SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Collection of Crime Scene Evidence Chapter 4
Crime Scene Evidence ,[object Object],[object Object],[object Object],[object Object],[object Object]
Forensic Science ,[object Object],[object Object],[object Object],[object Object]
Types of Physical Evidence ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Procedures for Collection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Procedures for Collection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Packaging ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Packaging ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Packaging ,[object Object],[object Object],[object Object],[object Object],[object Object]
Packaging ,[object Object],[object Object],[object Object],[object Object]
Packaging ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Chain of Custody ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Obtaining Reference Samples ,[object Object],[object Object],[object Object],[object Object],[object Object]
Submitting Evidence ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Crime Scene Safety ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Crime Scene Safety ,[object Object],[object Object],[object Object],[object Object]
Search and Seizure Protocols ,[object Object],[object Object]
Search and Seizure Protocols ,[object Object],[object Object],[object Object],[object Object],[object Object]
Search and Seizure Landmark Cases ,[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Andere mochten auch

Computer forensics
Computer forensicsComputer forensics
Computer forensicsdeaneal
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentationprashant3535
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentationRajat Jain
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

Andere mochten auch (7)

Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Forensic Science Introduction
Forensic Science IntroductionForensic Science Introduction
Forensic Science Introduction
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Ă„hnlich wie Fs Ch4

Fs Ch4
Fs Ch4Fs Ch4
Fs Ch4warren142
 
18.0 COLLECTION OF FORENSIC EVIDENCES_688c2aaeb09d3e72f4d5983a65c87f18.pptx
18.0 COLLECTION OF FORENSIC EVIDENCES_688c2aaeb09d3e72f4d5983a65c87f18.pptx18.0 COLLECTION OF FORENSIC EVIDENCES_688c2aaeb09d3e72f4d5983a65c87f18.pptx
18.0 COLLECTION OF FORENSIC EVIDENCES_688c2aaeb09d3e72f4d5983a65c87f18.pptxKennyjrLMunisi
 
Day 1 london met at adp
Day 1  london met at adpDay 1  london met at adp
Day 1 london met at adpBashar Sasa
 
collection and packing of biological and firearm evidences
collection and packing of biological and firearm evidencescollection and packing of biological and firearm evidences
collection and packing of biological and firearm evidencesSandeep Kumar Pathak
 
Criminalistics Unit 3
Criminalistics Unit 3Criminalistics Unit 3
Criminalistics Unit 3Don Caeiro
 
Fs Ch 5
Fs Ch 5Fs Ch 5
Fs Ch 5warren142
 
Fs Ch 5
Fs Ch 5Fs Ch 5
Fs Ch 5warren142
 
1.-LEGAL-MEDICINE- BACHELOR OF SCIENCE IN CRIMnew.pdf
1.-LEGAL-MEDICINE- BACHELOR OF SCIENCE IN CRIMnew.pdf1.-LEGAL-MEDICINE- BACHELOR OF SCIENCE IN CRIMnew.pdf
1.-LEGAL-MEDICINE- BACHELOR OF SCIENCE IN CRIMnew.pdfJemaicaCondesa
 
Forensics ch 3 notes
Forensics ch 3 notesForensics ch 3 notes
Forensics ch 3 notesLeah Morgan
 
Crime Scene Processing
Crime Scene ProcessingCrime Scene Processing
Crime Scene Processingwarren142
 
Dna theory 3
Dna theory 3Dna theory 3
Dna theory 3Bruno Mmassy
 
2018 Crime Scenes, Collection and Preservation of Evidence2.pptx
2018 Crime Scenes, Collection and Preservation of Evidence2.pptx2018 Crime Scenes, Collection and Preservation of Evidence2.pptx
2018 Crime Scenes, Collection and Preservation of Evidence2.pptxdravidmishra1
 
Sample managemen tby kananika
Sample managemen tby kananikaSample managemen tby kananika
Sample managemen tby kananikaBruno Mmassy
 
Evidence collection & Preservation .pptx
Evidence collection & Preservation .pptxEvidence collection & Preservation .pptx
Evidence collection & Preservation .pptxkhushinidhaan
 
Fs Ch 5
Fs Ch 5Fs Ch 5
Fs Ch 5warren142
 
Fs Ch 5
Fs Ch 5Fs Ch 5
Fs Ch 5warren142
 
Concepts of Forensic Science for Lawyers
Concepts of Forensic Science for LawyersConcepts of Forensic Science for Lawyers
Concepts of Forensic Science for LawyersPrashant Mehta
 
Use of dna tech presentation
Use of dna tech presentationUse of dna tech presentation
Use of dna tech presentationBruno Mmassy
 
Collection Packaging and Forwarding of Physical Evidence.pptx
Collection Packaging and Forwarding of Physical Evidence.pptxCollection Packaging and Forwarding of Physical Evidence.pptx
Collection Packaging and Forwarding of Physical Evidence.pptxPallaviKumari112
 

Ă„hnlich wie Fs Ch4 (20)

Fs Ch4
Fs Ch4Fs Ch4
Fs Ch4
 
18.0 COLLECTION OF FORENSIC EVIDENCES_688c2aaeb09d3e72f4d5983a65c87f18.pptx
18.0 COLLECTION OF FORENSIC EVIDENCES_688c2aaeb09d3e72f4d5983a65c87f18.pptx18.0 COLLECTION OF FORENSIC EVIDENCES_688c2aaeb09d3e72f4d5983a65c87f18.pptx
18.0 COLLECTION OF FORENSIC EVIDENCES_688c2aaeb09d3e72f4d5983a65c87f18.pptx
 
Day 1 london met at adp
Day 1  london met at adpDay 1  london met at adp
Day 1 london met at adp
 
collection and packing of biological and firearm evidences
collection and packing of biological and firearm evidencescollection and packing of biological and firearm evidences
collection and packing of biological and firearm evidences
 
Criminalistics Unit 3
Criminalistics Unit 3Criminalistics Unit 3
Criminalistics Unit 3
 
Fs Ch 5
Fs Ch 5Fs Ch 5
Fs Ch 5
 
Fs Ch 5
Fs Ch 5Fs Ch 5
Fs Ch 5
 
1.-LEGAL-MEDICINE- BACHELOR OF SCIENCE IN CRIMnew.pdf
1.-LEGAL-MEDICINE- BACHELOR OF SCIENCE IN CRIMnew.pdf1.-LEGAL-MEDICINE- BACHELOR OF SCIENCE IN CRIMnew.pdf
1.-LEGAL-MEDICINE- BACHELOR OF SCIENCE IN CRIMnew.pdf
 
Forensics ch 3 notes
Forensics ch 3 notesForensics ch 3 notes
Forensics ch 3 notes
 
Crime Scene Processing
Crime Scene ProcessingCrime Scene Processing
Crime Scene Processing
 
Dna theory 3
Dna theory 3Dna theory 3
Dna theory 3
 
2018 Crime Scenes, Collection and Preservation of Evidence2.pptx
2018 Crime Scenes, Collection and Preservation of Evidence2.pptx2018 Crime Scenes, Collection and Preservation of Evidence2.pptx
2018 Crime Scenes, Collection and Preservation of Evidence2.pptx
 
Sample managemen tby kananika
Sample managemen tby kananikaSample managemen tby kananika
Sample managemen tby kananika
 
Evidence collection & Preservation .pptx
Evidence collection & Preservation .pptxEvidence collection & Preservation .pptx
Evidence collection & Preservation .pptx
 
Fs Ch 5
Fs Ch 5Fs Ch 5
Fs Ch 5
 
Fs Ch 5
Fs Ch 5Fs Ch 5
Fs Ch 5
 
Concepts of Forensic Science for Lawyers
Concepts of Forensic Science for LawyersConcepts of Forensic Science for Lawyers
Concepts of Forensic Science for Lawyers
 
Use of dna tech presentation
Use of dna tech presentationUse of dna tech presentation
Use of dna tech presentation
 
Collection Packaging and Forwarding of Physical Evidence.pptx
Collection Packaging and Forwarding of Physical Evidence.pptxCollection Packaging and Forwarding of Physical Evidence.pptx
Collection Packaging and Forwarding of Physical Evidence.pptx
 
Crimescenebasics
CrimescenebasicsCrimescenebasics
Crimescenebasics
 

Mehr von warren142

Ch 8 fingerprints
Ch 8 fingerprintsCh 8 fingerprints
Ch 8 fingerprintswarren142
 
Chapter02
Chapter02Chapter02
Chapter02warren142
 
Chapter 1
Chapter 1Chapter 1
Chapter 1warren142
 
Cj 101 ch 4
Cj 101 ch 4Cj 101 ch 4
Cj 101 ch 4warren142
 
Criminal justice 101 ch 3
Criminal justice 101 ch 3Criminal justice 101 ch 3
Criminal justice 101 ch 3warren142
 
Chapter 7
Chapter 7Chapter 7
Chapter 7warren142
 
Chapter 16
Chapter 16Chapter 16
Chapter 16warren142
 
Chapter 5
Chapter 5Chapter 5
Chapter 5warren142
 
Chapter 4
Chapter 4Chapter 4
Chapter 4warren142
 
Chapter 1
Chapter 1Chapter 1
Chapter 1warren142
 
Chapter 9
Chapter 9Chapter 9
Chapter 9warren142
 

Mehr von warren142 (20)

Ch 8 fingerprints
Ch 8 fingerprintsCh 8 fingerprints
Ch 8 fingerprints
 
Chapter02
Chapter02Chapter02
Chapter02
 
Ch 7
Ch 7Ch 7
Ch 7
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Ch 6
Ch 6Ch 6
Ch 6
 
Ch 6
Ch 6Ch 6
Ch 6
 
Ch 5
Ch 5Ch 5
Ch 5
 
Cj 101 ch 4
Cj 101 ch 4Cj 101 ch 4
Cj 101 ch 4
 
Criminal justice 101 ch 3
Criminal justice 101 ch 3Criminal justice 101 ch 3
Criminal justice 101 ch 3
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
Chapter 16
Chapter 16Chapter 16
Chapter 16
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Ch 14
Ch 14Ch 14
Ch 14
 
Ch 15
Ch 15Ch 15
Ch 15
 
Ch 15
Ch 15Ch 15
Ch 15
 
Ch 14
Ch 14Ch 14
Ch 14
 
Ch 13
Ch 13Ch 13
Ch 13
 
Chapter 9
Chapter 9Chapter 9
Chapter 9
 

KĂĽrzlich hochgeladen

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

KĂĽrzlich hochgeladen (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Fs Ch4

  • 1. Collection of Crime Scene Evidence Chapter 4
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.

Hinweis der Redaktion

  1. As automobiles run on gasoline, crime laboratories “run” on physical evidence. Physical evidence encompasses any and all objects that can establish that a crime has been committed or can provide a link between a crime and its victim or a crime and its perpetrator. But if physical evidence is to be used effectively for aiding the investigator, its presence first must be recognized at the crime scene.
  2. Forensic science begins at the crime scene. If the investigator cannot recognize physical evidence or cannot properly preserve it for laboratory examination, no amount of sophisticated laboratory instrumentation or technical expertise can salvage the situation. Here, investigators must recognize and properly preserve evidence for laboratory examination. It must be emphasized that the techniques of crime-scene investigation are not difficult to master and certainly lie within the bounds of comprehension of the average police officer
  3. Often, many items of evidence are clearly visible but others may be detected only through examination at the crime laboratory. For this reason, it is important to collect possible carriers of trace evidence, such as clothing, vacuum sweepings, and fingernail scrapings, in addition to more discernible items.
  4. Investigators handle and process physical evidence in a way that prevents changes to the evidence through contamination , breakage, evaporation, accidental scratching or bending, or through improper or careless packaging. The use of latex gloves, disposable forceps, and sanitized equipment reduces the chance for contamination. Whenever possible, one should keep evidence in its original condition as found at the crime scene
  5. Each different item or similar items collected at different locations must be placed in separate containers. Packaging evidence separately prevents damage through contact and prevents cross-contamination. The well-prepared evidence collector will arrive at a crime scene with a large assortment of packaging materials and tools ready to encounter any type of situation.
  6. Disposable forceps and similar tools may have to be used to pick up small items. Unbreakable plastic pill bottles with pressure lids are excellent containers for hairs, glass, fibers, and various other kinds of small or trace evidence. Alternatively, manila envelopes, screw-cap glass vials, or cardboard pillboxes are adequate containers for most trace evidence encountered at crime sites. Ordinary mailing envelopes should not be used as evidence containers because powders and fine particles will leak out of their corners.
  7. Small amounts of trace evidence can also be conveniently packaged in a carefully folded paper, using what is known as a “druggist fold.” Evidence from arson scenes should be packaged in airtight metal or glass containers to prevent the loss of accelerant vapors.
  8. If biological or bloodstained materials are stored in airtight containers, the accumulation of moisture may encourage the growth of mold, which can destroy the evidential value. In these instances, the material should be allowed to air-dry before being packaged in wrapping paper, manila envelopes, or paper bags.
  9. Contamination is a key concern during the collection of DNA-containing specimens such as blood, saliva, sweat or skin cells. Contamination can occur either by introducing foreign DNA through coughing or sneezing onto evidence or if items of evidence are incorrectly placed in contact with each other during packaging. To prevent contamination, the evidence collector must wear a face mask and use disposable latex gloves and disposable forceps when collecting evidence that may contain DNA
  10. Chain of Custody - a list of all persons who came into possession of an item of evidence . Continuity of possession, or the chain of custody, must be established whenever evidence is presented in court as an exhibit. Adherence to standard procedures in recording the location of evidence, marking it for identification, and properly completing evidence submission forms for laboratory analysis is critical to chain of custody. This means that every person who handled or examined the evidence and where it is at all times must be accounted for.
  11. Standard/Reference Sample —Physical evidence whose origin is known, such as blood or hair from a suspect, that can be compared to crime-scene evidence. The examination of evidence, whether it is soil, blood, glass, hair, fibers, and so on, often requires comparison with a known standard/reference sample. Although most investigators have little difficulty recognizing and collecting relevant crime-scene evidence, few seem aware of the necessity and importance of providing the crime lab with a thorough sampling of standard/reference materials.
  12. Evidence is usually submitted to the laboratory either by personal delivery or by mail shipment. Care must be taken in packaging evidence that will be sent by mail in order to prevent breakage or other accidental destruction during transit to the laboratory. Most laboratories require that an evidence submission form accompany all evidence submitted. Case information provided on this form enables the laboratory analyst to make an intelligent and complete examination of the evidence.
  13. Crime scenes: -biological specimens of unknown origin -no way of gauging health hazards -use caution and protection at all times -International Association for Identification Safety Committee that crime scene personnel wear a minimum of latex gloves (double gloved) and protective shoe covers. In cases of large contamination areas, coveralls are also recommended.
  14. The use of a particle mask/respirator, goggles, or face shield is recommended in addition to the minimum protective items when potentially infectious dust or mist are present. Personnel should be alert to sharp objects, knives, hypodermic syringes, razor blades, and similar items. Personnel should maintain a red biohazard plastic bag for the disposal of contaminated gloves, clothing, masks, pencils, wrapping paper, and so on.
  15. The removal of any evidence from a person or from the scene of a crime must be done in conformity with Fourth Amendment privileges: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizure, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”
  16. Supreme Court has determined that search and seizure without a court-approved warrant is justified in four cases: The existence of emergency circumstances The need to prevent the immediate loss or destruction of evidence A search of a person and property within the immediate control of the person provided it is made incident to a lawful arrest A search made by consent of the parties involved
  17. Mincey v. Arizona, the Court dealt with the legality of a four-day search at a homicide scene and determined that the evidence was illegally seized because a warrant was never issued and the circumstances of the case did not justify a warrantless search. In Michigan v. Tyler, fire destroyed a business establishment leased by Loren Tyler and a business partner. The court decided that evidence obtained from the initial search was legally seized, but evidence obtained from searches 4, 7, and 24 days after the incident were illegally seized. Chimel v CA: