StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Investigation Techniques - Essay Example

Cite this document
Summary
This essay "Investigation Techniques" discusses forensic science and different cutting edge investigation methods used to detect the actual criminal. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96% of users find it useful
Investigation Techniques
Read Text Preview

Extract of sample "Investigation Techniques"

Investigation Techniques Introduction: Forensic science is a sophisticated form of applied science which is in a of constant development as new techniques are constantly being discovered and refined so as to achieve more reliable accurate and more efficient results. The application of the science ensures that the examination of the crime scene and other related searches should be done in a careful and systematic way. The steps should be undertaken only after consulting with the officers who were in the place of the scene for the first time and from them it should be learned if there is any change that could have been made to the place of incident since their actual arrival. These changes may include minute details like turning off lights or opening of doors or windows etc. The investigator must start examining the body and should be much careful to avoid damaging any evidence present at the crime scene. Carefully observation of the ground around the body is necessary. The investigator has to search for items of evidence or those which have some evidential value like some stains, marks, etc. The investigator should remember that every crime scene has three dimensions and for that reason a thorough search is necessary. The investigator can use another technique of locating the evidence - by throwing a flashlight on the ground at slanting angle, which is very crucial also during the daytime. A thorough observation and documentation of the items are also important especially in the order in which the items were placed. Close attention should be given to each and every minute detail as one approaches the body or the exact place of the crime incident. It is also advisable not to dismiss any such material until its evidentiary value can fully be determined. Details in the form of footprints or drag marks or in some cases the marks on the ground or sign of minor destruction are most valuable for further investigation. These are the regular investigation or the routine pattern which are being discussed. But the analysis of the collected evidences is an area of study. With the help of modern science and technological advancements there are plenty of cutting edge investigation methods used to detect the actual criminal. Cyanoacrylate Fuming in a Vacuum Cabinet: With the forensic scientists looking for more sophisticated techniques to form the latent fingerprints, cyanoacrylate (CA) fuming has gained much popularity. (Bessman, Nelson, Lipert, Coldiron, Herrman). CA fuming is one of the many improved ways used to develop the latent prints and also has been in use for many years now. With this kind of fuming the results like the formation of a cyanoacrylate polymer on the detected fingerprint through the process of polymerization of cyanoacrylate ester vapors take place. (Bessman, Nelson, Lipert, Coldiron, Herrman). It is being initiated by an anionic component in the residues of the fingerprints. Once the visibility is developed, the prints can be enhanced by using a fluorescent dye stain or fluorescent powder along with a forensic light source which makes it more prominent. The Prints may be developed on a substance with a very smooth finish and nonporous in texture as well, including human skin. (Bessman, Nelson, Lipert, Coldiron, Herrman) Moreover the newer forms of CA fuming methods are also being used for improvement and development of latent prints. These improvements may include the expansion in the types of substrates of the substance which can be successfully fumed and also used for the improvement in the quality of the developed latent prints. (Bessman, Nelson, Lipert, Coldiron, Herrman) Also by dipping the extent of background deposition this technique helps in the identification of fingerprints on a range of substances. (Bessman, Nelson, Lipert, Coldiron, Herrman) Importantly, the results for the standard process in the normal CA fuming cabinet include very well identifiable prints on the aluminum foil and also on the duct tape. Prominent print is also visible on the most runs with substrates like the Styrofoam, black plastic bags, and plastic page protectors. (Bessman, Nelson, Lipert, Coldiron, Herrman) The Application of Infrared Photography in Bloodstain Pattern Documentation of Clothing: The observation and proper identification of bloodstain patterns on the clothing can be a crucial element for the accurate renewal of proceedings associated with the bloodshed of the victim. (Perkins). Techniques of Chemical enhancement like amido black and in some cases the leucocrystal violet might be successful, but these processes have the capacity to change the appearance of marks and might hinder the DNA analysis. For this particular reason the advantage of photographic techniques is that they have noninvasive effect on the appearance and also on biological integrity which helps in further investigation. (Perkins). In case of the Conventional photographic techniques like the subtractive or the additive color filtration may succeed in case of lighter colored materials but usually do not have an impact on dark fabrics. But Non-conventional photography techniques also can be utilized to increase the contrast in the appearance of blood to some extent against some specific types of backgrounds. Infrared photography is definitely one of these techniques and only should be considered for some specific situations. (Perkins). With the outset conservative conclusions are needed to be drawn from bloodstain patterns on fabrics mainly due to their hugely varying characteristics like the liquid absorption and diffusion. The conclusions of the report will be only restricted to the directionality and the nature of the process that caused the bloodstains. (Perkins). This kind of technique is found to work best with solid or dark colors as color patterns cause interference with the visibility of the stain. Over and above it can be concluded that the infrared reflectance of the fabrics is affected by the composition of the material and the process which are being used to color them. Analysis of Bullet Wipe Patterns on Cloth Targets: A recent study was conducted in order to determine the consistency of a bullet wipe patterns mainly the on cloth targets. This study is conducted for the use of the investigator for analyzing and reconstructing the main procedures in a crime investigation scenario. (Bailey). This study includes several crucial variables like ammunition, the actual distance to the target, and also the angle of impact on the body. The researcher studied the coloration and also measurements of the bullet wipes on the cloths. (Bailey). Importantly enough the effect of the variables tested. Though the bullet wipe patterns are capable of helping the investigators reconstruct the events, yet serious precautions are required while interpreting the bullet wipe patterns. Bullet wipe is a form of a gray or black ring around the boundary of the entry point of the bullet hole. It mainly consists of lubricant, by-products of propellant, and also traces of metal that are being used in the bullet. Any kind of residue in the barrel can also be present. (Bailey). Bullet wipe is also present on lead and full in most cases metal jacketed bullets. Investigators can use these Bullet wipe patterns to carefully reconstruct the sequence of events at a crime scene. It is also used to identify the types of physical evidences that may be present. Lifting Dusty Shoe Impressions from Human Skin: In the August of 2004 at the Arapahoe County Coroner’s Office in Centennial, Colorado some scientific experiments were carried out on a human body. (Adair). At the research center to lift the dust shoe impressions from the human skin an electrostatic dust print lifter (ESDL) was used. (Adair) The Shoe impressions of various qualities were tested with two forms of ESDLs. All the experiments support the use of this particular method for recovering dusty impressions from human skin. Electrostatic dust print lifters (ESDLs) are frequently used in the crime cases for the purpose of lifting the latent and also the patent shoe impressions from different porous and nonporous surfaces. (Adair). Though there are several complexities and brands associated to the configurations of ESDLs in the current scenario, all of them share some common characteristics. ESDLs are used mainly in a high voltage current so as to attract dust particles, which comprises the impression. This process helps in the extraction of imprints from various substrates including metallic sheet film. (Adair) The investigators use a grounding film, plate, or as in some cases a rod nearby the lifting film for acquiring the desired static charge. (Adair) This process is necessary for successfully transferring the impression. These experiments mainly demonstrate that the use of an ESDL which may allow the recovery of latent and patent dusty impressions from human skin. It should also be kept in mind that field processing, before the actual transportation of the body should yield the best results under the circumstances. (Adair) Investigators may the use of this technique to determine imprints in cases of kicking, stomping etc. Developing and Lifting Latent Footwear Impressions: Footwear Impression evidences can a 2-dimensional or a 3-dimensional. The 2-D footwear impressions are that kind of impressions which are usually deposited indoors. (Byrd). These impressions are always found on the top of hard surfaces or some substrates. It has been never observed any kind of footwear impressions on objects like doors, window, tile floors or on the top of items of furniture and most interestingly also not on the chest of a deceased female that was previously believed to have been beaten and stomped to death. (Byrd). It is also a valuable tool for law enforcement. The search, development, and recovery are same as getting back an impression of a latent fingerprint. The same tools and techniques are being used in both forms of recoveries. After development of a latent impression the excess powder have to be removed by blowing on the surface. (Byrd). This necessarily assures a clean lift which lacks air pockets or fish eye. Cyber Scam Artists: Scam Artists have been very popular for many years now. With time and advent of technology the form of these scam artists have changed and they are now called the “online fraudster”. (Fried). The number of citizens is increasing at rapid rate with the passing of each day. As the number of people on the Internet is growing persistently and so are the potential threats and the vulnerabilities associated with the cyber space. The Internet is known to provide a huge lot of information. But it can also be viewed as a place which is breeding the frauds. In a recent study, the Federal Trade Commission had announced that they have formed a database, which will be helpful in identifying the Internet fraud. (Fried). The database is intelligently named as “ConsumerSentinal”. (Fried). With this database the federal government has started to take active steps for helping the investigators to catch those individuals who are attempting to defraud others online. In this process there are many governmental agencies that have formed partnerships with one another. These partnerships have resulted in the formation of a centralized location that takes the complaint of the victims. (Fried). DNA, the Next Generation Technology: Over the past twenty years the most significant changes that are being made in the technology in the analytical (the laboratory for the examination of physical evidence) fields. (Byrd). For any investigator or evidence recovery technician is vital to remain updated with these level ever-changing techniques and methods in technology. The investigators are now more aware and prepared to combat the challenge. The Automated Fingerprint Identification System (AFIS) developed the fingerprint identification system and The National Firearms and Projectile Database (DRUGFIRE) is working on the firearms identification. (Byrd). Similarly now The Combined DNA Index Systems (CODIS) is having an adequate degree of influence on the comparison of blood and other tissue identification. (Byrd) The previous standard serological testing labs are now making way to the new improved Forensic Biology section. It is recent inclusion of the issues of scrutiny and challenge in DNA technology in the laboratory analysis procedures (Byrd). The sensitivity of this newly promoted technology will divert the focus and attention to the on physical evidence study and collection and also the recovery methods and procedures. Optimized Digital Recording of Crime Scene Impressions: In a crime scene the evidence photographer is often challenged with a wide range of difficulties. The duty of the photographer includes the recording of the crucial evidences especially which are in the form of fingerprints, shoeprints, or other impressions and its often problematic. (Dalrymple, Shaw, Woods). It should be noted that in each of these crime scenarios there is a constant potential for extracting more information with the application of a computer technique (subtraction) than was not possible with photography alone. Investigators along with recovery agents should combine these techniques to extract the bet possible solution. Recovery of Latent Prints from Human Skin: Studies by forensic scientists and investigators in the mid-1960s and the 1970s provided a huge base for the recovery of imprints from human body and specially skins in actual homicide incidents. (Sampson, Sampson, 2005). The focus of these studied are directly related to the determination of best possible methods used in order to obtain the prints, without considering the other external factors that can possibly hamper the successful recovery. It led to some vital successes in the mid-1970s as The Miami-Dade Police Department in Miami, Florida, had solved five cases which center on some physical assault or homicide. (Sampson, Sampson). Practical Methods for Processing a Vehicle: It may often happen that in a criminal investigation the crime scene investigator or evidence recovery technician may face the task of analyzing a vehicle or vessel. That vehicle or vessel may not be considered as a primary focus in the investigation process but however it deserves a certain degree of attention. (Sarisky). The primary function of the crime scene investigator or the evidence recovery technician is documenting and collecting the physical evidences. The typical types of evidence that are mostly found in the vehicles will provide much information about the crime committed. After the examination the investigator would note down the information. (Sarisky). A series of photographs of the vehicle is used in this process. The photographs range from the exterior of the vehicle and also of each side and each corner. (Sarisky). The purpose of this kind of organized search is actually to find the objects of verification which are usually not observed during the early examination of the crime scene. Conclusion: It can be seen from the report that the extensive studies that are being done in the field of crime scene investigation have helped the cause to a great extent. There is a lot of researches that are needed to be done after the primary investigation in order to identify the criminal. Apart from the general data these kinds of hidden information do tell the investigators the real story of the crime. References 1. Bessman Carl W, Nelson Elizabeth, Lipert Robert J, Coldiron Shelley, Herrman Terrance. “A Comparison of Cyanoacrylate Fuming in a Vacuum Cabinet to a Humidity Fuming Chamber”. Journal of Forensic Identification Vol. 55, No. 1, (2005). Website : < http://www.crime-scene-investigator.net/CAfumingcabinets.html> (accessed on November 28, 2009). 2. Perkins Michael. “The Application of Infrared Photography in Bloodstain Pattern Documentation of Clothing”. Journal of Forensic Identification Vol. 55, No.( 2005). Website: < http://www.crime-scene-investigator.net/IRbloodstainpattern.html> (accessed on November 28, 2009). 3. Bailey James A.. “Analysis of Bullet Wipe Patterns on Cloth Targets”. ”. Journal of Forensic Identification Vol. 55, No.( 2005). Website: < http://www.crime-scene-investigator.net/IRbloodstainpattern.html> (accessed on November 28, 2009). 4. Sarisky Agnes. N.d. Practical Methods for Processing a Vehicle. Crime-scene-investigator.net. website:< http://www.crime-scene investigator.net/vehicleprocessing.html> (accessed on November 28, 2009). 5. Sampson William C, Sampson Karen L. Recovery of Latent Prints from Human Skin: Journal of Forensic Identification Vol. 55, No. 3, (2005). Website: < http://www.crime-scene-investigator.net/printsfromskin.html> (accessed on November 28, 2009). 6. Adair Thomas W. “Lifting Dusty Shoe Impressions from Human Skin: A Review of Experimental Research from Colorado”. Journal of Forensic Identification Vol. 56, No. 3, (2006). Website: < http://www.crime-scene-investigator.net/ShoeImpressionSkin.html> (accessed on November 28, 2009). 7. Byrd Mike. 2001. Developing and Lifting Latent Footwear Impressions: Crime-scene-investigator.net. website:< http://www.crime-scene-investigator.net/2dfootwear.html> (accessed on November 28, 2009). 8. Fried Robert ,B. N.d. Cyber Scam Artists: A new kind of .con: Crime-scene-investigator.net. website:< http://www.crime-scene-investigator.net/CyberScam.pdf> (accessed on November 28, 2009). 9. Byrd Mike . 1999. DNA, The Next Generation Technology is Here!: Crime-scene-investigator.net. website:< http://www.crime-scene-investigator.net/dna.html> (accessed on November 28, 2009). 10. Dalrymple Brain, Shaw Len, Woods Keith. Optimized Digital Recording of Crime Scene Impressions: Journal of Forensic Identification Vol. 52, No. 6, (2002). Website: < http://www.crime-scene-investigator.net/DigitalRecording.html> (accessed on November 28, 2009). Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(Investigation Techniques Essay Example | Topics and Well Written Essays - 2250 words, n.d.)
Investigation Techniques Essay Example | Topics and Well Written Essays - 2250 words. https://studentshare.org/law/1729759-investigation-techniques
(Investigation Techniques Essay Example | Topics and Well Written Essays - 2250 Words)
Investigation Techniques Essay Example | Topics and Well Written Essays - 2250 Words. https://studentshare.org/law/1729759-investigation-techniques.
“Investigation Techniques Essay Example | Topics and Well Written Essays - 2250 Words”. https://studentshare.org/law/1729759-investigation-techniques.
  • Cited: 0 times

CHECK THESE SAMPLES OF Investigation Techniques

Surgical Site Infections

Surgical Site Infections (Name) (University) (Course) (Tutor) (Date) Surgical type infection refers to a kind of healthcare- associated infection in which a wound infection occurs after a surgical procedure.... The infections vary from a limited wound discharge to a life threatening postoperative complication for instance a sternal infection after an open heart surgery....
3 Pages (750 words) Essay

The Earths Origin - Creationism and Evolutionism

His Investigation Techniques entailed interviewing adept scholars who possessed extensive knowledge on creationism and evolutionism.... Name: Instructor: Course: Date: Creation vs.... Evolution Throughout the years, humans have struggled with finding a single, plausible explanation with regards to earth's origin creating a rift between proponents of creationism and their opponents who favor evolutionism....
6 Pages (1500 words) Essay

The Jerry Watson 30 year old murder case

The initial investigation also revealed that car belonging to victim was stolen.... (30-Year-Old Murder Solved, nd) Initial investigation The investigating team processed finger and palm prints collected from the victim's bathroom.... The Jerry Watson 30-Year Old Murder Case Institution name: Abstract FBI has published a report on 11 Sep....
5 Pages (1250 words) Research Paper

The Investigation of an RTF Virus

RTF virus has claimed the lives of many people around the world.... The Asian countries are the ones that are affected more by this virus.... This is a sexually transmitted disease and many people have lost their lives.... People are not aware of the virus and its vulnerability.... hellip; The lack of awareness creates panic among the people since most of the people affected by this virus lose their lives....
8 Pages (2000 words) Essay

Creation of Federal Bureau of Investigation

Hoover led to innovations in the Bureau, such as creation of scientific laboratories to investigate crime, as well as, the FBI academy to train policemen on Investigation Techniques.... With countless issues in the… An increase in the need to control the society as well as acquire tangible evidence on crimes committed, science was incorporated into crime investigation.... Access to fingerprints would only be Federal Bureau of investigation (FBI) Creation of FBI The Federal Bureau of investigation (FBI) has its roots on the advent of the Reform Era in U....
1 Pages (250 words) Coursework

Criminal Investigations

Fishers techniques of crime scene investigation.... In the past, low burglary clearance rate has… This has delayed many cases as the investigators fail to find convincing proof that a person was involved in a crime. Increasing the effectiveness of the police in investigations has been noted as a rule to improve the clearance rates Investigating Burglary Investigating Burglary The process of making follow up in a burglary case is becoming a concern to the police investigation department....
1 Pages (250 words) Essay

Freedom of Information and Privacy

k/blogs/private-investigator/how-private-investigation-techniques-can-help-businesses/workplace-fraud-Misuse of Public Funds.... The private organization in this case will be more alert as it will be aware that now it is dealing directly with the government other than any other private information collecting company (Workplace fraud - how private investigation companies can help, 2012).... ReferencesWorkplace fraud - how private investigation companies can help....
2 Pages (500 words) Essay

Government Police and Justice Act 2006

"Government Police and Justice Act 2006" paper outlines the offenses which it could be argued have been committed under the Computer Misuse Act 1990 and the Police Justice Act 2006 and applies the law relating to the offenses you have already outlined to the incidents involving Michael.... nbsp; … In a report in The Register 8th November 2006, a man who hacked a dating site and defaced the site as well as sending out mass emailing worms was fortunate enough to be able to avoid a custodial sentence....
9 Pages (2250 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us