生产工序特点及其印文特征,可供检验原子印章时参考。
  • Research Articles
    GE Baichuan, PENG Jianxiong, LIU Bing
    Forensic Science And Technology. 2016, 41(4): 259-264. https://doi.org/10.16467/j.1008-3650.2016.04.001
    With the rapid development for over a decade, China National DNA database has become the core information system and performed the best personal identification and application efficiency in forensic science and technology. This article summarized the efficient tactics and elements of capacity building, the outcome which came into being in the long-term practice, discussed how to expand the application areas at full scale and tap the potentials of DNA information. Meanwhile, the strategy was focused on how to better adapt to the new situation for combating crimes, the new requirements for law enforcement agencies to handle cases, as well as the new expectations of the public.
  • Research Articles
    MIN Jianxiong
    Forensic Science And Technology. 2015, 40(5): 388-391. https://doi.org/10.16467/j.1008-3650.2015.05.010
    As the fourth portion of the serial treatise of victimology in homicide crime scene analysis, this paper relates the homicidal crime scene analysis to victim’s body injury which can be classified into two major types, one is the trauma that the culprit intentionally enforces to exert against the victim, for example the injuries over being attacked, and another is the one caused by other reasons such as the tumbling and bruising during a crime. Here the emphasis places on the first-mentioned type because the body injury formed with purposive exertion has capacity of reflecting the conditions of the criminal’s physiology and psychology so that forensic physicians often use the traits of victim’s body injury to make judgments and decision to excavate the criminal motives and/or depict the offender. The common-discussed body injury is consisted as follows: 1. degree of damage, indicating not only the severeness to leave one victim’s life in danger but also the different injuring degrees among the dead in cases of multiple lives claimed; 2. injuries formed with special tools, those created with the shape-and-usage-specific tools which are not commonly used and seen, either; 3. intensified trauma, one that is further inflicted by the criminal to ensure death after killing the victim; 4. wound out of abreaction, like the intensified trauma, the additional damage enforced by the offender to discharge wrath following putting the victim to death; 5. coercion injuries, those of the non-lethal ones produced by the culprit to ask the victim to obey for certain purpose, usually taking place at the early stage of crime; 6. left-handed trauma, one that is engendered by the suspect who is a left-handed, and to define such kind of injury requires that the attacker and the attacked be unambiguous in their opposite positions.
  • Research Articles
    DONG Hui, WANG Jing, QIN Cuijiao, ZHANG Tao, JIA Jing, YE Jian, LI Caixia, LIU Chao
    Forensic Science And Technology. 2016, 41(3): 173-177. https://doi.org/10.16467/j.1008-3650.2016.03.001
    Objective Biological evidential material, enclosed in forensic evidence package, may be transferred onto its package, making the DNA typing less detectable. Therefore, the lower transfer level is better, especially for the trace touch DNA samples. This study aimed to investigate whether the DNA is transferred onto forensic evidence package and the transfer rate between different types of evidential materials and packages. Methods With two kinds of forensic evidence package, the seal-lock plastic bag and yellow paper envelope, three kinds of trace touch DNA, four blood and saliva samples were prepared to simulate the packaging and transporting process. An individual, carrying a suitcase which contained all of the test samples, walked on a treadmill (running at 4 km/h) for 30 min, then went up- and down-stairs for five stories. DNA, extracted from the test samples and the evidence packages, was quantified, amplified and analyzed following the manufacturer’s standard procedures. The transfer rates were compared with two different packaging ways. Results The experiment showed that all of the test samples were transferred onto package at various levels and the average transfer rate was 22.06 %. The two types of packages were observed of significant difference (P=0.023) for their transfer rates, with those of the seal-lock plastic bag being estimated as 17.85 % and the yellow paper envelope as 26.27 %. The transfer rates of the trace touch samples were higher than those of the blood and saliva samples no matter whether they were kept in the yellow envelope or the seal-lock plastic bag. The loss of recoverable DNA from the samples to the evidence packages ranged from 1.84 % to 67.66 %. Conclusions DNA transfer occurs on the forensic evidence package to crop it, affecting DNA typing. Different types of samples have different transfer rates and so have the evidence packages.
  • Forum
    SUN Zhenwen, LIU Guanhua, WANG Mingzhi, SUN Yuyou, ZHANG Ning
    Forensic Science And Technology. 2016, 41(5): 398-401. https://doi.org/10.16467/j.1008-3650.2016.05.013
    With the continuous decline of production cost and improvement of performance, the unmanned aerial vehicle (UAV) industry has developed rapidly from high-end commercial use to mass market in recent years. UAV has the advantages of small size, light weight and easy operation so that it can be deployed to make reconnaissance and/or attack, photograph and transmit, deliver goods and conduct scene intervention. Until present, UAV has been widely used in public safety, accident rescue, forest fire prevention, geologic exploration, aerial photography, environmental protection and others. UAV aerial photography is to take photos of the ground and objects from different heights and/or angles by the UAV equipped with high-definition camera plus video and wireless video transmission device, being categorized into the low altitude photography that is permitted to carry out at a height less than aviation control. This paper explicates the on-going application of UAV aerial photography in crime scene investigation and prospects its development trend.
  • Technical Notes
    CUI Hequn, LIU Junhua
    Forensic Science And Technology. 2017, 42(2): 165-167. https://doi.org/10.16467/j.1008-3650.2017.02.019
    A method was introduced on the remote obtainment of the suspect’s transaction records from Alipay’s data storage based on the operating mechanism of this electronic platform, along with the solution to those problems occurring during digital forensics. Alipay’s transaction password resetting, a choice of “SMS verification + ID verification”, was acquired to extract the transaction records from Alipay. This method can help resolve the forensic difficulty that Alipay transaction records cannot be straight achieved when the screen password has been set into a case-involving cell phone. Consequently, a murder case got its crucial evidence by the established method to discover the suspect’s crime-committing fact linking into the time course of the event.
  • Focus: Forensic Genetics
    LIU Bing
    Forensic Science And Technology. 2015, 40(5): 345-352. https://doi.org/10.16467/j.1008-3650.2015.05.001
    Until present, China national DNA database has already gathered tens of millions of data, including not only the DNA profiles but also a large amount of information related to the time, space, means, type of the committed crime and the residence, nationality, individual behavior of the suspect. With the growing needs of public security, the data are still in rapid accumulation and growth. From 2011 to 2013, the database collected relevant data covering over 79.25% of murder and 40.53% of rape cases filed. Currently, the main use of the DNA database is personal identification, not fully tapping its data value. Data mining can provide assistance in conceptual formation and accuracy, exploration on regularity and pattern, modeling and the other useful knowledge. Using the methods of classification, estimation, prediction, affinity grouping, association rules and cluster analysis, data mining can fulfill a deep analysis of the intricate data in the DNA database, like the DNA profiles, the relevant information of cases, the background and behaviors of individual suspects. By resorts of cluster analysis, this paper attempts to obtain a preliminary analysis at multiple dimensions of time, space, type of crime. The analyzed data covered over 0.45 million criminal cases, 20 million individuals and 1 million matched reports, which were collected and produced in the past four years. The analysis is made up of three parts: the distribution of four kinds of crime (murder, robbery, theft, rape);the residence distribution of the offenders involved into the four kinds of crime;the situation of offenders resampled in the national DNA database. This study also carried out a SWOT (strengths, weaknesses, opportunities, threats) analysis on the application of data mining in the national DNA database. Data mining is an emerging technology of wide prospect. Its usage into the management and application of the national DNA database conforms to the open-mindedness of the information society, in favor of the improvement and development of the database itself. However, the above analysis is not perfect due to the limitations of underlying conditions. Through the combined application of the established means of data mining plus online analytical processing (OLAP), the attempts hereof can be continuously elevated along with the other analyses under dynamic and deep-reaching conditions. Therefore, the criminal time and space distribution will be defined more clearly, evolution and prediction of typical crime given more timely based on the personal and crime background, and the dynamics and early detection of high-risk criminal groups tracked more tightly with the DNA hunting and ID checking. Ideally, the DNA database can provide real-time, reliable and accuracy-high personal identification intelligence, showing its particular potential and value in the study of criminal pattern and dynamics, public security management decision and other involved aspects.
  • Research Articles
    ZENG Linghua,FAN Wulong, SHI Yi, PAN Yanhui,WANG Mingzhi
    Forensic Science And Technology. 2016, 41(3): 178-182. https://doi.org/10.16467/j.1008-3650.2016.03.002
    In recent years, bus arson cases tended to arise in China. However, most local public security organs lack the experience to investigate the scenes of these viciously violent crime cases, resulting in more serious problems when such cases suddenly happened in those relevant places. There are few home and abroad studies about how to specifically investigate and analyze a bus arson crime scene. This study aims to provide a reference for the public security and inspire authorities to enact the work regulation on investigating and analyzing the scene of bus arson case scientifically and standardizedly. Crime scene investigation and analysis are an understanding and practical process which can expose the manner and behavior of the criminal by logical reasoning and practical verification upon the scrutiny of entire scene, and it is the basis for evidence collection and scene reconstruction. Based upon a series of bus arson cases and bus burning accidents occurred in China in recent years, this study focused on the scene investigation and analysis of bus arson. Various bus arson cases’ similarities and differences were analyzed by comparison with other 16 bus burning accidents happened in China, with purpose to sort out the basic elements of crime scenes components and related information of these bus arson cases. From 10 typical major cases, a summarization was attained about the important and necessary information or characteristics for crime scene investigation and analysis. In combination of the current experience of crime scene investigation and analysis with the characteristics of bus arson cases, key elements and measures were put forward for this kind of scenes’ analysis, which can also be comprehensively supported by today’s main technologies in scene investigation like evidence examination and tracing, video and electronic forensics, fire scene investigation, crime scene analysis and reconstruction. Generally, the investigation and analysis on bus arson case scene can be carried out in 4 steps: scene investigation, evidence collection and identification, evidence classification and comprehensive judgments where the difficulties investigators have to face must be taken into thorough and all-around account.
  • Forum
    Forensic Science And Technology.
  • Forensic Science And Technology.
  • Forensic Science And Technology.
  • FENG Jimin,LIU Shihai
    Forensic Science And Technology.
    Objective To enhanced the capabil it y to identify and differentiate the pure/mixture as well as some fakes heroin and caffeine.Method Explain away relationship between th e spectra with structure characteristics of heroin and caffeine.Result Characteristic peaks.for beroin and caffeine were selected.Conclusion Pure/mixture as well as some fakes heroin a nd caffeine can be identified accurately with FTIR.
  • Reviews
    MA Rongliang
    Forensic Science And Technology. 2016, 41(4): 302-308. https://doi.org/10.16467/j.1008-3650.2016.04.012
    This article tries to summarize the recent advances of fingerprint technology and demonstrates ten possible developing directions in the future: 1. more sensitive reagents; 2. fingerprit detection on surfaces difficult to handle; 3. time-resolve (TR) and phase-resolve (PR) technology; 4. chemical imaging technology; 5. fingerprit detection on the exhibits polluted by bio-, chem- and/or nuclear-hazardousness materials; 6. immune and aptamer technology; 7. forensic intelligence from fingerprit detection; 8. the use of 3rd level characteristics in fingerprint identification; 9. age estimation for fingerprits; 10. more powerful Automatic Fingerprint Identification System (AFIS).
  • Focus: DNA-based Facial Portrait
    ZHAO Wenting, JIANG Li, LIU Jing, ZHAO Lei, MA Xin, JI Anquan, LI Caixia
    Forensic Science And Technology. 2017, 42(4): 259-263. https://doi.org/10.16467/j.1008-3650.2017.04.001
    DNA identification plays an important role in criminal investigation. But when the evidential DNA does not match either a suspect’s STR profile or any other one’s in a criminal DNA database, and/or the mass DNA screening and family searching failed to give any information for tracing unknown forensic sample’s donors, cold cases would be even caused, leaving them to be waited for various periods of time (likely very long) to solve. Predicting human externally-visible characters (EVCs) of an unknown person is an emerging contrivance by which to provide investigative hints allowing to trace the suspect, who is not identifiable via conventional comparative DNA profiling. In recent years, the potential of constructing useful DNA-based facial portrait is of great interests in forensic studies. Facial morphology is a combination of many complex traits, highly heritable, because much of the total variation in facial features is genetically mediated. At the early-stage of the kind of researches, the knowledge of genetic variation on facial morphology has mainly arisen from studies of genetic abnormality such as non-syndromic cleft lip with/without cleft palate (NSCL/P), and from those of developmental mechanisms, including PAX3, FGF, GHR and many other signaling pathways. In these studies, facial characters were traditionally simplified by straight scalar measurements, e.g., nose-width or eye-distance, therefore having no differences from the measurements of height, BMI or pigmentations. However, facial morphology is such an extremely physical complexity that dimensionality reduction techniques, where each principal coordinate is treated as a scalar trait, can cause the statistical power decreased dramatically. Recent advances have produced novel methods for fully automatic 3D facial image mapping and crude models of facial structure constructed by SNPs variants analysis. The non-rigid registration method or spatially dense quasi-landmarker was applied for fully automatic 3D facial image mapping and aligned faces via high-density pixel points. Based on these methods and joint modeling of sex, ethnicity and genotype, the independent effects of particular alleles on facial features will be uncovered and a 3D facial prediction model could be built. In the future, such developments will lead to a more detailed description of an unknown person’s appearance from genetic variations, very likely to expedite police investigations by providing more scientific information of forensic evidence.
  • Forensic Science And Technology. https://doi.org/10.16467/j.1008-3650.2001.03.002
  • Forensic Science And Technology.
  • Forensic Science And Technology. https://doi.org/10.16467/j.1008-3650.2001.06.041
  • Forensic Science And Technology. https://doi.org/10.16467/j.1008-3650.2002.05.024
  • Research Articles
    ZHOU Mi, WANG Jun
    Forensic Science And Technology. 2017, 42(1): 28-31. https://doi.org/10.16467/j.1008-3650.2017.01.006
    Objective To analyze the apparent component number from the mixed sample of forensic genetic evidence with stochastic simulation for exploring the inherent regularity on the evaluation of the component number of such mixed sample. Methods With stochastic simulation into ID (Identifiler) system, one million STR genotypes of mixed samples, owning 2-7 components, were engendered and analyzed. The distribution of cumulative probability of apparent component number (CPA) in the mixed samples of 2-7 components was calculated by the self-designed software into ID system. Probability formula of apparent component number of the mixed sample, comprising two actual components but showing one apparent component (PA2-1) on a single-locus, was derived along with the cumulative probability formula of apparent component number of mixed sample (CPA) for the multi-loci. The two formulas were then all empirically validated on the calculation values of formula and simulation experiments by correlation method through two sets of simulation experiments. Finally, the concepts were proposed on the probability of excluding mixture (PEM) and cumulative probability of excluding mixture (CPEM). The approximate calculation formula of CPEM was put forward, and tested with the CPEM asymptotic value in ID system. Results CPA distribution of mixed samples owning 2-7 components was calculated with stochastic simulation approach in ID system. Two formulas were all in accordance with the simulation experiments. The approximate value of CPEM was 1-1.23298×10-9 (0.999999998767) in ID system. Conclusion CPA distribution and the formulas built here have certain applicability for the evaluation of component number of mixed sample. The CPEM can be suggested as the appraisal indicator for distinguishing the sample of single component from that mixed, and the method for calculating the CPEM is able to apply into practice of forensic genetics.