0% found this document useful (0 votes)
18 views16 pages

Carbon Nano Particles Assignment

Carbon nano particles

Uploaded by

Bushra Akram
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views16 pages

Carbon Nano Particles Assignment

Carbon nano particles

Uploaded by

Bushra Akram
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

“Applications of Forensic Sciences”

Class;

Bs.Chemistry (7th reg)

Submitted To;

Mr. Murtaza

Submitted By;

Group #01

Sana Yaseen (CHEM51BF21R042)

Ayesha Chuhdary(CHEM51BF21R021)

Kainat Tariq(CHEM51BF21R024)

Farzana Kanwal(CHEM51BF21R012)

Ayesha Javed(CHEM51BF21R020)
Table of Contents
1. Criminal investigation
• Crime scene investigation (CSI)
• DNA profiling
• Ballistics and firearm analysis
• Fingerprint analysis
• Forensic Pathology
2. Toxicology and Drug detection
• Forensic toxicology
• Drug identification
3. Forensic Anthropology
• Human remains identification
• Mass disaster investigation
4. Digital and Cyber Forensics
• Computer forensic
• Network and cybercrime analysis
• Mobile device forensic
5. Forensic Psychology and Psychiatry
• Criminal profiling
• Competency evaluation
• Assessing mental state
6. Forensic Odontology
• Bite marks analysis
• Dental identification
7. Forensic Entomology
• Time of death investigation
• Environmental impact and pollution
8. Forensic Accounting
• Financial fraud investigation
• Asset tracing and recovery
9. Forensic Document Examination
• Handwriting analysis
• Forgery detection
• Ink and paper analysis
10. Forensic Engineering
• Accident reconstruction
• Product liability cases
• Automobiles safety
11. Forensic Linguistics
• Text and speech analysis
• Voice identification
12. Environmental Forensic
• Pollution source identification
• Oil spill and hazardous waste investigation
13. Forensic Serology
• Bloodstain pattern analysis(BSP)
• Body fluid identification
14. Forensic Archeology
• Burial site analysis
• Historical investigation
15. Wildlife Forensic
• Poaching investigation
• Illegal trafficking
Forensic Science
“Forensic science is a multidisciplinary field in which we use different scientific methods or
expertise to investigate crimes or examine evidence that might be presented in a court of law.”

Forensic science comprises a diverse array of disciplines, from fingerprint and DNA analysis to
anthropology and wildlife forensics. It involves collecting, preserving, analyzing, and
interpreting evidence to assist in legal proceedings and criminal investigations. Forensic science
encompasses a wide range of disciplines, such as biology, chemistry, physics, and digital
forensics, to solve crimes, identify individuals, determine causes of death, and resolve civil and
environmental issues.

Key aspects of forensic science include:

Crime Scene Investigation: Collecting and documenting evidence at crime scenes.

Laboratory Analysis: Examining physical evidence like DNA, fingerprints, blood samples, and
trace materials.

Expert Testimony: Presenting scientific findings in court to support legal cases.

Multidisciplinary Approach: Involving specialists from various fields like forensic pathology,
toxicology, digital forensics, and anthropology.

Its applications span a wide range of fields, from criminal justice to civil law, public safety, and
even environmental protection.

01- Criminal Investigation


1) Crime Scene Investigation (CSI):
➢ Forensic science is fundamental in collecting, analyzing, and interpreting
physical evidence found at crime scenes.
➢ This includes blood spatter analysis, fingerprinting, and the collection of
DNA, fibers, blood, saliva, nail, hair and trace evidences.
2) DNA Profiling:
➢ Used to identify individuals involved in crimes through biological samples
(blood, hair, saliva, etc.).
➢ DNA evidence is especially crucial in sexual assault, homicide, and cold
cases.
3) Ballistics and Firearms Analysis:
➢ Involves matching bullets, casings, and firearms to establish connections
between suspects and shootings.
➢ This includes trajectory analysis (angle and direction of weapon )
➢ Gunpowder residue testing.
4) Fingerprint Analysis:
➢ Comparing latent fingerprints found at crime scenes to those in databases to
identify suspects.
5) Forensic Pathology:
➢ Used in determining the cause and manner of death in homicides or
suspicious death.
➢ Autopsies provide vital information about time of death, injuries, and the use
of weapons.

Tools/ Techniques Used in CSI;


i. DNA Fingerprinting;
➢ DNA is extracted from blood, saliva, hairs and skin cells and is compared with
Database to identify the suspect.
ii. Fingerprint Analysis;
➢ Fingerprints are collected from crime scene by using dusting powder or digital
imaging to identify suspects and link them to location and time of the crime
scene.

iii. Gunshot Residue Analysis


➢ Trajectory Analysis to connect shooting to suspect
➢ Rifling marks on Bullets to identify the type of weapon used.
Case Study;
The Murder of Leanne Tiernan

Background: In November 2000, 16-year-old Leanne Tiernan disappeared while walking home
from a shopping trip in Leeds, England. Despite extensive searches, there were no leads for nine
months. In August 2001, her body was discovered in a shallow grave in remote woodland, 16
miles from her home.

Forensic Evidence and Techniques Used:

1. Crime Scene Investigation and Initial Clues;

- The plastic bags used to cover her head.

- The dog collar and twine used to bind her.


- Duct tape from her face.
2. Trace Evidence Analysis

-The dog collar and twine provided important clues. The twine was identified as a specialized
type used in packaging by certain industries. This narrowed down possible suspects who had
access to such materials.

- Pet hair found on the body was analyzed. Forensic scientists determined that the hairs did not
belong to Leanne’s own pets. This suggested she had been in contact with someone else’s
animals.

3. DNA Profiling from Dog Hair

Investigators were able to recover DNA from dog hairs on Leanne’s body and clothing. By
comparing the DNA from these hairs with samples taken from dogs in the area, they were able to
link the hairs to a dog owned by John Taylor, a local man with no previous criminal record.

4. Plastic Bag Tracing

Forensic scientists traced the plastic bags used to cover Leanne’s head to a batch produced by a
specific company. This company only supplied its products to a limited number of businesses,
one of which was a bread company that Taylor had worked for as a delivery driver. This placed
Taylor in possession of the bags used in the crime.

Conclusion: The murder of Leanne Tiernan was solved largely due to the innovative use of
forensic science, including DNA profiling, fiber analysis, and dog hair analysis.
02- Toxicology and Drug Detection
1) Forensic Toxicology;
➢ Analyzing body fluids and tissues of the victim to detect the presence of
drugs, alcohol, poison and toxins.
2) Drug Identification;
➢ Identify illicit drugs and controlled doses of drugs in medicines and
syrups.

Cases;
• DUI (Driving under influence)
• Drug overdose
• Poisoning incidents

Techniques
a. Gas Chromatography –Mass Spectrometry (GC-MS);
➢ Used for detection of drugs in blood , urine and hair samples
b. High performance liquid Chromatography (HPLC);
➢ Used for detection of heat sensitive and non-volatile drugs from samples.
c. Immunoassays;
➢ Initial screening for drugs in blood samples.
d. Hair Analysis;
➢ Used for detection of chronic drug use that is incorporated in hairs.

Case Study;
The Murder of George Markov – Assassination by Poison

Background: George Markov was a writer and journalist living in London during the 1970s.
Known for his outspoken criticism of Bulgaria’s communist government, Markov became a
target of the Bulgarian secret services. On September 7, 1978, he was attacked in London in a
case that would later become one of the most infamous examples of assassination using poison,
solved through forensic toxicology.

The Incident: While waiting at a bus stop, Markov felt a sudden sharp pain in his leg. He turned
around and saw a man picking up an umbrella from the ground. The man quickly apologized and
left the scene. Initially, Markov thought little of the incident, but later that evening, he developed
a high fever and was admitted to the hospital. His condition rapidly deteriorated, and within three
days, he was dead.
Investigation and Conclusion: Forensic toxicologists analyzed the pellet and found two small
holes drilled into it, which indicated it had been designed to release a toxic substance. Further
toxicological analysis revealed that the pellet contained traces of ricin, a deadly poison derived
from castor beans. Ricin works by inhibiting protein synthesis in cells, causing cell death and
ultimately leading to organ failure. It is lethal even in tiny amounts, and at the time, there was no
known antidote.

03- Forensic Anthropology


1) Human Remains Identification;
➢ Identification of burned, decomposed, ancient and damaged bodies to
estimate their age, sex, race and stature.

Cases;

• Natural Disasters
• Plane Crashes
• Cold cases
• Terrorist attacks

Techniques Used;
a. Osteometry;
Measurement of bones is done to determine shape, size and connection of bones which leads
to individual’s height, age and sex.
b. Craniofacial Reconstruction;
3D imaging software is used to reconstruct the face from the skull.
c. DNA analysis;
Extraction and analysis of DNA from teeth and bones.
d. Radiographic Techniques;
Use of X rays and CT scans to detect trauma, shape and structure of bones.

Case Study;
The Identification of Josef Mengele – The "Angel of Death"

Background: Josef Mengele, a notorious Nazi doctor, conducted cruel experiments on prisoners
during World War II. After the war, he reportedly drowned in Brazil in 1979, but his remains
were not positively identified at the time. Decades later, forensic anthropologists were called
upon to help verify whether the remains buried under the name “Wolfgang Gerhard” were
actually Mengele.

Forensic Anthropological Investigation: Investigators exhumed the skeletal remains buried


under the name "Wolfgang Gerhard" Brazil. The remains were incomplete, but there were
enough bones to begin the identification processes. Forensic anthropologists began osteological
analysis by studying the physical characteristics of the remains. They measured the skull and
compared it with photographs of Josef Mengele. Using craniofacial superimposition, a
technique where photos of the skull are overlaid with known photographs of Mengele,
anthropologists found a strong match. The DNA was compared with samples from Mengele’s
living relatives, and it confirmed that the remains were those of Josef Mengele.

Conclusion: Forensic anthropology played a vital role in identifying the remains of Josef
Mengele, one of the most wanted Nazi war criminals. The combination of osteological analysis,
craniofacial superimposition, dental record comparison, and DNA testing confirmed that the
body buried under an alias in Brazil was indeed Mengele.

04- Digital and Cyber Forensics


Collecting, preserving, analysis and presenting electronic evidence from digital devices in a
way that is legally admissible .It involves solving crimes that involve computers ,mobile
devices and networks
1. Identification:
➢ Identify potential source of digital evidence. For example Computer
,Mobile phones, Servers, Cloud storage and social media accounts
2. Preservation:
➢ Digital evidence must be preserved without alteration. Investigators
create exact copies (images)of data using specialized software to ensure
that original data is not tempered with. Maintaining its integrity for court
use.
3. Analysis:
➢ Recovering deleted files or hidden data.
➢ Analyze logs to track user activities.
➢ Identify malware or unauthorized access. Examining image, text
messages or internet activity.
➢ Track crypto currency transactions
4. Interpretation:
➢ Analyze technical data to produce a clear and understandable narrative of
crime.
➢ Experts interpret data to understand how crime was committed, who was
involved and what actions were taken.
5. Preservation:
➢ Findings are presented in court. Forensic examiners often provide expert
testimony and ensures that the methods used to collect and analyse the
evidence are legally sound.
Types of digital crimes;
• Cybercrimes: Hacking ,data breaching, Ran somewhere attacks.
• Fraud: online financial Scams, Identity theft, Credit card fraud.
• Intellectual property theft : Stealing trade secrets, copyrighted material
• Child exploitation: Investigating illegal content related to child abuse.
• Terrorism and organised crime: Tracking communications and financial
transactions.
Tools used;
a. Encase: Tool for examining hard drives.
b. FTK (forensic tool kit): Software used to analyse data, Recover files and identify
encrypted files.
c. Wire shark network protocol analyzer used to capture and examine network traffic.
d. Cellebrite: Devices to extract data from phones.
e. Autopsy : open source software for hard drive and mobile phone analysis.

05- Forensic Psychology and Psychiatry


1. Criminal Profiling:
➢ Forensic psychologists analyze behavioral patterns to help law
enforcement narrow down suspects in criminal cases, often in serial
offenses.
2. Competency Evaluations:
➢ Forensic psychologists and psychiatrists assess whether a defendant is
mentally fit to stand trial, plead guilty, or understand court proceedings.
3. Assessing Mental State:
➢ In cases involving insanity pleas, forensic psychiatrists evaluate the
mental state of the defendant at the time of the crime.
06- Forensic Odontology
1. Bite Mark Analysis:
➢ Forensic odontologists examine bite marks on victims or objects to match
them with a suspect’s dental profile.
2. Dental Identification:
➢ Often used in disaster victim identification, forensic odontologists can
identify victims through dental records, particularly when the body is
severely decomposed or burned.
07- Forensic Entomology
1. Time of Death Estimation:
➢ Forensic entomologists study insect activity on decomposing bodies to
estimate the post-mortem interval (PMI) or time since death.
2. Environmental Impact and Pollution:
➢ In some cases, forensic entomologists can be involved in environmental
investigations, using insects as bioindicators of ecological damage or
pollution.

Cases;

• Accidental Death Investigations


• Estimating the Season of Death
• Cases of Buried or Submerged Bodies

Tools\ Techniques;

1. Insect Life Cycle Analysis (Developmental Method); To estimate the time since death
(PMI) based on the life cycle stages of insects, primarily flies.
2. Temperature and Environmental Monitoring; To accurately model the growth rate of
insects and their life cycles, environmental conditions like temperature, humidity, and sun
exposure must be considered, as they significantly affect insect development.
3. DNA Analysis of Insects; To accurately identify insect species or analyze the contents
of insects feeding on decomposed tissues to detect drug use, toxins, or pathogens

Case;
Description; Jessica, a 9-year-old girl, was reported missing. Her body was found 17
days later.
Forensic Entomology Investigation: Forensic entomologist, analyzed insect activity:
1. Maggot collection: Collected maggots from Jessica's body.
2. Species identification: Identified blowfly species
3. Growth analysis: Determined maggot growth stages.
4. Temperature analysis: Correlated maggot growth with environmental temperatures.
Key Findings:
1. Estimated post-mortem interval (PMI): 10-14 days.
2. Insect activity indicated Jessica's body was moved.

08- Forensic Accounting


1. Financial Fraud Investigations:
➢ Forensic accountants investigate white-collar crimes such as
embezzlement, money laundering, insurance fraud, and corporate fraud
by examining financial records and transactions.
2. Asset Tracing and Recovery:
➢ Helps in civil cases and divorce proceedings by tracking hidden assets,
offshore accounts, and financial discrepancies.
Techniques:
• Transaction analysis
• Asset tracing
• Financial profiling
• Digital forensics
• Data visualization software

09- Forensic Document Examination


1. Handwriting Analysis:
➢ Used to verify the authenticity of signatures or handwritten documents,
often in cases of forgery, wills, and financial documents.
2. Forgery Detection:
➢ Involves identifying alterations, counterfeit currency, or fraudulent
documents through the analysis of inks, papers, and printing techniques.
3. Ink and Paper Analysis:
➢ Used to establish the authenticity of documents by analyzing the
composition of inks and the age of the paper.

Cases;
• Forgery and Fraud
• Questionable Wills and Estate Disputes
• Contract Disputes
• Identity Theft Cases
• Historical Document Authentication
• Threatening Letters or Anonymous Communication
• Banking and Financial Crimes
• Medical or Insurance Fraud
• Election Fraud

Case Study;
Description: John is a 35-year-old male, is suspected of sending threatening letters to a local
business owner.
Evidence:
1. Three threatening letters received by the business owner.
2. A writing sample from John employment application was taken.
Handwriting Analysis: Comparison of the questioned letters and the known writing sample
reveals similar letterforms: "a" and "d" are written with distinctive loops. Consistent spacing
and alignment. Identical slant and stroke direction.
Paper Analysis:
Fiber analysis: Both the questioned letters and the writing sample contain identical cotton
fibers.
Watermark examination: The paper used for the threatening letters matches the watermark
on John employment application.
Ink Analysis:
Chemical composition: The ink used in the threatening letters matches the ink used in John
writing sample.
Color and intensity: The ink color and intensity are consistent across all samples.
Conclusion: Based on the handwriting, paper, and ink analysis, it is highly probable that
John Doe wrote the threatening letters. Statistically John is convicted of sending threatening
letters.

Tools:
1. Optical comparison microscopy.
2. Scanning electron microscopy (SEM).
3. Raman spectroscopy

10- Forensic engineering:


It is the application of engineering principles and science used in the investigation of failure,
more specifically the failure of machine.

1. Forensic accident reconstruction:


➢ Forensic accident reconstruction utilizes forensic investigation techniques
to determine what occurred during accident.
➢ technique used; This area of investigation uses computations
engineering ,math ,physics and photogrammetry.
➢ case study: Post tree impact structural evaluation.
2. Product liability cases:
➢ Forensic engineers determine faulty products materials or systems that cause
accident or injuries especially in cases involving defective consumers product
or industrial equipment.
➢ example: If your vehicle veered off the roadway because of faulty steering
,you would have product liability claim only if you can show evidence.
➢ case study: MC Donald's coffee
11- Forensic linguistics:
Application of linguistics, the science that studies human language, to solve forensic
problem.
1. text and speech analysis:
➢ Forensic linguistics analyse the return or spoken language to identify
authorship authenticity threatening letters and legal contracts.
➢ Techniques involved: Ocr optical character recognition and computer
program identity are used.
➢ Case study: Forensic linguistic help solved the Ana bomber case.
2. Voice identification:
➢ Used to match the voice recordings to suspect, particularly in case involving
ransom, calls, fraud or cybercrimes.
➢ Technique involved: Virtual assistant, Siri ,Alexa and Google virtual
assistant all implement voice recognition software to interact with users.
➢ Criminal voice recording could be compared with suspects police interview
recording.
12- Environmental forensics:
If the scientific study of contaminants in environment with the specific view to identifying
their source, there enhancement about background or baseline condition etc.
1. Pollution source identification:
➢ Environmental forensics scientists identify soil ,water and air contamination
source and identify illegal waste dumping or industrial pollution.
➢ techniques involved: geochemistry ,isotopes tracing, numerical modeling
and gas spectrometry etc.
2. Oil spills and hazardous waste:
➢ Environmental forensics is used to identify the source of spills or illegal
disposal of hazardous materials ,often for regulatory enforcement or legal
cases.
➢ Techniques involved: CGC and MS are used for oil spill identification .
➢ Corrosivity, reactivity and toxicity for hazardous waste identification.
➢ Case study: Challenges with illegal dumping elimination in the community
of Santa Rita.
13- Forensic serology
Forensic serology is the study of body fluids like blood, semen, saliva, urine and vaginal
secretion.
1. Body fluids identification
➢ It helps us detecting and analyzing fluids like blood, semen, saliva in sexual
assault or violent crime investigation.
2. Bloodstained pattern analysis;
➢ Use to interpret the type, direction and force at the crime scene, to reconstruct
the events of violent crime

Cases;

• Hits and run cases


• sexual assault
• suicide
• poising and drug overdoses
• Mass disaster
• Cold cases
• Robbery
• Domestic violence

Techniques;
a. Kestle meyer test; For visible stain, Solution of phenolphthalein along with hydrogen
peroxide is applied , bright pink color indicate the presence of blood.

b. Luminol test; Lumino reacts with satin, if blood is present it will glow which can be seen in
darkness.

c. Precipitation test; Precipitation test identifies the presence of protein, that indicates it is a
human blood.

14- Forensic Archeology


Forensic archeology is a subfield of archeology that use archeological principles , method
and techniques which help us in criminal investigation , locate and recover human remains,
disaster response, analyze skeletal remains, reconstruct crime scene and recovery of
historical crime scene.
1. Burial site analysis
➢ Forensic archeologist helps us in locating, excavating and analyzing
clandestine in human rights investigation or missing person cases.
2. Historical investigation
➢ In some cases, forensic archeology is used in historical contexts such as
examining ancient remains or artifacts to solve the mysteries about past
civilization or individual.
Cases;
• Criminal wali like green River killer case
• Mass disaster like titanic sinking
• Historical mysteries
• Environmental and cultural heritage.

Techniques;
a) Group penetrating radar ( GPR);
There is sensor in this device which indicates the presence of skeleton with the
help of this device archeologist found the Skeleton.
b) Hand excavation
c) Drone
d) Aerial photography
15- Wildlife forensic
➢ It applies scientific principle to investigate wildlife related crime such as wildlife
trafficking, habitat destruction, endangered species exploitation, species
identification, cause of death analysis and conservation of biology.
1. Poaching investigation;
➢ Forensic scientist analyzes biological evidence from poached animal to
identify the species, their origin and method of killing, often working with
wildlife agencies .
2. Illegal trafficking;
➢ Forensic method help detect the illegal trade of endangered species and
animals product such as Ivory and animals pelts.

Cases;
• poaching like capturing or hunting wildlife illegally
• Smuggling like transportation wildlife or products illegally
• Trading like selling or buying wildlife illegally

Techniques;

a) Toxicology Testing; To detect the presence of poisons, toxins, or drugs in wildlife


species, often in cases of poisoning or illegal hunting.
b) Camera Trapping and Remote Sensing; To monitor wildlife populations, detect
poaching activity, and gather evidence in wildlife crime investigations.
c) Radiocarbon Dating; To determine the age of wildlife products like ivory or bone, and
assess whether they were obtained legally (e.g., before or after the implementation of
protective laws).

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy