scholarly journals Explosion-related deaths: An overview on forensic evaluation and implications

Author(s):  
Nicola Galante ◽  
Lorenzo Franceschetti ◽  
Sara Del Sordo ◽  
Michelangelo Bruno Casali ◽  
Umberto Genovese

Abstract Purpose Explosion-related deaths are uncommon events which require expertise and confidence so that an appropriate death investigation can be performed. The present study aims to provide a detailed forensic analysis of the issues and implications arising in the event of an explosion. Methods A retrospective review of casualty data was conducted on electronic literature databases. Cases concerning deadly explosions registered at the Milan Institute of Legal Medicine were examined and analyzed altogether. Results Explosions may involve closed or open systems. A security assessment of the site is always necessary. Alterations of the site due to rescue procedures can occur; thus, on-site forensic investigation should be adapted to the environment. Then, a study protocol based on autopsy procedures is presented. Application of the postmortem radiology enforces forensic procedures both for the analysis of blast injuries and skeleton fractures, and for identification purposes. Blast injuries typically cause lacerations of the lungs, intestine and major vessels; moreover, hyoid fractures can be documented. Histopathology may help to define blast injuries effectively. Forensic chemistry, toxicology and ballistics provide useful investigative evidence as well as anthropology and genetics. Different forensic topics regarding explosions are discussed through five possible scenarios that forensic pathologists may come across. Scenarios include self-inflicted explosion deaths, domestic explosions, work-related explosions, terrorist events, and explosions caused by accidents involving heavy vehicles. Conclusion The scenarios presented offer a useful instrument to avoid misinterpretations and evaluation errors. Procedural notes and technical aspects are provided to the readers, with an insight on collaboration with other forensic experts.

2016 ◽  
Vol 50 (1) ◽  
pp. 3-19 ◽  
Author(s):  
Rajchada Chanajitt ◽  
Wantanee Viriyasitavat ◽  
Kim-Kwang Raymond Choo

2011 ◽  
Vol 3 (3) ◽  
pp. 1-18 ◽  
Author(s):  
John Haggerty ◽  
Alexander J. Karran ◽  
David J. Lamb ◽  
Mark Taylor

The continued reliance on email communications ensures that it remains a major source of evidence during a digital investigation. Emails comprise both structured and unstructured data. Structured data provides qualitative information to the forensics examiner and is typically viewed through existing tools. Unstructured data is more complex as it comprises information associated with social networks, such as relationships within the network, identification of key actors and power relations, and there are currently no standardised tools for its forensic analysis. This paper posits a framework for the forensic investigation of email data. In particular, it focuses on the triage and analysis of unstructured data to identify key actors and relationships within an email network. This paper demonstrates the applicability of the approach by applying relevant stages of the framework to the Enron email corpus. The paper illustrates the advantage of triaging this data to identify (and discount) actors and potential sources of further evidence. It then applies social network analysis techniques to key actors within the data set. This paper posits that visualisation of unstructured data can greatly aid the examiner in their analysis of evidence discovered during an investigation.


Author(s):  
Jim Fraser

‘Crime scene management and forensic investigation’ shows how the actions of investigating officers at a crime scene can affect the availability and efficacy of forensic tests later in the investigation. The purpose of crime scene management is to control, preserve, record, and recover evidence and intelligence from the scene of an incident in accordance with legal requirements and to appropriate professional and ethical standards. Any items removed from a scene by investigators must be packaged and labelled correctly to prevent contamination and minimize damage. Once forensic analysis begins, it is essential to consider the investigative implications of actions and decisions. It is sometimes more effective, quicker, or convenient to bring the specialist to the crime scene.


2003 ◽  
Vol 97 (1) ◽  
pp. 147-150 ◽  
Author(s):  
Simo Salminen

This study examined the seriousness of traffic accidents that happened either on work errands or during commuting. The article was based on three independently gathered data sets, of which two were based on compensation claims to the insurance companies ( N = 2,050 and N = 17,108) and one on the interviews of victims ( N = 328). The traffic accidents at work led to a major injury or death more often than the commuting accidents. On the other hand, the work-related traffic accidents were less serious than the leisure-time traffic accidents. One explanation could be that heavy vehicles used during the working hours protected the drivers of these vehicles.


2015 ◽  
Author(s):  
Thomas Sloan ◽  
Julio Hernandez-Castro

Steganography is the art and science of concealing information in such a way that only the sender and intended recipient of a message should be aware of its presence. Digital steganography has been used in the past on a variety of media including executable files, audio, text, games and, notably, images. Additionally, there is increasing research interest towards the use of video as a media for steganography, due to its pervasive nature and diverse embedding capabilities. In this work, we examine the embedding algorithms and other security characteristics of several video steganography tools. We show how all feature basic and severe security weaknesses. This is potentially a very serious threat to the security, privacy and anonymity of their users. It is important to highlight that most steganography users have perfectly legal and ethical reasons to employ it. Some common scenarios would include citizens in oppressive regimes whose freedom of speech is compromised, people trying to avoid massive surveillance or censorship, political activists, whistle blowers, journalists, etc. As a result of our findings, we strongly recommend to cease any use of these tools, and to remove any contents that may have been hidden, and any carriers stored, exchanged and/or uploaded online. For many of these tools, carrier files will be trivial to detect, potentially compromising any hidden data and the parties involved in the communication. We finish this work by presenting our steganalytic results, that highlight a very poor current state of the art in practical video steganography tools. There is unfortunately a complete lack of secure and publicly available tools, and even commercial tools offer very poor security. We therefore encourage the steganography community to work towards the development of more secure and accessible video steganography tools, and make them available for the general public. The results presented in this work can also be seen as a useful resource for forensic examiners to determine the existence of any video steganography materials over the course of a computer forensic investigation.


2019 ◽  
Vol 13 (1) ◽  
pp. 162-177
Author(s):  
Yamir Alexander Arévalo Ortega ◽  
Sonia Rocio Corredor Vargas ◽  
Gustavo Adolfo Higuera Castro

Currently, the use of mobile terminals is becoming a necessity for a high number of people around the world which has driven the development of devices with Android operating system; In addition to this, the same indiscriminate access to resources of internet and weak local and international regulations on the use, they have become vulnerable to attacks on the network - injection of malware, ransomware-, among many others. Therefore, this article reviews the hacking tools for the forensic investigation of mobile terminals, proposing from the documentary research a forensic information acquisition model to determine tangible and significant evidences as a probative material.


Author(s):  
Stefano Errico ◽  
Martina Drommi ◽  
Valentina Calamano ◽  
Rosario Barranco ◽  
Giulia Molinari ◽  
...  

Author(s):  
Rafael Consunji ◽  
Aisha Abeid ◽  
Amber Mehmood ◽  
Monira Mollazehi ◽  
Ayman El-Menyar ◽  
...  

Author(s):  
Maja Skenderovska ◽  
Biljana Minčeva-Šukarova ◽  
Liljana Andreeva

Raman and infrared spectroscopy are two complementary spectroscopic techniques that can produce fast, efficient and accurate detection of the pigments and/or binders used in automotive topcoats. Micro-Raman spectroscopy, due to its non-destructiveness, has been extensively used for identification of pigments and dyes in forensic investigation of hit-and-run accidents. This technique provides very useful and significant information from very small samples of evidence without any previous preparation of the sample. The recorded Raman spectra of the unknown/ suspected samples can be compared with a spectrum of the referent sample, which can coincide with the one already existing in the Raman database of pigments. In order to form our own spectral database of automotive paints for forensic investigations in hit-and-run offences in Republic of Macedonia, an investigation of automotive topcoats of different origins was carried out. In our previous study, pigments in some automotive topcoats, produced by Mobihel, have been identified using micro- Raman and FT-IR spectroscopy. In the present study, we report micro-Raman and FT-IR spectra of ten base coat automotive topcoats, as well as some of their mixtures, produced by Glasürit. In order to demonstrate the availability and/or the advantages of the micro-Raman spectroscopic technique in forensic investigation in road accidents, four successfully solved cases from the police investigation in hit-and-run accidents are presented in this work.


2017 ◽  
Vol 12 (1) ◽  
pp. 48-71
Author(s):  
M. A. Voznyuk ◽  
Yu. A. Denisov

The analytical review examines the issues of forensic investigation into the circumstances of production of digital video and audio recordings. The paper presents the organization and lines of inquiry in forensic analysis of video and audio evidence, computer forensics, forensic linguistics, and psychological evaluation established in the system of forensic science organizations of the Russian Ministry of Justice by 2013–2016. The analysis covers the issues of independent or integrated application of the listed types of special knowledge in order to meet the discipline-specific and comprehensive objectives of determining the circumstances of video/audio production. General strategies and types of forensic diagnostics of production circumstances are discussed without too much emphasis on the methodological minutiae of every stage of the investigation.


Sign in / Sign up

Export Citation Format

Share Document