20 April 2018, Volume 43 Issue 2
    

  • Select all
    |
    Special for the 13th Five-Year Plan
  • ZHAO Xingchun, MENG Qingzhen, NIU Yong, JI Anquan, LIU Huinian, MA Xin, YE Jian
    Forensic Science And Technology. 2018, 43(2): 87-91. https://doi.org/10.16467/j.1008-3650.2018.02.001
    Abstract ( ) Download PDF HTML   Knowledge map Save
    The 13th Five-Year Plan is an important one among the strategic opportunities for the development of forensic science. With summarization of the status quo of forensic science, the goal of forensic science was here put forward in the new era through strengthening the overall design of the essential elements across whole chain, focusing on solving common problems and promoting the all-inclusive elevation of total involved disciplines. Therefore, in the 13th Five-Year Plan, forensic science should especially pay attention on researches about advancing basic theories, suspects’ characterization depiction, evidence analysis and tracing provenance as well as the quality assurance, in order to achieve breakthroughs from theory and technology and promotion of identification quality. Finally, the trend was looked into the intellectualization, standardization and industrialization for the future development of forensic science.
  • Special for the 14th Five-Year Plan
  • KANG Yanrong, FAN Wei, ZHAO Lu, LIU Ya
    Forensic Science And Technology. 2018, 43(2): 92-96. https://doi.org/10.16467/j.1008-3650.2018.02.002
    Abstract ( ) Download PDF HTML   Knowledge map Save
    Live memory can be extracted from Android phone when the sourcing kernel of Android phone is able to be successfully compiled with LiME tool. However, most of the sourcing kernel cannot be obtained during the actual electronic forensics because not all the open source codes of Android phone are offered publicly, and even many of them are difficult to find. In this paper, a method was proposed to use one similar kernel to extract live memory from Android phone by resolving the unknown symbol error. First, an analysis was conducted on the Linux-based ELF format and kernel symboling mechanism so as to find the function definition of unknown symbols from the relevant source codes, and thereby cancel the corresponding configuration. Second, one similar kernel was accordingly compiled to exclude those unknown symbol indexes. At last, the similar kernel has been successfully uploaded to Android phones, making the live memory acquired from most of the tested phones.
  • Special for the 15th Five-Year Plan
  • SHANG Lei, MO Xiaoting, YANG Fan, ZHANG Jian, YU Zhengliang, MA Xin, ZHAO Xingchun, LI Wanshui
    Forensic Science And Technology. 2018, 43(2): 97-103. https://doi.org/10.16467/j.1008-3650.2018.02.003
    Abstract ( ) Download PDF HTML   Knowledge map Save
    As one of the most important genetic markers used in forensic science, Y-STR has been widely applied, with its single-copied loci being paid extraordinary attention. However, multi-copied Y-STR loci generally contain 2-4 copies and display high genetic polymorphism, therefore allowing them to be an important replenishment to the current technique. Although there are reports on dozens of multi-copied Y-STR loci, including multiple rapidly-mutating loci, yet these researches only focus a few of them on the genetic diversity. The related studies in China have been mostly carried out on Han population, mainly from Henan province, therefore expecting them to be extended to a wider scope. The present-used multiplexes usually include only 2-3 multi-copied loci. Thus, the inclusion of more multi-copied loci might improve their discrimination power. In this paper, a comprehensive review was made on the studies about the multi-copied Y-STR locus’ structure, mutation, allelic frequency and the involved multiplex construction, finally pointing out the directions for future research.
  • Special for the 16th Five-Year Plan
  • REN Yifei, HAO Hongxia, YANG Ruiqin
    Forensic Science And Technology. 2018, 43(2): 104-110. https://doi.org/10.16467/j.1008-3650.2018.02.004
    Abstract ( ) Download PDF HTML   Knowledge map Save
    Under the currently international situation of high incidence of terrorist attacks and explosions, there is an ever-growing demand for explosive detection. 2,4,6-Trinitrophenol (TNP), also named as picric acid (PA), is one of the common explosive components and strong exploding power. Increasing attention has in recent years been attracted to the highly selective, sensitive and rapid detection of TNP due to the concerns of public safety and environmental contamination. Among the methods of TNP detection, fluorescent probes have been extensively investigated because of their fast response, high sensitivity, low cost and ease of operation. In this review, fluorescent probes used for rapid TNP detection are summarized and classified into three categories according to their compositions and properties: the nanomaterial-based, polymer-based and small molecule-based. Together, the progress is concluded and prospected in such research area.
  • Special for the 17th Five-Year Plan
  • WANG Jiong, WEI Chunming, ZHAO Sen, ZHANG Yunfeng, CHANG Jing, WANG Fanglin
    Forensic Science And Technology. 2018, 43(2): 111-113. https://doi.org/10.16467/j.1008-3650.2018.02.005
    Abstract ( ) Download PDF HTML   Knowledge map Save
    Determination-aided software for poisoning is to judge the kind of toxic substances causing poisoning with the known toxicosis symptoms. Poisoning judgment is fulfilled by optimization, embedding and encapsulation of the mathematical model established on detailed information of over 6,000 poisoning cases. This software can take in and calculate uncertain poisoning features and output 5 lists of judgments, showing that the established analytic model is applicable. Accuracy rate for judgment reaches above 88% based on poisoning symptoms and autopsy. The software also integrates the data query of toxic substances (including 2529 basic toxic substances with their information of appellations, usages, physical and chemical properties, spectrums, poisoning treatment, toxicity data for public security application), methods of poisoning test (collecting and sorting out 1135 literature-reported ones) and inquiry of industry standards (30 industry standards). Additionally, technical supports can be provided by the software for disposal of poisoning cases in four aspects of poisoning judgment, data inquiry of toxic substances, query of both analytic methods and industry standards.
  • Research Articles
  • LI Jiangchun
    Forensic Science And Technology. 2018, 43(2): 114-122. https://doi.org/10.16467/j.1008-3650.2018.02.006
    Abstract ( ) Download PDF HTML   Knowledge map Save
    Objective Characteristic code patterns are always the hot and difficult issue for questioned document examination. This paper tries to study the feasibility of identifying color laser printers/photocopiers and/or the relevant printed documents through outlining the involved instruments’ code patterns and analyzing whether the code patterns are unique and vary with different printed time. Methods More than 130 samples, produced at the different time with 9-brand printers/photocopiers of 30 models, were collected to test by both the optical and scanning visualization. With the help of VSC5000 document inspector and Photoshop software, all the apparatus’ code patterns were shown and analyzed from every tested samples produced by the above-mentioned instruments, along with the comparison among the code patterns given birth with a same printer/photocopiers at different time. Results There are very clear differences among the code patterns from the samples of 9 brands of printers/photocopiers. However, one same printer/photocopier depends on its brand and model to engender invariable or changed code patterns printed at different time. Conclusions Identification of color laser printer/copied document can be done by the apparatus’ characteristic code pattern, demonstrating it is scientific, reliable and feasible.
  • TANG Yu
    Forensic Science And Technology. 2018, 43(2): 123-129. https://doi.org/10.16467/j.1008-3650.2018.02.007
    Abstract ( ) Download PDF HTML   Knowledge map Save
    Distance computing is a basic problem when cluster analysis has been applied into joint investigation. Usually, Jaccard coefficient and cosine similarity are the two ways for distance computing. In this paper, the reference model was compared with the result of cluster analysis based on the handling of Jaccard coefficient and/or cosine similarity, showing that the result of cluster analysis is the same as that of reference model. Therefore, both Jaccard coefficient and cosine similarity can be used into cluster analysis for joint investigation.
  • XIANG Jing
    Forensic Science And Technology. 2018, 43(2): 130-134. https://doi.org/10.16467/j.1008-3650.2018.02.008
    Abstract ( ) Download PDF HTML   Knowledge map Save
    Troublemaking mental patients are towards increasing their quantity along with the elevated intention of self-protection, resulting in the violent criminals with mental disorders to deny their crime involvement in the trial so that the relevant investigation and interrogation are seriously retarded. Such a denial behavior is correlated with both the pathological psychotic function and self-defense. It is of great significance to distinguish whether one denial is based on real amnesia or rather represents the involved individual’s anti-investigation intention because the following interrogative strategy can be therefore built up and the suspect’s responsibility clarified. Three criminal cases are here reported of the schizophrenia individuals who denied their involvement into violent crime, and analyzed for discussions to identify the authenticity of amnesia.
  • NIU Yong, LI Yang, LU Yanxu
    Forensic Science And Technology. 2018, 43(2): 135-137. https://doi.org/10.16467/j.1008-3650.2018.02.009
    Abstract ( ) Download PDF HTML   Knowledge map Save
    Objective To study the influence of heroin on the peritoneal macrophages to secrete interleukin (IL)-1. Methods Mouse peritoneal macrophages were cultured in vitro with addition of heroin into the routine medium and measured of the IL-1 activity via thymocyte proliferation method. Results After treated with heroin, the mouse peritoneal macrophages secreted IL-1 increasingly. Through measurement by an ultraviolet spectrophotometer at the λ=405nm, an A value was obtained about 700±82.82 of the IL-1 activity in the heroin-treated group compared with 535.6±24.66 in the control group (p<0.05). Conclusion heroin could modulated the mouse immunologic function by promoting IL-1secretion.
  • ZHANG Guangfeng, GAO Shan, CHANG Jingjing, XU Xiaoyu, HAO Jinping, YANG Xueying, ZHU Dian, ZHANG Ying, ZHANG Jin, TU Zheng, LIU Kaihui
    Forensic Science And Technology. 2018, 43(2): 138-143. https://doi.org/10.16467/j.1008-3650.2018.02.010
    Abstract ( ) Download PDF HTML   Knowledge map Save
    Objective To investigate the Y-STR haplotype variations within a pedigree by three Y-STR tests (Y filer, Y filer® Plus and the rapidly mutating Y-STR). Methods 32 Y-STR genotypes were obtained with both the Y filer® Plus kit and another multiplex amplification system enclosing 7 rapidly mutating Y-STRs to demonstrate the variations of Y-STR haplotypes. The variation patterns were analyzed through their emergence among generation descending. Results For different males in the big pedigree tested, their Y-STR haplotypes are of certain diversity, showing them very closely related to the amount and mutation rates of the involving Y-STR loci. The proportion of different Y-STR haplotypes increases along with meiosis times between individuals. When two relative males were separated by 10 meioses, the percentage of their Y-STR haplotypes was differentiated to 7.35% by Y filer, 91.2% by Y filer® Plus, and even 100% by rapidly mutating Y-STR. Conclusions Y-STR haplotypes, when consisted of different sets of Y-STR loci, reveal bigger diversity among various individuals due to the diverse mutating speed across their generation descending. Therefore, more attention should be paid in paternity test and familial search, especially when the Y-STR haplotype contains rapidly mutating Y-STRs. The discovery here should also be suggestive for Y-STR database construction.
  • LI Xiongwei, WANG Qiuyun
    Forensic Science And Technology. 2018, 43(2): 144-147. https://doi.org/10.16467/j.1008-3650.2018.02.011
    Abstract ( ) Download PDF HTML   Knowledge map Save
    Objective To investigate and validate the fingerprint separation from complex background by Lab model of Photoshop software. Methods The samples were scanned under 600dpi resolution and saved in JPGE format. With the Lab model of Photoshop CC 2017, the samples were processed through single channel optimization, channel difference calculation and sharpening, thereby having verified the advantages and disadvantages in separating fingerprint from its complex background. Results Under Lab model, the effect of difference calculation is better to separate the fingerprint on paper money, capable of making fingerprint features obvious and more comparable. Conclusion Lab-based image subtraction operation can be used for fingerprint separation from its complex background.
  • LIU Zhenping, YANG Yang, TONG Jijun, ZHAI Xiandun
    Forensic Science And Technology. 2018, 43(2): 148-151. https://doi.org/10.16467/j.1008-3650.2018.02.012
    Abstract ( ) Download PDF HTML   Knowledge map Save
    Objective To explore the phenomenon and characteristics of triallelic patterns discovered in the STR loci commonly used for routine forensic practice. Methods Triallelic patterns were screened from 37,737 unrelated healthy individuals’ STR-genotyping data obtained with STRtyper-21G kit. All the triallelic patterns were confirmed by other different kits. The frequency of triallelic patterns was calculated and their features were analyzed. Results Of the 26 suspected triallelic patterns, 21 ones were confirmed, 3 ones elusive, and the left 2 ones were excluded for them to be the rare alleles spanning across the neighboring locus. The total frequency of triallelic patterns was 0.0556% (21/37737) in autosomal STRs, with 0.0106% (4/37737) at FGA and/or TPOX, plus 0.0079% (3/37737) at Penta E. Of all the triallelic patterns, Type 1 accounts for 71.4% (15/21) and Type 2 for 28.6% (6/21). Conclusion Triallelic patterns are present of certain percentage in population, thus careful judgment is needed in routine forensic work.
  • XIAHOU Qiujin, LI Peng, BI Wenji, BAI Zexin, GUO Fei
    Forensic Science And Technology. 2018, 43(2): 152-155. https://doi.org/10.16467/j.1008-3650.2018.02.013
    Abstract ( ) Download PDF HTML   Knowledge map Save
    Objective To study the decomposition kinetics of dimethyl-dichlorovinylphosphate (abbreviated as DDVP, also dichlorvos) in blood. Methods DDVP was spiked into the blank human blood to make its aliquots with the concentrations of 0.36, 0.72, 1.5, 3.0, 5.3 μg/mL. Each concentration was respectively stored at the temperature of 20℃, 4℃ and -20℃ for the time of 1, 2, 4, 6, 8, 12, 16, 20, 24, 28, 32, 40, 48, 64, 80, 96 and 120 days, waiting for the test of DDVP content with a UPLC-MS/MS apparatus. The DDVP-spiked blood was deproteinated by acetonitrile, and followed to inject by the volume of 10µL into a Waters BEH C18 column (1.7µm×2.1mm×50mm) that was running with 5mM Ammonium acetate-methanol as the mobile phase under the flow rate of 0.3mL/min. Electro-spray ionization (ESI) source was applied and positive ion mode adopted, plus the multiple reaction monitoring (MRM) mode being used to quantify. Results Different-conditioned temperatures can all cause decomposition of any tested concentrations of DDVP in human blood, with the -20℃ and 4℃conditions fitting to the one-compartment open model of first-order kinetics, that is expressed as Ct=Coe-αt. Yet, the decomposition is very fast at 20℃, unable to fit into one kinetic equation. Conclusion DDVP decomposes at the above tested concentrations in blood although there is great discrepancy under different preservation conditions. It is suggested that the case sample of DDVP poisoning should be kept under cold, timely submitted and detected.
  • WANG Yingxi, ZHANG Qingxia, XUE Luyan, LI Cheng, DU Juan, HUO Zhenyi, JIAO Zhangping
    Forensic Science And Technology. 2018, 43(2): 156-158. https://doi.org/10.16467/j.1008-3650.2018.02.014
    Abstract ( ) Download PDF HTML   Knowledge map Save
    Objective To establish a method of forensic-purposed automatic DNA extraction from contact samples by KingFisher system combined with high-quality DNA extraction kit (BoKun). Methods Standard DNA was yielded from its different initial quantity (0.1ng, 0.15ng, 0.2ng, 0.25ng), and DNA extraction was also individually conducted from either the single fingerprint deposits or the contact samples of forensic casework. Results Except 2 out of the 10 standard samples containing 0.1ng DNA, all the other concentrations of DNA got their complete STR genotypes. Compared with their contributors, the single fingerprint deposits achieved the effective DNA detection rate of 57.2%. For the tested 870 contact samples of forensic casework, the effective DNA detection rate was 71.5%. Conclusion High-quality DNA extraction kit, combined with KingFisher system, can be applied in the forensic-purposed DNA extraction from contact samples, yielding the DNA product suitable for STR typing with proper quantity and quality.
  • Reviews
  • WANG Ping, GUO Hongling, ZHU Jun, MEI Hongcheng, QUAN Yangke
    Forensic Science And Technology. 2018, 43(2): 159-163. https://doi.org/10.16467/j.1008-3650.2018.02.015
    Abstract ( ) Download PDF HTML   Knowledge map Save
    Mineral, ubiquitous in the Earth and most abundant in soil, is therefore one kind of common evidence. Mineral is also of strong transferability and significant regional traits. Thus, soil evidence can be identified along with its provenance through the determination of both the composition and content of the mineral in soil so that the relevant criminal investigation can acquire the necessary clue. This paper analyzes the significance of mineral examination for forensic science, and summarizes the research progress in analysis of mineral evidence.
  • Technical Notes
  • CAO Qiwen, XU Cuilan, TANG Wenhu
    Forensic Science And Technology. 2018, 43(2): 164-166. https://doi.org/10.16467/j.1008-3650.2018.02.016
    Abstract ( ) Download PDF HTML   Knowledge map Save
    Although murder or homicide rarely happens to a failed suicide, the case may occur when an appointed suicide is committed because there is perhaps the existence where a collaborative suicide (the collaborator is conducting a homicidal deed) is demanded. Thus, the dead corpse will be present of damages from both the suicide and homicide. Therefore, more attention must be paid to the injury analysis in forensic inspection and identification. In this paper, one case, where a homicide took place after a failed suicide, was reported and the damage mechanism analyzed.
  • LIU Dongming, YUAN Zengxian
    Forensic Science And Technology. 2018, 43(2): 167-169. https://doi.org/10.16467/j.1008-3650.2018.02.017
    Abstract ( ) Download PDF HTML   Knowledge map Save
    Three cases are presented here that self-employed laborers collecting recyclable materials were killed at their working-plus-residing sites in the rural-urban conjoint places. Generally, these people live far from the city, meet mass and various individuals, lack security and protection awareness, yet carrying comparatively more cash so that they are very prone to be the looting target. Accordingly, the self-employed laborers collecting recyclable materials are probably of high risk to be murdered.
  • ZHANG Shutao
    Forensic Science And Technology. 2018, 43(2): 170-172. https://doi.org/10.16467/j.1008-3650.2018.03.018
    Abstract ( ) Download PDF HTML   Knowledge map Save
    To some extent, it is difficult to judge a suicide suspected of homicide in forensic practice. This paper collected four cases of suicide suspected of being killed. Through scene investigation, autopsy and background checks, many common characteristics were found on the scene marks, injury and background investigation. Therefore, some specific and feasible methods were given for similar cases.