25 December 2015, Volume 40 Issue 6
    

  • Select all
    |
    Focus: Digital Forensics
  • LIU Ya, KANG Yanrong, ZHAO Lu, YU Wenhao, ZHANG Guochen
    Forensic Science And Technology. 2015, 40(6): 431-434. https://doi.org/10.16467/j.1008-3650.2015.06.001
    Abstract ( ) Download PDF HTML   Knowledge map Save
    Volatile memory acquisition from cell phone has gained popularity in recent years, because its analysis yields a wealth of information not available in non-volatile storage. Such aspects as the executing and terminated processes, application data, network connections, some user names and passwords, are important for investigation storage in the volatile memory. In this paper, we introduce a novel idea for cell phone forensics by analyzing a set of kernel source of android phone, and establishing an acquisition method that could extract volatile memory from phones with different kernel version. On Linux, kernel modules must be compiled against the relevant version of kernel headers and configuration so that it can be executed on the target system. During the module installation, the kernel starts to analyze two special sections in the module of .modinfo and_versions, and will refuse to load if this module contains incompatible version magic. Aiming at different Android kernel versions for different mobile phone, we analyzed the kernel verification mechanism, and explained how to modify the kernel configuration mode and kernel source code, to compile the available memory extraction module. The results show that this method can successfully extract volatile memory from multiple brands and models of Android mobile phones.
  • WANG Hongqing, WANG Jimo, JI Chaohao, ZHOU Xiangpeng, LIU li, ZHU Yuandong
    Forensic Science And Technology. 2015, 40(6): 435-439. https://doi.org/10.16467/j.1008-3650.2015.06.002
    Abstract ( ) Download PDF HTML   Knowledge map Save
    Pseudo Base Station, albeit high in technology, is a kind of illegal equipment that sends messages to its nearby mobile phones through any coincidently identical numbers it creates randomly. It pretends a telecom operator’s base station to communicate with the nearby mobile devices. The illegal use of this equipment poses a threat to national security and social stability. However, Pseudo Base Stations has not received much attention in forensic research and investigation until now. This paper attempts to analyze Pseudo Base Station data based on the previous experiences, beginning with the introduction to basic background knowledge of Pseudo Base Station. The second section describes the forensic challenges of Pseudo Base Station and the reason of its existence. A novel framework for analyzing Pseudo Base Station is in succession to be proposed. It suggests three steps to obtain data from a Pseudo Base Station. First is to extract “interrupted number” from the Pseudo Base Station system logs (OpenBTS.log or syslog). Second is to pick up “sent IMSI number” from Pseudo Base Station software database. Last is to extract user activities and system information from Pseudo Base Station data. The fourth section of this paper is a case study. This section introduces how to conduct a forensic analysis on this type of Pseudo Base Station. It explains the reason why the number shown in the user interface is wrong and should reject in the result based on the analysis of the source codes. Moreover, a simulative experiment was designed using a GSMS “Pseudo Base Station” to send text to nearby mobile phones, verifying the proposed method by comparing the received data with the examined results.
  • XU Guotian
    Forensic Science And Technology. 2015, 40(6): 440-444. https://doi.org/10.16467/j.1008-3650.2015.06.003
    Abstract ( ) Download PDF HTML   Knowledge map Save
    ObjectiveIn computer-related case investigations, Excel files from suspect’s computers are often damaged and unable to be analyzed. These incomplete Excel files usually store a lot of valuable text data, which are significant for the investigation. In this paper, we attempt to develop assays to recover these residues of text data. MethodsA WorkBook stream exchange method towards slightly damaged Excel file is proposed. First, the target Excel file, a large one, is prepared, and its WorkBook stream data is set to 0x00. The WorkBook stream data of incomplete Excel file is then input to WorkBook stream of the target Excel file after being extracted with Winhex. The text information of incomplete Excel can be found when double-clicking the target Excel file. Another recovery method based on the reconstruction of the key data structure is also designed for severely damaged Excel files. A large target Excel file is firstly prepared with its WorkBook stream data set at 0x00. The WorkBook header, BoundSheet, Language and region, SST shared string, Extended SST and Sheet1 data of incomplete Excel file are extracted successively with Winhex, and then copied to WorkBook stream of the target file. When missing data structure is supplemented, absolute address references for BoundSheet and Extended SST are adjusted, text information of incomplete Excel will be found in the target Excel file. ResultsThe target file dealt with the WorkBook stream exchange method can recover its texts, formatting and formulas. When open those managed with the key data structure reconstruction, an error message will pop out. But its text information can be displayed after continuously clicking OK button, though the formatting is unrecoverable. ConclusionsThe proposed methods in this paper can effectively extract the text data in the incomplete Excel file.
  • LI Zichuan, ZHANG Zuo
    Forensic Science And Technology. 2015, 40(6): 445-449. https://doi.org/10.16467/j.1008-3650.2015.06.004
    Abstract ( ) Download PDF HTML   Knowledge map Save
    As surveillance video detection technology is playing an increasingly important role in almost all kinds of cases in the process of probing in recent years, the criminal suspects often use a variety of means to forge or tamper their surveillance videos. Thus, in the field of electronic evidence research, data recovery of non-universal video surveillance system is a hot issue. This paper analyzes a kind of video surveillance system with large market share. Firstly, the critical parameters were resolved, together with the obtainment of the size and arrangement of the video surveillance data block. Secondly, the video frame structure was analyzed in-depth in order to determine which channel a data block belongs to or to acquire video record starting time in the data block. Two corresponding algorithms were presented. Eventually, for the mistakenly formatted or partially covered data, the video surveillance data channel was separated and reorganized, leading to the restoration of the type of video surveillance data. Through the analysis of the data block of arbitrary selection, it confirmed that the key parameters were read out correctly. By comparison of the frame format of the readout channel number with the actual display of the channel number in the monitoring video, the correctness of the frame format was verified. Combined with actual case, the results of the two algorithms proposed in this paper were given and briefly analyzed of their implementation, showing the efficiency and accuracy of the technology, providing some reference for forensic work about electronic data of other non-universal video surveillance. For data search and recovery from non-universal video surveillance, the in-depth study is still necessary, in particular on data fragmentation.
  • Research Articles
  • LIU Hong, JIN Guowen, YANG Xingyi, LI Yue, SU Huifang, LIU Chao
    Forensic Science And Technology. 2015, 40(6): 450-456. https://doi.org/10.16467/j.1008-3650.2015.06.005
    Abstract ( ) Download PDF HTML   Knowledge map Save
    ObjectiveTo investigate into the screening, pedigree identification and database construction of Y-STR’s main haplotypes. MethodsHaplotypes at 17 Y-STR gene loci of 426 males from 72 pedigrees having descended beyond five generations in three surname-concentrated villages were surveyed and analyzed with Y-filerTM kit, and the number of haplotypes was counted along with the coverage rate of main haplotypes. ResultsA total of 46 haplotypes were detected at 17 Y-STR gene loci from the 72 pedigrees investigated, with each surname’s pedigrees having about 1 or 2 main haplotype(s) which were originated to form the other mutated or varied ones. The population coverage rate was 62%~79% when the fault allowance for variance set at two gene loci. ConclusionsDatabase of Y-STR’s main haplotypes by surnamed-pedigree, once set up, could help to reduce the scope to find suspects, target at certain pedigree, though inability to directly identify the suspects from a same surname-concentrated community.
  • WANG Guiqiang
    Forensic Science And Technology. 2015, 40(6): 457-466. https://doi.org/10.16467/j.1008-3650.2015.06.006
    Abstract ( ) Download PDF HTML   Knowledge map Save
    Forensic intelligence is a timely product of the criminal intelligence created by logic analyzing forensic case data. There is vast information about the criminal environment and criminal activity in forensic case data, which could potentially be used as a key element of information from intelligence perspective. To date, forensic science is primarily focused on both providing lead for crime investigation and generating evidence for judicial proceedings. Beyond these two traditional applications, the application of forensic intelligence is the third task, which is aligned with the perspective of intelligence-led policing. In this article, the definition and rationale theory of forensic intelligence was overviewed. The author proposed a generalized framework of forensic intelligence process which consist of stages of trace collecting, forensic analyzing, data storage, integrating analysis, compounding analysis, fusing analysis, intelligence products expressing and conveying intelligence, and decision-making supporting. This general and multi-commodity model would assist in defining forensic intelligence and understanding its role and place in policing, and could be a comprehensive guide to use all kind of forensic case data and other source information from the intelligence-oriented perspective. In the end, the suggestion was proposed to build up the ability of forensic intelligence process.
  • MIN Jianxiong
    Forensic Science And Technology. 2015, 40(6): 467-469. https://doi.org/10.16467/j.1008-3650.2015.06.007
    Abstract ( ) Download PDF HTML   Knowledge map Save
    As the fifth portion of the serial treatise of victimology in homicide crime scene analysis, this paper continues to study victim of homicides and explores the function and value of the victim’s reaction in homicide crime analysis. Here it focuses heavily on victim’s behavior which generated in the progress of crime, namely, contact and attack stage. The victim’s behavior can be categorized into three major aspects. One is the submissive behavior that refers to the victim’s voluntary compliance with the requirements of the suspect, and second is the resistant behavior that occurred to the victims when they confront the fatal attack. Emergency response is the third one that occurres to the victims when they suffer a sudden accident. These three behaviors are discussed and clarified assisted with three specific cases. Given the behavioral responses of the victim, we might be able to analyze the relationship between the victim and the suspect, and go further to profile the criminal.
  • ZHANG Xin, CHENG Kebin, LIU Fan, FENG Huan, Liu Li
    Forensic Science And Technology. 2015, 40(6): 470-473. https://doi.org/10.16467/j.1008-3650.2015.06.008
    Abstract ( ) Download PDF HTML   Knowledge map Save
    Objectiveto establish an accurate and objective assay to evaluate the time of fresh and/or old vertebral compression fractures while lowering influence of subjective factors. Methods50 patients with 52 vertebras were scanned by follow-up MRI three times, on day 30, day 90, and day 180 or more, respectively after the injury. These patients came to the hospital after falling down on the ground within 13 days, and were all diagnosed as vertebral compression fractures without the osteoporosis during January 2013 to June 2014 by CT and MRI. The changes in apparent diffusion coefficient (ADC) values during vertebral fracture healing were statistically analyzed. Formulas were created using SAS 9.3 software according to different parameters. ResultsADC values in vertebral fracture healing process decreased gradually and tended to zero. Significant differences between groups (P < 0.05) were observed when comparing mean ADC values of any two of the four periods (1~13 days,30 days, 90 days, 180 days or more after injury). With discriminant equations in these four periods, the accurate rate was 71.11%. However, the discriminant equations for the two periods (1~13 days and 30 days or more) led to the discriminant accuracy up to 92.22%。ConclusionsADC could help to identify the fresh or old vertebral compression fractures. With high discriminant accuracy of the equations for 1~13 days and 30 days or more, and the simple index collection, the assessment assay in this paper is conducive to the popularization and application in forensic clinical appraisal.
  • ZHONG Wukui, ZHOU Xuke
    Forensic Science And Technology. 2015, 40(6): 474-476. https://doi.org/10.16467/j.1008-3650.2015.06.009
    Abstract ( ) Download PDF HTML   Knowledge map Save
    Behavior of staging crime scenes refers to purposeful alteration of the crime scene in an attempt to mislead investigators. The aim of this study is to analyze the crime scene behaviors of crime scene stagers and demonstrate its utility in criminal investigation. Homicide crime scene behaviors were studied with 35 staged homicidal cases happened in the city of Shaoxing during 2009~2013. The staging manners, the used tools, the cause of death, the blood at the scenes and the familiarity between the dead and the suspects were statistically analyzed. According to various targets, the behaviors of staging crime scenes by suspects can be classified into two types: disposing objects and corpses, either having its own diverse manners of disposal and the specific motive. This article provides empirical data of the staging behaviors of homicide crime scene for forensic practitioners, which can be applied in crime scene reconstruction and criminal investigation.
  • LI Hangqi, LAN Hui, ZHUANG Shun, LIN Jian, LIN Jia, GUO Ming, YE Shu-hai
    Forensic Science And Technology. 2015, 40(6): 477-479. https://doi.org/10.16467/j.1008-3650.2015.06.010
    Abstract ( ) Download PDF HTML   Knowledge map Save
    ObjectiveTo establish methods for qualitative analysis of chloroephedrine. MethodsDifferent methods were used to analyze chloroephedrine. Solid sample was dissolved with methanol and the solution was analyzed by Fourier transform infrared spectrometer (FTIR), gas chromatography-mass spectrometer (GC-MS) and high performance liquid chromatography-quadrupole time-of-flight mass spectrometry (HPLC-QTOFMS), respectively. Results1,2-dimethyl-3-phenylaziridine, not chloroephedrine was detected with GC-MS. Transformation of chloroephedrine to 1, 2-dimethyl-3-phenylaziridine was observed during GC-MS analysis due to the high temperature of inlet.However, such interference was prevented while using LC-MS or FTIR. Chloroephedrine and 1, 2-dimethyl-3-phenylaziridine could be separated and determined by LC-MS. Exact ion m/z of chloroephedrine was 184.0888, and 148.1121 for that of 1, 2-dimethyl-3-phenylaziridine. In addition, retention time of chloroephedrine and 1, 2-dimethyl-3-phenylaziridine were different in LC-MS. ConclusionsGC-MS is not fit for the determination of chloroephedrine, because chloroephedrine is unstable and transformed to 1, 2-dimethyl-3-phenylaziridine by high temperature of inlet. HPLC-QTOFMS is competent for qualitative determination of chloroephedrine and the transformation could be avoidable. FTIR is capable of qualitative determination of highly pure chloroephedrine.
  • SONG Xiaojiao, GUO Hongling, MEI Hongcheng, QUAN Yangke, ZHU Jun
    Forensic Science And Technology. 2015, 40(6): 480-484. https://doi.org/10.16467/j.1008-3650.2015.06.011
    Abstract ( ) Download PDF HTML   Knowledge map Save
    ObjectiveLead isotope ratio analysis of bullet can provide important information for investigation of shooting cases. Inductively coupled plasma mass spectrometry (ICP-MS) is a very appealing technique in forensic science, as it can obtain both multi-elemental and isotopic information. In this paper, we try to establish a method to measure lead isotope ratio in bullets by using ICP-MS and distinguish bullets from different sources. MethodsLead samples were cut from bullets, weighed on analytical balance and then put into test-tubes. Nitric acid solution (HNO3:H2O=1:3) was added into the test-tubes to digest the samples. The dissolutions were diluted to the appropriate concentration for the measurement on ICP-MS by pure water. Under optimized operating condition, we determined the dead time of the ICP-MS instrument by experimental method, analyzed the precision fluctuations according to number of sweep, dwell time and Pb concentration. Meanwhile, we tested the reproducibility of this method and the homogeneity of lead isotope composition within single bullet, and analyzed lead isotope ratio of 13 bullets from three manufacturers. ResultsThe dead time of this instrument was determined as 29 ns. To get high precision result, the number of sweep was set as 200, dwell time of 204Pb, 206Pb, 207Pb and 208Pb were set as 20, 10, 10 and 10 ns, respectively, the optimal Pb concentration was 80 ppb. As shown in the paper, the reproducibility of the method is good, lead isotope composition is homogenous in single bullet but is different in bullets from different manufacturers. ConclusionsThe lead isotope ratio determination by ICP-MS is confirmed to be an effective method for distinguishing bullets with various lead ore sources.
  • SU Rina, YANG Ruiqin, YU Aoyang
    Forensic Science And Technology. 2015, 40(6): 485-488. https://doi.org/10.16467/j.1008-3650.2015.06.012
    Abstract ( ) Download PDF HTML   Knowledge map Save
    ObjectiveTo determine potassium chlorate in suspicious object with microfluidic paper-based analytical devices by digital gray colorimetric analysis. MethodsIn acidic medium, potassium chlorate reacts with hydrochloric aniline to form stable colored chelate complexes. Hydrophobic barrier was built on filter paper through inkjet printer with sensing ink prepared from permanent mark ink. After contacting with sensing ink, the filter paper changed into hydrophilicity from hydrophobicity. The pattern with computer was designed, and then printed onto filter paper with sensing ink. After evaporation of ink solvent, the colorant, hydrophobic resin remaining in the filter cellulose built up a visible hydrophobic barrier. Thus the uniform and stable spotting space had been created. The hydrophobic zone was spotted with 20 μL hydrochloric aniline reagents followed by KClO3 solution, each with 10 minutes of air-dry. The image of the spot photos was grayscale processed, and image analysis software was used to measure the gray values of detection zones for quantitative analysis. Some important parameters that influenced the efficiency and the digital imaging result were studied and optimized. ResultsThe results indicated that the concentration of sample was positively correlated with the image gray value. Hydrophilic circle zone was formed after four successive inkjet printings. 20 μL of spotting volume was optimum, and Scion Image 4.03 performed better. A good liner relationship was obtained in the range of 50~90 μg/mL (R2=0.99) with detection limit of 0.92 μg/mL. ConclusionsThis method can perform quantitative analysis of KClO3 at very low cost, and well meet the requirements of site detection due to its simplicity and rapidity.
  • Reviews
  • LIU Yuxuan, ZHENG Junyao, ZHANG Wenqiong, HUANG Daixin
    Forensic Science And Technology. 2015, 40(6): 489-492. https://doi.org/10.16467/j.1008-3650.2015.06.013
    Abstract ( ) Download PDF HTML   Knowledge map Save
    Human biological specimens collected from crime scenes are usually affected by internal and environmental factors, such as heat, humidity, UV light and enzymes. Under these circumstances, DNA is usually damaged from enzymatic degradation, oxidation, hydrolysis or radiation, resulting in a variety of undesired occurrence for profile interpretation like ladder-like pattern, stutter peak, heterozygote peak imbalance or allelic drop-out and PCR miscoding lesions. To cope with this difficulty, numerous strategies have been devised to tackle these problems. The most important strategies aiming at shorter sized amplicons, were used to increase the efficiency to type degraded DNA. Presently, forensic kits comprising of mini-STRs, SNPs and InDels are increasingly developed and established for routine case work. Besides, some researchers have developed pre-amplification large fragment recovery methods or DNA repair technology to mend the damaged DNA with assistance of relevant enzymes. Others focused on post-PCR purification protocol to enhance the DNA genotyping rate. In addition, some novel technologies, for example, next-generation sequencing and whole genome amplification, are used to deal with DNA-degraded samples. In this paper, we discuss the mechanisms of DNA degradation and their impact on genotyping, and describe the progress on the quantification of degraded DNA together with the methods for genotyping and other aspects.
  • LUAN Yujing, HUANG Shuang, WANG Ruihua, DONG Ying, CHANG Jing, DU Hongyan, YU Zhongshan
    Forensic Science And Technology. 2015, 40(6): 493-496. https://doi.org/10.16467/j.1008-3650.2015.06.014
    Abstract ( ) Download PDF HTML   Knowledge map Save
    It is well known that alcohol does impair a person’s ability to drive safely. The determination of alcohol in blood, urine and respiratory gas has been normalized in the field of transportation. However, driving under the inference of drugs (DUID) has not drawn enough attention, even though it is more dangerous than that of alcohol. The drugs mainly include illicit drugs, central nervous system stimulants, central nervous system depressants, tricyclic antidepressants, antidiabetic drugs, antihypertensive drugs, and antihistamines. The analyses of illicit drugs, psychotropic drugs and some clinical drugs with direct effects on driving safety have not yet been implemented in the transport field. Some developed countries have enacted laws and regulations relevant to drug-impaired driving ability, clearly stipulating that the drivers must not take any illegal and psychoactive drugs. In China, the 22th clause in the Road Traffic Safety Law provides that drivers who have drunk, or taken state-regulated psychotropic drugs or narcotics should not drive motor vehicles. The corresponding legal responsibility has not set yet, and no corresponding punishment basis has been created. Consequently preventing and combating drug driving is somehow quite affected. Therefore it is necessary to establish a drug-screening method in the domain of transportation. This article introduces the research progress and the corresponding technology of the impact of drugs on driving, and the related policy at home and abroad.
  • Technical Notes
  • ZHAO Lei, YUAN Wanhong, WANG Xueqian, SUN Qifan, OU Yuan, SUN Jing, WEI Yiliang, ZHAO Xingchun, LI Caixia
    Forensic Science And Technology. 2015, 40(6): 497-499. https://doi.org/10.16467/j.1008-3650.2015.06.015
    Abstract ( ) Download PDF HTML   Knowledge map Save
    ObjectiveTo study 30 insertion/deletion polymorphisms (InDels) of Guangxi Han and Miao population and evaluate their forensic applicability. Methods30 InDels and amelogenin were determined with Investigator® DIPplex in 50 unrelated individuals in the population of Han and Miao in Guangxi. Allele frequencies were measured along with other population genetics parameters. ResultsNo significant deviation from Hardy-Weinberg equilibrium or linkage disequilibrium after Bonferroni’s correction was observed in 30 InDels loci of Guangxi Han and Miao population. The total probability of discrimination power (TDP) was 0.99999999998 and 0.99999999997 for Guangxi Han and Miao population, respectively. The cumulative probability of exclusion (CPE) was greater than 0.96 for both populations. Out of the 30 InDels loci, six of He<0.3 for Guangxi Han population localized on D111, D118, D99, D114, D64 and D39, and for Guangxi Miao population on the eight loci of D111, D118, D99, D122, D64, D81, D39 and D84. The Fst values, calculated through Genepop 4.2 software, were less than 0.06 for all loci but D84 (0.0807). ConclusionsThe 30 InDels are highly polymorphic in Guangxi Han and Miao population and can be used for individual identification, both supplementary and stand-alone.
  • DONG Lan, WANG Nana, WANG Yong, JIA Suoguo, PU Hongbing
    Forensic Science And Technology. 2015, 40(6): 500-501. https://doi.org/10.16467/j.1008-3650.2015.06.016
    Abstract ( ) Download PDF HTML   Knowledge map Save
    The autopsy can offer great help for confirming the exact reason about the death on co-existence of postmortem injury and disease. The case reported here is just an appropriate illustration on the above viewpoint. The deceased, having suffered from the coagulation dysfunction when lived, died several days after tussling with her male-friend. Autopsy found the extensive subcutaneous bleeding and retroperitoneal hematoma in the lower part of her abdominal cavity and that of the pelvic. But the further examination showed no damage of the peritoneal organs inside her abdominal and pelvic cavity. The source of bleeding was finally discovered based on the anatomic knowledge of those relevant human corporal regions, and the cause of hemorrhage was determined. With comprehensive analysis of the case and autopsy results, the deceased was ascertained of dying from the hemorrhagic shock caused by the massive internal bleeding over coagulation dysfunction, and the tussling only an incentive effect.
  • SUN Xiaolin, HE Hongxiong
    Forensic Science And Technology. 2015, 40(6): 502-503. https://doi.org/10.16467/j.1008-3650.2015.06.017
    Abstract ( ) Download PDF HTML   Knowledge map Save
    In forensic practice, corpses exposed in the open environment were often found to be greatly affected by various factors such as environment, animals, insects, and etc. Consequently, great postmortem changes will be generated, and pose new challenges for postmortem examination, cause-of-death analysis and death-manner determination. This paper presents a case of the specific post-mortem phenomenon observed under the extreme circumstance. The decomposition in different body parts was discussed as well as post-mortem pink teeth phenomenon and the special damage of the body concerning animals and sharp ice. We were able to infer, by those above, the time of death and determine the manner of death. Thus, the impact of the environment, animals, insects are very important information to be aware of when examining outdoor corpses in future work.
  • NA Chunfu, LIU Sheng, WANG Youfeng
    Forensic Science And Technology. 2015, 40(6): 504-505. https://doi.org/10.16467/j.1008-3650.2015.06.018
    Abstract ( ) Download PDF HTML   Knowledge map Save
    The identification of the victims who suffered from serious disasters mainly depends on DNA technology to conduct kinship analysis because the number of casualties is usually big and most bodies are difficult to distinguish from their physical features due to the environmental and other factors causing the victims’ bodies to decay and rot. To provide reference in correct applying both the DNA analysis and database for future similar events, the authors summarized their valuable experience at aspects of formulating preventive plans, selecting the appropriate samples and DNA testing methods, and determining the kinship through China national DNA database in dealing with a flood disaster occurred in Fushun City, Liaoning Province of China.
  • HAO Honglei, WU Weiwei, REN Wenyan, SU Yanjia, LV Dejian
    Forensic Science And Technology. 2015, 40(6): 506-507. https://doi.org/10.16467/j.1008-3650.2015.06.019
    Abstract ( ) Download PDF ( ) HTML   Knowledge map Save
    ObjectiveThe aim of this study was to investigate the relevant between mutations at DYS389I and DYS389II loci. MethodsBloodstain samples of 2165 male individuals were collected from 1124 father-son pairs in Chinese Han population. The samples were examined using Yfiler PlusTM Amplification kits. The mutations at DYS389I、DYS389II were calculated. Sequencing was performed on the samples of 4 father-son pairs to analyze DYS389I and DYS389II. ResultsAmong allele transfers of 1124 father-son pairs, 8 mutations were observed in 8 father-son pairs at DYS389I and DYS389II. When 4 mutations were detected at DYS389I, genotypes of DYS389II changed at the same time. Sequencing results showed that mutations only occurred at DYS389I. When 4 mutations were observed at DYS389II, changes of genotype weren’t detected at DYS389I, which indicated the mutations occurred at DYS389II specifically. ConclusionsThe sequence of DYS389Ⅱ includes that of DYS389I. When there is a one-step mutation at DYS389i, it will also appear in DYS389II. It has to be cautionary to do Y-STR mutation calculation when mutations involve DYS389I and DYS389II.
  • LIN Yan
    Forensic Science And Technology. 2015, 40(6): 508-509. https://doi.org/10.16467/j.1008-3650.2015.06.020
    Abstract ( ) Download PDF HTML   Knowledge map Save
    The invisible anti-counterfeiting stamp is special, with the light-sensitive pad and the exposure time different from the common ones during its carving. The impression it produced can turn to be colorless, without interference of humidity, temperature or illumination. The invisible anti-counterfeiting stamp impression can be identified by currency detector, ultraviolet light, multi-band light source or text check instrument, of which ultraviolet light is the best. A document in question in a fraud case was analyzed. The controversial part of the case was that the common stamp impression was different from the reference sample, while the most features of signature were the same with that of the suspected signer. When further examining the contract under ultraviolet light with VSC6000 video spectral comparator, an unusual stamp impression invisible under natural light was discovered. The invisible anti-counterfeiting stamp impression with the suspect’s name on it became a solid evidence to prove the authenticity of the contract and that the suspect was the forger.
  • ZHOU Zhigang, YAN Zhongyong, ZHANG Xiaojun, YANG Baofeng
    Forensic Science And Technology. 2015, 40(6): 510-512. https://doi.org/10.16467/j.1008-3650.2015.06.021
    Abstract ( ) Download PDF HTML   Knowledge map Save
    A method for analysis of 3,4-methylenedioxy-N-methylcathinone (bk-MDMA) in milk tea powder samples was established by using electrospray ionization tandem mass spectrometry (ESI-MS/MS). The sample was extracted with methanol, then high-speed centrifuged. The supernatant was filtered and injected into ESI tandem mass by peristaltic pump. Proper qualitative ions of bk-MDMA were selected in mass scan and daughter scan mode. Tandem mass parameters such as cone voltage and collision energy were optimized, and the matrix interference was also investigated. Compared with GC-MS method, this method is faster, more convenient and sensitive. bk-MDMA was detected in five real samples analyzed with the established method. This method is rapid, accurate, sensitive and suitable for the qualitative analysis of bk-MDMA in criminal investigation and judicial identification.