...Welcome to Homicide Forensic Science is a fundamental component of the justice system. Forensic scientists use scientific techniques and knowledge to assist law enforcement in investigations and solving crimes. They collect and analyze numerous types of evidence, including blood, body fluids; DNA; and human tissue. Forensic scientists assist the decision makers by showing the prosecutor if the issue has merit before it reaches the courtroom thereby reducing the number of cases having to be heard. Their decisions are based on scientific investigations and not circumstantial evidence or unreliable witnesses. Forensic scientists can restore faith in the judicial system with the use of science and technology for facts in criminal and civil investigations. The legal system is established on the belief that the legal process results in justice for all. History of forensic science The history of Forensic science or the applying of scientific principles to legal questions has a lengthy and interesting history. The first recorded autopsy was reported in 44 B.C was on Julius Caesar, where the Roman physician, Antistius proclaimed that he had 23 wounds on his body but only one was fatal. In 1248, a Chinese book entitled “His Duan Yu” (meaning The Washing Away of Wrongs) explaining how to tell apart a drowning from a strangulation. This was also the first recorded use of medicine to assist in solving crimes. In 1590, the first microscope was developed. In 1775, Karl...
Words: 2382 - Pages: 10
...Name: Date: TRUE/FALSE Directions: Answer each of the following by indicating if the statement is TRUE or FALSE 1. The word forensics refers to the application of scientific knowledge to legal questions. TRUE 2. A fact is a statement or assertion of information that can be verified. TRUE 3. What we perceive about a person depends in part on their mannerisms and gestures. TRUE 4. Good observation skills come naturally to investigators. They do not need to be trained. FALSE 5. The first task of forensic scientists is to find, examine, and evaluate evidence from a crime scene. TRUE 6. The Innocence Project is an organization that seeks to get convicted killers out of prison. SKIP 7. Our emotional state influences our ability to see and hear what is happening around us. TRUE 8. If we remember seeing something happen, we can trust that is happened just as we think it did. FALSE 9. Through our senses of sight, taste, hearing, smell, and touch, we gather every single moment about what is around us. TRUE 10. Most wrongful convictions seem to be the result of faulty eye-witness testimony. TRUE MULTIPLE CHOICE Directions: Answer the following questions with the choice that best answers the question 1. One of the important tools of the forensic investigator is the ability to: (a) a. Observe, interpret and report observation clearly b. Observer assumptions clearly. c. Report assumptions...
Words: 1075 - Pages: 5
...1. What was the user account name of the FTP client on the FTP server and which was its IP address? The FTP account name is: Badguy. FTP server’s IP:172.16.177.157 2. How many emails did the alleged offender sent to his partner before downloading the implicated file? Which are the two email addresses involved? The alleged offender sent 3 emails before downloading the file. The email address involved were: badguy11111@gawab.com and b603358@borthew.com 3. As a forensics investigator, would you be able to playback an entire TCP session if it is requested under trial? Yes, Netwitness investigator allows a forensics investigator to playback an entire TCP session previously capture. 4. What time did the alleged offender choose to perform the actions? Why do you think this is particularly important? Where did you get this information from? After reviewing the entire packet capture we notice that download occurred around 4:00am. This is particularly important since directly to “system usage” outside regular hours of operations. 5. What is the name of the “local user” account involved in the alleged actions? Which was the IP address of the alleged offender workstation? The local administrator account was the one involved. The IP address of the client FTP client was: 172.16.177.132 6. How many attempts to access the FTP server did you find during the packet capture analysis? Why is this important for your case? Two attempts to access the FTP server were found...
Words: 498 - Pages: 2
...Forensic Science in the 21st Century By: Crystal Lyle AJS/584 - FORENSIC SCIENCE AND PSYCHOLOGICAL PROFILING STEVEN HOENIG 2-29-16 This paper will examine my perception and concept of forensic science in the 21st century. It will also examine the importance of forensic science to policing criminal investigation court process, and the efforts of various levels in security. In addition to analyzing the importance of forensic science, I will give a historical approach. I will discuss the accuracy of the media representation of forensic science and how issues. Lastly, I will discuss the influence the CSI effect have on the judicial process. Forensic Science is the application of science to criminal and civil laws that are enforced by law enforcement agencies in a criminal justice system. Another definition of forensic science is principles and techniques to matters of criminal justice, especially as it relates to the collection, examination, and analysis of physical evidence. In 1929, a Los Angeles police department establish the first American forensic lab. Forensic science has been around over 300 years or more and it continues to improve and emerge today as science and technical knowledge find more improved and accurate techniques. Forensic science has come to be a critical instrument in allowing guilt or demonstrating innocence in the system of criminal justice. In the late 80’s (DNA), society was accepting of (DNA) and forensic science continues to develop and unfold...
Words: 1265 - Pages: 6
...Journal of Forensic & Investigative Accounting Vol. 4, Issue 2, 2012 The Obvious Fraud: A Short, Problem-Based Case Study to Highlight Inappropriate Fraud Examination Techniques David O’Bryan Jeffrey J. Quirin* INTRODUCTION Assume you are an internal auditor for a large, multinational, manufacturing organization with a division in Mexico. One of your responsibilities is to investigate allegations made on the company’s fraud hotline. When you arrive at work one morning you learn an anonymous tip was left on the hotline that alleges fraud involving the division manager. “Pat’s significant other is a fraudulent vendor,” was the anonymous tip left on your company’s fraud hotline. Pat is a division manager at your company. “Wow. I can’t believe this guy is so blatant,” you’re thinking as you review some accounts payable invoices while following up on this anonymous tip. The invoice that caught your attention is shown in Table 1. A quick search of the AP file reveals a total of three invoices like the one in Table 1, all for identical amounts but on different dates. The division manager, Pat, has the authority to approve payment of invoices for less than $10,000. It is obvious to you that the manager has a created a shell company. You happen to know that Pat’s significant other is named Kim, hence the name Kimco Marketing. There is no documentation to support these transactions other than the invoices, all of which are purportedly for marketing services. * The authors are, respectively...
Words: 3900 - Pages: 16
...International Journal of Digital Evidence Fall 2007, Volume 6, Issue 2 Computer Forensic Analysis in a Virtual Environment Derek Bem Ewa Huebner University of Western Sydney, Australia Abstract In this paper we discuss the potential role of virtual environments in the analysis phase of computer forensics investigations. General concepts of virtual environments and software tools are presented and discussed. Further we identify the limitations of virtual environments leading to the conclusion that this method can not be considered to be a replacement for conventional techniques of computer evidence collection and analysis. We propose a new approach where two environments, conventional and virtual, are used independently. Further we demonstrate that this approach can considerably shorten the time of the computer forensics investigation analysis phase and it also allows for better utilisation of less qualified personnel. Keywords: Computer Forensics, Virtual Machine, computer evidence. Introduction In this paper we examine the application of the VMWare (VMWare, 2007) virtual environment in the analysis phase of a computer forensics investigation. We show that the environment created by VMWare differs considerably from the original computer system, and because of that VMWare by itself is very unlikely to produce court admissible evidence. We propose a new approach when two environments, conventional and virtual, are used concurrently and independently. After the images...
Words: 3983 - Pages: 16
...A GUIDE IN FORENSIC CHEMISTRY Forensic chemistry is a branch of chemistry that deals with the application of chemical knowledge, principles, and procedures to matters involving civil or criminal law and to all questions where control of chemical compounds, products, or processes is involved. Forensic Chemistry is an interdisciplinary field of Chemistry tasked to solve cases that can only be explained or resolved by applying analytical methods of investigation and instrumentation with chemistry as the main core of discussion. Forensic chemistry is a broad and diversified field of science. It includes all branches of chemistry and the application of its principles to solve crimes when it arise in the administration of justice. Significantly, Forensic chemistry is vital in crime detection when the components or chemical composition, structure of physical evidence/s collected from the scene of the crime are needed to support in the speedy solution of crime. Application of forensic chemistry is legally applied to the following: 1. Primarily, Forensic Chemistry deals in the recognition, identification, preservation, packaging & transportation of physical evidence collected at the crime scene. 2. In crime detection, it is applied in the identification of poisons, blood, semen, feces, urine, saliva, and other body fluids whether fresh or dried. It also include other stains of interests from ob-gynecological origin, mineral stains, fruits and/or vegetable stains. 3. It is...
Words: 14017 - Pages: 57
...Introduction With the recent increase in financial crimes and business fraud, forensic accountants are in great demand. Forensic accounting is the practice of utilizing accounting, investigative, organizational, analytical and communicational skills to conduct examination into a company’s financial statements in legal matters (Crumbley, 2007). Forensic accountants can own their own accounting firms or be employed by lawyers, insurance companies, banks, or large corporations. The use of accountants has played an important role in assisting the government as well as the public. Forensic Accountants participate in detecting scandals and financial crimes caused by individuals, companies and organized crime networks. This profession consists of three main areas litigation support, investigation and dispute resolution (Harris, 200). Litigation support involves the factual arrangement of financial issues, investigation comes in when criminal matters have occurred, and the dispute resolution is the process of bringing justice and fairness. To work effectively within these three core components, forensic accounts must have a set of skills to perform their job efficiently. Important Skills Forensic Accountants must posses more than the fundamental knowledge of financial accounting and auditing. Each project requires analysis, interpretation, summarization and presentation of complex financial- and business-related issues (Matson, 2012). There are several core skills that are...
Words: 2124 - Pages: 9
...Computer Forensic Investigator’s Role in Cases Abstract Today, more and more people are using their computers for everything, from communication, to online banking and investing, to shopping. As we do these things on a more regular basis, we open ourselves up to potential hackers and attackers. While some may be looking to phish your personal or proprietary information and identity for resale, others simply just want to use your computer as a platform from which to attack other unknowing targets. The people responsible for computer security and digital forensic examination need to continually update their skills, tools and knowledge to stay abreast with fast growing technology of today. In this day and time you can no longer just unplug a computer and leave it to be evaluated later at the lab. Information that is on computers is so critical to the investigation of a case. Systems today can easily lose data just by unplugging and turning it off, making it hard to recover any evidence needed. Without policies and procedures, investigators, one wouldn’t know this, two would potentially destroy and corrupt any evidence admissible in court and the whole unit would be lost and a total failure. That is why it is important that management establish guidelines and procedures. Although with technology continuing to change, constant revisions will be made to these documents, but ensuring they stay updated is most crucial of all. Computer Forensic examiners and investigators have...
Words: 1408 - Pages: 6
...Assignment 1: Computer Forensics Overview CIS 417 Computer Forensics Computer forensics is the process of investigating and analyzing techniques to gather and preserve information and evidence from a particular computing device in a way it can be presented in a court of law. The main role of computer analyst is to recover data including photos, files/documents, and e-mails from computer storage devices that were deleted, damaged and otherwise manipulated. The forensics expert’s work on cases involving crimes associated with internet based concerns and the investigations of other potential possibilities on other computer systems that may have been related or involved in the crime to find enough evidence of illegal activities. Computer experts can also use their professional knowledge to protect corporate computers/servers from infiltration, determine how the computer was broken into, and recover lost files in the company. Processes are used to obtain this information and some of the processes are as follows; * Investigation process: Computer forensics investigations will typically be done as part of a crime that allegedly occurred. The first step of the investigation should be to verify that a crime took place. Understand what occurred of the incident, assess the case, and see if the crime leads back to the individual. * System Description: Next step, once you verified the crime did occur, you then begin gathering as much information and data about the specific...
Words: 1397 - Pages: 6
...Digital Forensics is an important aspect to computer systems security. I mean we are talking about Identifying, Collecting, Preserving, Analyzing, and Presenting evidence digitally. Therefore, preserving electronic evidence is important. Investigating Data Theft is a malice act towards a company/ organization (Kruse, 2001). Such theft is made by an employee that is either terminated or resigning. Motives for data theft include setting up a competing business, using the information at a new job, sense of ownership of what was created, and revenge against the employer, among other things. Common Theft include, customer information, financial records, software code, email lists, strategic plans, process documents, secret formulas, databases, research and development materials, and employee records. Now, with such theft around, we often wonder how is such theft achieved. Knowing how technology is always advancing each year, the millennium era grows with fascinating knowledge on the know how to working a computer, hard drives, etc. Tools like flash drive, which can hold thousands of documents that can be copied to the flash drive, and taken anywhere. Then you have Dropbox, remote desktop connections, personal email accounts, smart phones, CD’s/DVD’s, and FTP ( File Transfer Protocol ) (Kruse, 2001) There is always this saying, that personnel who steal data often leave a trail of digital evidence that proves invaluable when investigating data theft. We as the forensic specialists...
Words: 1774 - Pages: 8
...Assignment #3 Forensic Accounting in Practice Professor Demetrius Carolina, Sr. Bus 508-Contemporary Business February 16, 2013 The purpose of my paper is to explore Forensic Accounting and the many aspects surrounding the field. I will determine the skills necessary to be a forensic accountant and its application to business operations. I will also describe the role the forensic accountant plays in a courtroom environment and the role played by the forensic accountant in the litigation process. I will also provide case examples where forensic accountants are used and have provided vital evidence in the case. Today, forensic accounting is a rapidly growing segment of the accounting practice, and the current demand for forensic accountants far outstrips the current supply. Determine the most important five (5) skills that a forensic accountant needs to possess and evaluate the need for each skill. Be sure to include discussion regarding the relationship between the skill and its application to business operations. Have you ever been cheated, robbed or financially hurt by actions of others? Well, out of those feelings civil lawsuits arise based on the desire to reclaim what one perceives he/she has lost unjustly. Financial loss isn’t always easy to define or measure. So, the important task of investigating and quantifying the financial loss normally requires the expertise of a forensic accountant. A forensic accountant is a professional who uses a unique...
Words: 2645 - Pages: 11
...Computer Forensic Analysis and Report Nathaniel B. Rollins Jr Kaplan University Computer Forensics I/CF101 Prof: Tatyana Zidarov November 19, 2012 Computer Forensic Analysis and Report A. INTODUCTION I Nathaniel B. Rollins a Computer Forensic Specialist (CFS) with the Metro Police Department (MPD) received a file image from Officer X to conduct a search for electronic evidence. Which he stated was copied from the SNEEKIE BADINUF (COMPLAINANT) computer, with consent. This was verified through COMPLAINANT statement, repot, consent to search form, and chain of custody, provided by Officer X, along with the request for analyzing the evidence. Upon reviewing of her statement filed on May 14 2006, the COMPLAINANT stated she had received an email from a correspondent named NFarious that demanded $5000 in ransom, or the animals would be harmed. The COMPLAINANT also stated her pets had been gone for an entire week, and she was worried that the abductor may already have injured the animals. During a subsequent interview the COMPLAINANT stated that she took out a $20,000 insurance policy on her pets in September 2005 that would not be active for 6 month. The purpose of this investigation is to confer or negate the COMPLAINTANTS involvement with the kidnaping of the animals. B. MATERIALS AVAILABLE FOR REVIEW a. 1 Chain of Custody b. Evidence Log c. Complainants Statement d. Officers Report e. Forensic Disk Image of Computer f. Photos (location...
Words: 1176 - Pages: 5
...Blood Spatter Pattern Analysis Kimberley Kanuch-Brown Everest University Abstract Given that blood spatter analysis is an emergent field, with rapidly occurring developments have significant probative implications for the court system, this project will seek to examine the multi-faceted elements of blood spatter analysis to provide an overview of the field’s different dimensions. Focusing on technical developments, analytical interpretation and court relevance, the project will propose that blood spatter’s analysis as a mainstream element of the CSI toolkit results from the combination of physical sciences and analytical rigor which lies at its core. Beginning with questions of technical and physical science, the project will examine the manner in which blood spatter analysis is increasingly capable of understanding how human usage of different weapons impacts the static nature of a given crime scene. Moving to questions of interpretation, the project will touch upon the manner in which information technology is improving the rigor and caliber of analysis, and thus leading to greater continuity and replicability in blood spatter analysis. Concluding, it will examine the manner in which the court system is now viewing blood spatter analysis with greater heft because of these developments. Blood Spatter Analysis and Science Beginning with questions of science, the work of Randall (2009) demonstrates how even the most esoteric of weapons can be analyzed using blood-spatter...
Words: 2999 - Pages: 12
...Forensic Accounting in Practice Twana Bethea BUS 508 May 21, 2013 Dr. Phyllis Praise Abstract Forensic Accounting is the application of the skills and training of a chartered accountant to disputes and investigations. Fraud is usually hidden in the accounting systems of organizations and that’s where forensic accountants play a critical role. Forensic accountants are contacted by companies when they need to figure out where a fraud was committed in their company. The accountants interview witnesses, analyze evidence such as email traffic between all parties involved. They will also freeze bank accounts if needed. They are hired to find out what happen and who was involved. If the case goes to trial they can be called to testify. The key skill of the forensic accountant is communicating complex financial transaction or data in a concise manner using images, graphs and languages that can be easily understood by non-accountants, the judiciary, and juries. With the growing complexity of business related investigations, Forensic Accounting professionals are increasing and the need is as well for investigations of business and financial issues. Forensic Accounting Practices Forensic Accounting has been in exist for many years, today there have been an increase in the need for this type of profession. Forensic accounting is the practice of integration of accounting, auditing and investigative skills. The accountings provide a court with an accounting analysis on the basis...
Words: 1442 - Pages: 6