SlideShare une entreprise Scribd logo
1  sur  16
Processing the Crime Scene

 Securing
 Physical
 Evidence




            http://i.cnn.net/cnn/SPECIALS/2000/columbine.cd/Photos/ENTRYWAY.01.JPG
What is Physical Evidence?
   Any and all objects that can:
       establish that a crime has been
        committed
       link a crime and a victim
       link a crime and the perpetrator
   Selectivity is the key
       You can’t collect everything!
Priorities at the Crime Scene
   Obtain medical aid for those in need
   Arrest the perpetrator
   Secure the crime scene
       Exclude unauthorized personnel
           Remember Locard’s Exchange Principle!
       Determine crime scene boundaries
       Locate path of entry and exit
Photography
   Scene must be unaltered!
       If objects are removed,
        positions changed, or items
        added photos may be
        inadmissable
       If items were moved (eg.
        Securing a firearm) note it in
        the report, do not put it back!
   Physical evidence must be
    photographed to show:
       Position and location relative to
        the scene
       Close-ups to show detail
       Scale to show size
Sketches
   Rough sketch records
       Dimensions of crime scene and
        surroundings
       Location of each piece of physical
        evidence
           Distances from two points
   Finished sketch
       Represents crime scene to the jury
Systematic Search Patterns
   Spiral search
   Grid method
   Strip of line search
   Quadrant or zone
    search




                           http://www.tpub.com/maa/12740_files/image598.jpg
Evidence Collection
   Must collect all
    possible carriers of
    evidence
       Clothing
          Package each item
           separately
          Cross-
           contamination
       Sweepings
          Collect and package
           each area
           separately
       Fingernail scrapings
Evidence Collection
   Must collect all possible carriers of
    evidence
       Head and pubic hairs
           For comparison purposes
       Blood or cheek swab for DNA
       Vaginal, anal and oral swabs
           For sex crimes
       Recovered bullets from the body
       Hand swabs for gunshot residue
Special Considerations for Arson
   Accelerants
       Volatile, evaporate
        easily
       Collect ash and
        debris for traces
         Store in airtight
          paint cans with
          vapor
          concentrators
Standard/Reference Samples
   To show provenance        Substrate Controls
    you need known                Samples of materials
    reference samples to           near where physical
    compare to                     evidence was
       Hair                       deposited
       Fiber
                                  Want to show tests
                                   for physical evidence
       Glass
                                   don’t produce false
       DNA                        positives
       Blood                        Untouched
                                      wallboard in arson
                                     Background fabric
                                      for blood test
Chain of Custody
   Key point of attack for the defense
   Every person who handled or
    examined the evidence must be
    accounted for
       Must be a written record of each hand-
        off
       Each time container is opened a fresh
        seal must be made and initialed
Safety Considerations
   AIDS and other infectious materials
       Double gloves, shoe covers, Tyvek suit
       Blood must be dried
       Biohazard bags
   Air-borne particulates and dust
       Particle mask, respirator, goggles, face shield
   Sharps and blood contamination
   No eating, drinking, smoking, putting on
    make-up
Legal Considerations
   4th Amendment Rights
       Right against unreasonable search and
        seizure
           Probable cause
           Description of place to be searched
           Description of persons or things to be
            seized
Searching without a warrant
   Emergency circumstances
   Prevent loss or destruction of
    evidence
   Search of person and property during
    an arrest
   Search made with consent
Key Court Decisions
   Mincey v. Arizona
       Undercover cop killed trying to buy drugs
       Police search scene for four days without
        obtaining a warrant
       Supreme Court throws out the evidence
        found
       “No exigent circumstances”
Key Court Decisions
   Michigan v. Tyler
       Arson at a place of business
       Police search scene looking for arson but
        leave scene unattended for several hours
       Return several times over next 4 weeks
        to collect evidence without warrant
       Initial warrantless search is OK after fire
       Later searches thrown out

Contenu connexe

Tendances

Fiber And Hair Evidence
Fiber And Hair EvidenceFiber And Hair Evidence
Fiber And Hair Evidenceannperry09
 
Role of toxicology findings and drug Recognition expert
Role of toxicology findings and drug Recognition expertRole of toxicology findings and drug Recognition expert
Role of toxicology findings and drug Recognition expertHoneyM4
 
Automated Fingerprint Identification System (AFIS)
Automated Fingerprint Identification System (AFIS)Automated Fingerprint Identification System (AFIS)
Automated Fingerprint Identification System (AFIS)Alok Yadav
 
Forensic science powerpoint
Forensic science powerpointForensic science powerpoint
Forensic science powerpointkeschroeder118
 
CSI and Evidence Collection
CSI and Evidence CollectionCSI and Evidence Collection
CSI and Evidence Collectionmpattani
 
A complete review of Forensic Science and its various branches.
A complete review of Forensic Science and its various branches.A complete review of Forensic Science and its various branches.
A complete review of Forensic Science and its various branches.Hamza Mohammad
 
Crime scene management
Crime scene managementCrime scene management
Crime scene managementShreyas Patel
 
Murder Case Studies - Investigation Insights
Murder Case Studies - Investigation InsightsMurder Case Studies - Investigation Insights
Murder Case Studies - Investigation Insightsafentisforensics
 
Introduction to forensic science
Introduction to forensic scienceIntroduction to forensic science
Introduction to forensic scienceAbby Varghese
 
Examination of Firearm through Cartridge Case and bullet.pptx
Examination of Firearm through Cartridge Case and bullet.pptxExamination of Firearm through Cartridge Case and bullet.pptx
Examination of Firearm through Cartridge Case and bullet.pptxPallaviKumari112
 
Crime scene investigation lecture
Crime scene investigation  lectureCrime scene investigation  lecture
Crime scene investigation lectureSaurabh Bhargava
 
scope_and_nature_of_questioned_documents.ppt
scope_and_nature_of_questioned_documents.pptscope_and_nature_of_questioned_documents.ppt
scope_and_nature_of_questioned_documents.pptPallaviKumari112
 
Hair as a forensic evidence
Hair as a forensic evidenceHair as a forensic evidence
Hair as a forensic evidenceTejasvi Bhatia
 
Tool marks and its forensic significance
Tool marks and its forensic significanceTool marks and its forensic significance
Tool marks and its forensic significanceStina14
 

Tendances (20)

crime scene investigation
crime scene investigationcrime scene investigation
crime scene investigation
 
Fiber And Hair Evidence
Fiber And Hair EvidenceFiber And Hair Evidence
Fiber And Hair Evidence
 
Role of toxicology findings and drug Recognition expert
Role of toxicology findings and drug Recognition expertRole of toxicology findings and drug Recognition expert
Role of toxicology findings and drug Recognition expert
 
Forensic analysis of tool marks
Forensic analysis of tool marksForensic analysis of tool marks
Forensic analysis of tool marks
 
Automated Fingerprint Identification System (AFIS)
Automated Fingerprint Identification System (AFIS)Automated Fingerprint Identification System (AFIS)
Automated Fingerprint Identification System (AFIS)
 
Touch dna
Touch dnaTouch dna
Touch dna
 
Forensic science powerpoint
Forensic science powerpointForensic science powerpoint
Forensic science powerpoint
 
CSI and Evidence Collection
CSI and Evidence CollectionCSI and Evidence Collection
CSI and Evidence Collection
 
Fire and arson
Fire and arsonFire and arson
Fire and arson
 
A complete review of Forensic Science and its various branches.
A complete review of Forensic Science and its various branches.A complete review of Forensic Science and its various branches.
A complete review of Forensic Science and its various branches.
 
Hair and fiber
Hair and fiberHair and fiber
Hair and fiber
 
Crime Scene Reconstruction.
Crime Scene Reconstruction.Crime Scene Reconstruction.
Crime Scene Reconstruction.
 
Crime scene management
Crime scene managementCrime scene management
Crime scene management
 
Murder Case Studies - Investigation Insights
Murder Case Studies - Investigation InsightsMurder Case Studies - Investigation Insights
Murder Case Studies - Investigation Insights
 
Introduction to forensic science
Introduction to forensic scienceIntroduction to forensic science
Introduction to forensic science
 
Examination of Firearm through Cartridge Case and bullet.pptx
Examination of Firearm through Cartridge Case and bullet.pptxExamination of Firearm through Cartridge Case and bullet.pptx
Examination of Firearm through Cartridge Case and bullet.pptx
 
Crime scene investigation lecture
Crime scene investigation  lectureCrime scene investigation  lecture
Crime scene investigation lecture
 
scope_and_nature_of_questioned_documents.ppt
scope_and_nature_of_questioned_documents.pptscope_and_nature_of_questioned_documents.ppt
scope_and_nature_of_questioned_documents.ppt
 
Hair as a forensic evidence
Hair as a forensic evidenceHair as a forensic evidence
Hair as a forensic evidence
 
Tool marks and its forensic significance
Tool marks and its forensic significanceTool marks and its forensic significance
Tool marks and its forensic significance
 

En vedette

Medical aspects of human identification
Medical aspects of human identificationMedical aspects of human identification
Medical aspects of human identificationBruno Mmassy
 
Identifying a dead body
Identifying a dead bodyIdentifying a dead body
Identifying a dead bodyjayarajgr
 
Identification of the living and the dead
Identification  of  the  living  and  the  deadIdentification  of  the  living  and  the  dead
Identification of the living and the deadYapa
 
Processing Crimes and Incident Scenes
Processing Crimes and Incident ScenesProcessing Crimes and Incident Scenes
Processing Crimes and Incident Scenesprimeteacher32
 
Introduction to forensics
Introduction to forensicsIntroduction to forensics
Introduction to forensics06426345
 
Molecular forensics 2010
Molecular forensics 2010Molecular forensics 2010
Molecular forensics 2010Bruno Mmassy
 

En vedette (12)

Medical aspects of human identification
Medical aspects of human identificationMedical aspects of human identification
Medical aspects of human identification
 
Identification
IdentificationIdentification
Identification
 
Identifying a dead body
Identifying a dead bodyIdentifying a dead body
Identifying a dead body
 
Identification of the living and the dead
Identification  of  the  living  and  the  deadIdentification  of  the  living  and  the  dead
Identification of the living and the dead
 
Antiviral 1
Antiviral 1Antiviral 1
Antiviral 1
 
Processing Crimes and Incident Scenes
Processing Crimes and Incident ScenesProcessing Crimes and Incident Scenes
Processing Crimes and Incident Scenes
 
Introduction to forensics
Introduction to forensicsIntroduction to forensics
Introduction to forensics
 
Molecular forensics 2010
Molecular forensics 2010Molecular forensics 2010
Molecular forensics 2010
 
Forensic
ForensicForensic
Forensic
 
Lecture 2
Lecture 2Lecture 2
Lecture 2
 
Dna forensic
Dna forensicDna forensic
Dna forensic
 
Antiviral drugs - drdhriti
Antiviral drugs - drdhritiAntiviral drugs - drdhriti
Antiviral drugs - drdhriti
 

Similaire à Processing Crime Scenes: Securing Physical Evidence

Chapter 2 Crime Scene Investigation
Chapter 2 Crime Scene InvestigationChapter 2 Crime Scene Investigation
Chapter 2 Crime Scene Investigationwatsonma12
 
002 crimescenebasics - final (2).pptx hh
002 crimescenebasics - final (2).pptx hh002 crimescenebasics - final (2).pptx hh
002 crimescenebasics - final (2).pptx hhnaveenhooda22nav
 
What is forensics
What is forensicsWhat is forensics
What is forensicsErin Mucci
 
Criminalistics Unit 3
Criminalistics Unit 3Criminalistics Unit 3
Criminalistics Unit 3Don Caeiro
 
Chapter 4.pptx
Chapter 4.pptxChapter 4.pptx
Chapter 4.pptxKettyM1
 
Concepts of Forensic Science for Lawyers
Concepts of Forensic Science for LawyersConcepts of Forensic Science for Lawyers
Concepts of Forensic Science for LawyersPrashant Mehta
 
Day 1 london met at adp
Day 1  london met at adpDay 1  london met at adp
Day 1 london met at adpBashar Sasa
 
Types Of Evidence Presentation
Types Of Evidence PresentationTypes Of Evidence Presentation
Types Of Evidence PresentationMaria Donohue
 
Forensic chemistry introduction
Forensic chemistry introductionForensic chemistry introduction
Forensic chemistry introductionBruno Mmassy
 
Forensic Science: Topic 2 crime scene
Forensic Science: Topic 2 crime sceneForensic Science: Topic 2 crime scene
Forensic Science: Topic 2 crime sceneBob Smullen
 
Evidence collection & Preservation .pptx
Evidence collection & Preservation .pptxEvidence collection & Preservation .pptx
Evidence collection & Preservation .pptxkhushinidhaan
 
Forensics Ch 2 notes
Forensics Ch 2 notesForensics Ch 2 notes
Forensics Ch 2 notesLeah Morgan
 
Crimescenebasics ppt
Crimescenebasics pptCrimescenebasics ppt
Crimescenebasics pptphebemoore
 
1crimescenebasics
1crimescenebasics1crimescenebasics
1crimescenebasicsMrs. Henley
 
Crime Scene Basics PowerPoint
Crime Scene Basics PowerPointCrime Scene Basics PowerPoint
Crime Scene Basics PowerPointts0001718
 
Crime Scenc Investigation Evidence Collection
Crime Scenc Investigation  Evidence CollectionCrime Scenc Investigation  Evidence Collection
Crime Scenc Investigation Evidence Collectionheasulli
 
Preserving Biological Evidence
Preserving Biological EvidencePreserving Biological Evidence
Preserving Biological EvidenceKate Loge
 

Similaire à Processing Crime Scenes: Securing Physical Evidence (20)

Chapter 2 Crime Scene Investigation
Chapter 2 Crime Scene InvestigationChapter 2 Crime Scene Investigation
Chapter 2 Crime Scene Investigation
 
002 crimescenebasics - final (2).pptx hh
002 crimescenebasics - final (2).pptx hh002 crimescenebasics - final (2).pptx hh
002 crimescenebasics - final (2).pptx hh
 
What is forensics
What is forensicsWhat is forensics
What is forensics
 
Criminalistics Unit 3
Criminalistics Unit 3Criminalistics Unit 3
Criminalistics Unit 3
 
Chapter 4.pptx
Chapter 4.pptxChapter 4.pptx
Chapter 4.pptx
 
Concepts of Forensic Science for Lawyers
Concepts of Forensic Science for LawyersConcepts of Forensic Science for Lawyers
Concepts of Forensic Science for Lawyers
 
Day 1 london met at adp
Day 1  london met at adpDay 1  london met at adp
Day 1 london met at adp
 
Types Of Evidence Presentation
Types Of Evidence PresentationTypes Of Evidence Presentation
Types Of Evidence Presentation
 
Forensic chemistry introduction
Forensic chemistry introductionForensic chemistry introduction
Forensic chemistry introduction
 
Forensic Science: Topic 2 crime scene
Forensic Science: Topic 2 crime sceneForensic Science: Topic 2 crime scene
Forensic Science: Topic 2 crime scene
 
Fs Ch4
Fs Ch4Fs Ch4
Fs Ch4
 
Evidence collection & Preservation .pptx
Evidence collection & Preservation .pptxEvidence collection & Preservation .pptx
Evidence collection & Preservation .pptx
 
Criminal Investigations (Part One)
Criminal Investigations (Part One)Criminal Investigations (Part One)
Criminal Investigations (Part One)
 
Forensics Ch 2 notes
Forensics Ch 2 notesForensics Ch 2 notes
Forensics Ch 2 notes
 
Crimescenebasics
CrimescenebasicsCrimescenebasics
Crimescenebasics
 
Crimescenebasics ppt
Crimescenebasics pptCrimescenebasics ppt
Crimescenebasics ppt
 
1crimescenebasics
1crimescenebasics1crimescenebasics
1crimescenebasics
 
Crime Scene Basics PowerPoint
Crime Scene Basics PowerPointCrime Scene Basics PowerPoint
Crime Scene Basics PowerPoint
 
Crime Scenc Investigation Evidence Collection
Crime Scenc Investigation  Evidence CollectionCrime Scenc Investigation  Evidence Collection
Crime Scenc Investigation Evidence Collection
 
Preserving Biological Evidence
Preserving Biological EvidencePreserving Biological Evidence
Preserving Biological Evidence
 

Plus de Bruno Mmassy

Family rhabdoviridae
Family rhabdoviridaeFamily rhabdoviridae
Family rhabdoviridaeBruno Mmassy
 
Molecular forensics 2
Molecular forensics 2Molecular forensics 2
Molecular forensics 2Bruno Mmassy
 
Sero and phage typing bls 206
Sero and phage typing bls 206Sero and phage typing bls 206
Sero and phage typing bls 206Bruno Mmassy
 
Selected gram positives bls 206
Selected gram positives bls 206Selected gram positives bls 206
Selected gram positives bls 206Bruno Mmassy
 
Rickettsia & chlamydia bls 206
Rickettsia & chlamydia bls 206Rickettsia & chlamydia bls 206
Rickettsia & chlamydia bls 206Bruno Mmassy
 
Pathogenic anaerobe gram positive bls 206
Pathogenic anaerobe gram positive bls 206Pathogenic anaerobe gram positive bls 206
Pathogenic anaerobe gram positive bls 206Bruno Mmassy
 
Lecture 2 diagnostic molecular microbiology bls
Lecture 2 diagnostic molecular microbiology blsLecture 2 diagnostic molecular microbiology bls
Lecture 2 diagnostic molecular microbiology blsBruno Mmassy
 
Antimicrobial susceptibility test and assay bls 206
Antimicrobial susceptibility test and assay bls 206Antimicrobial susceptibility test and assay bls 206
Antimicrobial susceptibility test and assay bls 206Bruno Mmassy
 
Antimicrobial agents and mechanisms of action 2
Antimicrobial agents and mechanisms of action 2Antimicrobial agents and mechanisms of action 2
Antimicrobial agents and mechanisms of action 2Bruno Mmassy
 
Antibiotics lecture may 2010
Antibiotics lecture may 2010Antibiotics lecture may 2010
Antibiotics lecture may 2010Bruno Mmassy
 
Streptococci and enterococci bls 206
Streptococci and enterococci bls 206Streptococci and enterococci bls 206
Streptococci and enterococci bls 206Bruno Mmassy
 
Bls 107 general microbiology
Bls 107 general microbiologyBls 107 general microbiology
Bls 107 general microbiologyBruno Mmassy
 
Bacterial pathogenesis
Bacterial pathogenesisBacterial pathogenesis
Bacterial pathogenesisBruno Mmassy
 
Bacterial genetics
Bacterial geneticsBacterial genetics
Bacterial geneticsBruno Mmassy
 
Transgenic animals
Transgenic animalsTransgenic animals
Transgenic animalsBruno Mmassy
 
Environmental biotechnology
Environmental biotechnologyEnvironmental biotechnology
Environmental biotechnologyBruno Mmassy
 

Plus de Bruno Mmassy (20)

Family rhabdoviridae
Family rhabdoviridaeFamily rhabdoviridae
Family rhabdoviridae
 
Molecular forensics 2
Molecular forensics 2Molecular forensics 2
Molecular forensics 2
 
Sero and phage typing bls 206
Sero and phage typing bls 206Sero and phage typing bls 206
Sero and phage typing bls 206
 
Selected gram positives bls 206
Selected gram positives bls 206Selected gram positives bls 206
Selected gram positives bls 206
 
Rickettsia & chlamydia bls 206
Rickettsia & chlamydia bls 206Rickettsia & chlamydia bls 206
Rickettsia & chlamydia bls 206
 
Pathogenic anaerobe gram positive bls 206
Pathogenic anaerobe gram positive bls 206Pathogenic anaerobe gram positive bls 206
Pathogenic anaerobe gram positive bls 206
 
Lecture 2 diagnostic molecular microbiology bls
Lecture 2 diagnostic molecular microbiology blsLecture 2 diagnostic molecular microbiology bls
Lecture 2 diagnostic molecular microbiology bls
 
Antimicrobial susceptibility test and assay bls 206
Antimicrobial susceptibility test and assay bls 206Antimicrobial susceptibility test and assay bls 206
Antimicrobial susceptibility test and assay bls 206
 
Antimicrobial agents and mechanisms of action 2
Antimicrobial agents and mechanisms of action 2Antimicrobial agents and mechanisms of action 2
Antimicrobial agents and mechanisms of action 2
 
Antibiotics lecture may 2010
Antibiotics lecture may 2010Antibiotics lecture may 2010
Antibiotics lecture may 2010
 
Streptococci and enterococci bls 206
Streptococci and enterococci bls 206Streptococci and enterococci bls 206
Streptococci and enterococci bls 206
 
Bls 107 general microbiology
Bls 107 general microbiologyBls 107 general microbiology
Bls 107 general microbiology
 
Bacteriophage 1
Bacteriophage 1Bacteriophage 1
Bacteriophage 1
 
Bacterial toxins
Bacterial toxinsBacterial toxins
Bacterial toxins
 
Bacterial phage 3
Bacterial phage 3Bacterial phage 3
Bacterial phage 3
 
Bacterial pathogenesis
Bacterial pathogenesisBacterial pathogenesis
Bacterial pathogenesis
 
Bacterial genetics
Bacterial geneticsBacterial genetics
Bacterial genetics
 
Transgenic animals
Transgenic animalsTransgenic animals
Transgenic animals
 
Environmental biotechnology
Environmental biotechnologyEnvironmental biotechnology
Environmental biotechnology
 
Dna sequencing
Dna sequencingDna sequencing
Dna sequencing
 

Dernier

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Dernier (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Processing Crime Scenes: Securing Physical Evidence

  • 1. Processing the Crime Scene Securing Physical Evidence http://i.cnn.net/cnn/SPECIALS/2000/columbine.cd/Photos/ENTRYWAY.01.JPG
  • 2. What is Physical Evidence?  Any and all objects that can:  establish that a crime has been committed  link a crime and a victim  link a crime and the perpetrator  Selectivity is the key  You can’t collect everything!
  • 3. Priorities at the Crime Scene  Obtain medical aid for those in need  Arrest the perpetrator  Secure the crime scene  Exclude unauthorized personnel  Remember Locard’s Exchange Principle!  Determine crime scene boundaries  Locate path of entry and exit
  • 4. Photography  Scene must be unaltered!  If objects are removed, positions changed, or items added photos may be inadmissable  If items were moved (eg. Securing a firearm) note it in the report, do not put it back!  Physical evidence must be photographed to show:  Position and location relative to the scene  Close-ups to show detail  Scale to show size
  • 5. Sketches  Rough sketch records  Dimensions of crime scene and surroundings  Location of each piece of physical evidence  Distances from two points  Finished sketch  Represents crime scene to the jury
  • 6. Systematic Search Patterns  Spiral search  Grid method  Strip of line search  Quadrant or zone search http://www.tpub.com/maa/12740_files/image598.jpg
  • 7. Evidence Collection  Must collect all possible carriers of evidence  Clothing  Package each item separately  Cross- contamination  Sweepings  Collect and package each area separately  Fingernail scrapings
  • 8. Evidence Collection  Must collect all possible carriers of evidence  Head and pubic hairs  For comparison purposes  Blood or cheek swab for DNA  Vaginal, anal and oral swabs  For sex crimes  Recovered bullets from the body  Hand swabs for gunshot residue
  • 9. Special Considerations for Arson  Accelerants  Volatile, evaporate easily  Collect ash and debris for traces  Store in airtight paint cans with vapor concentrators
  • 10. Standard/Reference Samples  To show provenance  Substrate Controls you need known  Samples of materials reference samples to near where physical compare to evidence was  Hair deposited  Fiber  Want to show tests for physical evidence  Glass don’t produce false  DNA positives  Blood  Untouched wallboard in arson  Background fabric for blood test
  • 11. Chain of Custody  Key point of attack for the defense  Every person who handled or examined the evidence must be accounted for  Must be a written record of each hand- off  Each time container is opened a fresh seal must be made and initialed
  • 12. Safety Considerations  AIDS and other infectious materials  Double gloves, shoe covers, Tyvek suit  Blood must be dried  Biohazard bags  Air-borne particulates and dust  Particle mask, respirator, goggles, face shield  Sharps and blood contamination  No eating, drinking, smoking, putting on make-up
  • 13. Legal Considerations  4th Amendment Rights  Right against unreasonable search and seizure  Probable cause  Description of place to be searched  Description of persons or things to be seized
  • 14. Searching without a warrant  Emergency circumstances  Prevent loss or destruction of evidence  Search of person and property during an arrest  Search made with consent
  • 15. Key Court Decisions  Mincey v. Arizona  Undercover cop killed trying to buy drugs  Police search scene for four days without obtaining a warrant  Supreme Court throws out the evidence found  “No exigent circumstances”
  • 16. Key Court Decisions  Michigan v. Tyler  Arson at a place of business  Police search scene looking for arson but leave scene unattended for several hours  Return several times over next 4 weeks to collect evidence without warrant  Initial warrantless search is OK after fire  Later searches thrown out