Chapter
Principles of Forensic Science
What Is Forensic Science?
The Trace as the Basic Unit of Forensic Science
Forensic Classification of Evidence
Methods of Classification
Forensic Approaches to Classification
Uniqueness and Individualization
Relationships and Context
Interpretation/The Comparative Method
Analogy and Comparison within a Forensic Process
The Comparative Method within Forensic Science
Digital Imaging and Photography: An Overview
History of Images in Forensic Science
Technical Photography versus Creative Photography
The “Point-and-Shoot” Digital Camera
Scientific Working Group on Imaging Technology
Admissibility in Court of Digital Photo Images
Mobile Phone Network Technology
Mobile Phone Hardware Components
Subscriber Identity Module
The Mobile Phone Forensics Hierarchy
Seizing and Handling Cell Phones
Mobile Phone Forensic Tools
Digital Imaging: Enhancement and Authentication
Digital Imagery: Legal Constraints
Digital Image Enhancement
Digital Image Authentication
Digital Image Enhancement Techniques
Brightness and Contrast Adjustments
Lens Distortion Correction
Digital Light Field Cameras
Digital Image Authentication Techniques
Discrete Cosine Transform Coefficients
Photo-Response Nonuniformity
Audio Enhancement and Authentication
Competency and Proficiency
Forensic Audio Enhancement
Critical Listening and Analysis
Preparation of Output File
Forensic Audio Authentication
Analog Tape Authentication
Digital Audio Authentication
Analysis of Digital Evidence
Digital Evidence Life Cycle
Digital Evidence Process Model
Digital Evidence Artifacts
Aircraft Flight Data Recorders
Adversary versus Technical Truth
Single versus Multiple Causes
Approximate versus Proximate Cause
Role of Evidence in Establishing Truth
Digital versus Analog Evidence
Evolution of Recording Processes
Installed Location of FDRs
Underwater Locator Beacons
Public Access to Voice Recordings
Current Recorder State of the Art
Cultural Repercussion of Recorders
Expanded Employment of Recorders
Electronic Data Recorders (Black Boxes)
Background of Electronic Data in Ground Vehicles
Retrieving ECU NVRAM Data for Use in Crash Investigations
Method 1: Via a vehicle serial data link communication path to the vehicle diagnostic communication port
Method 2: Via a serial data link communication path connected via a direct umbilical cable to the target ECU
Method 3: Via a direct umbilical to the EEPROM component on the printed circuit board within the EDR assembly
The Use of ECU NVRAM Data in Crash Investigations
Analog Tachograph Chart Analysis
The Forensic Use of Tachograph Data
The Tachograph Instrument
The Principles of Chart Analysis
The Accuracy of the Speed Record
Calibration Checks on the Tachograph Installation
The “Route Trace” Method of Calibration
Problems of Interpretation
Response of the Instrument
Falsifications and Diagnostic Signals
History of the Forensic Examination of Documents
The Peter Weinberger Case
The Mormon Forgeries and Murders
The Howard Hughes “Mormon Will” Case
The Jon Benet Ramsey Case
Overview of Forensic Document Examination
What Is a Forensic Document Examiner?
What Are the Duties of an FDE?
Types of documents examined
The Origins of Modern Forensic Document Examination
The development of the discipline
Establishing formal training programs
Qualifications of Modern FDEs
Posttraining Qualifications
Error rates and skill–task assessments
Other mechanisms for professional development and continuing education
Digital image analysis techniques
Gas chromatographic techniques
Liquid chromatographic techniques
Inks and Writing Instruments
Commercially Printed Documents
Handwriting and Signatures
Computer-Printed Documents
Ink-Jet and Laser Printers
Glues, Tapes, and Paper Fasteners
The Nature of Documents Used for Deceit
Combating Counterfeit and Forged Documents
Document Security Features
Theoretical Basis for Handwriting Comparison
Why Does One Believe Handwriting Can Be Used as an Individuating Feature?
Handwriting Comparison Method
Examination of Questioned Writing
Examination of Known Writing
Signature Comparison Method
Un-natural Handwriting Behaviors
Examination of Nonoriginal Writing
Recent Research in Handwriting Comparisons
Composition of Major Types of Writing Inks
Fiber- or Porous-Tip Pen Inks
Ink Comparisons and Identifications
First Date of Production Method
Relative Age Comparison Methods
Time-Dependent Degradation of Ink Dyes
Paper Manufacturing Process
Forensic Examination of Paper
Genuine Currency Substrates
Genuine Currency Printing Processes
Applied Security Features
Physical Examination with Light Sources
Physical Examination with Microscopy
Halftone offset lithography
Bleached Currency Examinations
Chemical and Instrumental Examinations
Identity Related to Biometrics
Forensic Properties of Verification and Identification Systems
Examples of Identity Fraud (Skimming, Wrong Persons in Prisons, Banking Fraud, and Spoofing) and Relating Them to Other Art ...
Forensic Accounting for Criminal Investigations
Forensic Accounting Tools
Surveillance and Investigation Tools
Forensic Accounting for Civil Litigation
Forensic Accounting to Discover Hidden Assets
Payment Cards and Criminal Activity
Counterfeit Signature Panels
Counterfeit Magnetic Stripes
Counterfeits as an Insight to Classification
Integrated Case Management
Forensic Laboratory Reports
Contents of a Report—A “Science” Standard
Contents of Report: Legal Standards
Reports: Stand-Alone Evidence or Support for a Testifying Expert
Ethical Considerations and Forensic Reports
Occupational Health and Safety Policy
Hierarchy of Control Measures
Specific Laboratory Hazards
Computer Forensics Laboratory
High-Intensity Light Sources
General Laboratory Management
Handling of Exhibits in Court
Chemical, Biological, Radiological, and Nuclear Incidents
Potential Hazards during an Overseas Deployment
Typologies of Child Pornography
Digital Child Pornography
User-Generated Content and Sexting