Premium Essay

Forensic Analysis

Submitted By
Words 1959
Pages 8
Late at night in a dark room, a man in a grey sweatshirt walks down the stairs. He holds an object in his hand. Light glints off of it. The item has been made visible—he has a knife. The blade drips a crimson liquid onto the cold, hard, cement floor. He walks toward a figure. Turning on an overhead light, he reveals the unknown. A bloody, battered woman lies against a pole with her hands bound behind her. As she becomes conscious, she sees the man before her.
With eyes bulging out of her head, she fearfully screams, “No! Please don’t!”
With a slash and a final soul-shattering scream, blood splatters on the wall and the room goes dark. She was the last of thirteen.
Every second a people commit crimes. From the most heinous to the most common—murder …show more content…
This program follows the career of Doctor Temperance ‘Bones’ Brennan as she works as Forensic Anthropologist alongside her team and the FBI. By using her knowledge of the human skeletal system, Temperance identifies the gender, race, and age of the victims. Bones holds the title of one of the most factual—yet fictional— television program on the T.V;however, not everything that appears remains factual. One of the most obvious mistakes appears in how fast Temperance deduces the majority of the characteristics of a victim. “As the show is written by a forensic anthropologist (Kathy Reichs) all of the procedures and methodologies Dr. Brennan uses are real, HOWEVER, she is usually able to assess a victim age and sex from a quick look at the bones at the crime scene, this is simply not true” (Calmon, “How Realistic is …show more content…
Brennan works closely with a team of individuals that includes a Forensic Entomologist known as Doctor Jack Hodgins. He,similarly, works alongside the FBI to help identify the time of death and sometimes may be able to reveal where a victim died. Forensic Entomology applies the knowledge of entomology—the study of insects—to legal matters. “Forensic applications of entomology have long had an important role in both civil and criminal legal cases. Indeed, forensic entomology may be said to go back at least as far as the thirteenth century…” (Murad, “Forensic Entomology”). Bones reveals the interworks of the relationships between people in the FBI and other investigative organizations. Bones remains one of the only shows that reveals an indepth look into forensics. This show has inspired a multitude of people to pursue not only a career in criminal justice but a career in forensics as well.
A man in a grey sweatshirt reclines in a chair located in his cold, damp basement. He cleans the blood off a sharp, shiny, and black-hilted knife. He believes that he will go down in history as the greatest master serial killer ever in existence. On the contrary, his perfect world will soon shatter. Standing outside his house awaits the FBI. They have prepared to breach and capture these

Similar Documents

Premium Essay

Forensic Analysis Of DNA

...New Methods for the Forensic Analysis of DNA By Professor David S. Haymer I attended the lecture by Professor Haymer about new methods for the forensic analysis of DNA. Forensic science has long been used in the US legal system for classic fingerprints, lie detector tests and others. Even though the use of DNA evidence is relatively new, it has changed a lot about forensic science and how things are done. It’s changed the legal standards for use of forensics in the courtroom and the way the evidence is collected and preserved, and how police are trained to investigate crimes. DNA is considered to be superior in many ways to other forms of forensic evidence like fingerprints, hair analysis and serology tests. The only DNA forensic evidence...

Words: 310 - Pages: 2

Premium Essay

Forensic Hair Analysis

...Forensic Hair Analysis Forensic hair analysis is a method of studying hair found at the scene of a crime, and the scientific study of hair is referred to Trichology. In this paper I will discuss the different techniques that are used to study hair during an investigation and the many different aspects of the hair to consider based on what type of investigation is taking place. Hair analysis can be used to determine the presence of a suspect at the scene or to detect the presence of certain chemical substances in the victim or suspect. With the help of DNA techniques used in forensic hair analysis an absolute match can be determined by examining hair found at the scene of a crime. According to Douglas Deedrick of the FBI’s Trace Evidence Unit, Humans shed an average of 100 hairs daily and are often used in violent crime investigations such as: homicides, assaults, burglaries, and armed robberies. (Deedrick, 2000) The most useful hairs in a crime scene investigation are longer hairs found on the scalp but can be subject to changes due to hair colorings or a simple haircut. In order to prevent this outside exposure samples should be taken from potential suspects as soon as possible after the crime to avoid any possible contamination. According to Deedrick, examining a hair under a microscope can help to determine many things about the source of the hair and even how the hair was lost either through shedding or by force, or from which location on the body the hair originated...

Words: 1791 - Pages: 8

Free Essay

Computer Forensics Analysis Project

...Computer Forensics I (FOR 240-81A) Project #3 Case Background The Suni Munshani v. Signal Lake Venture Fund II, LP, et al suit is about email tampering, perjury, and fraud. On December 18, 2000, Suni Munshani (Plaintiff) filed a suit against Signal Lake Venture Fund. Mr. Munshani claimed that he was entitled to warrants in excess of $25 million dollars from Signal Lake. In February 2001, Signal Lake Venture Fund II, LP, et al. (Defendant) became privy to the court filings in this case. Within the filings there was an email provided by Mr. Munshani from Hemant Trivedi, CEO of one of the portfolio companies, stating he was indeed entitled to the warrants. Mr. Trivedi denied any knowledge of the email, or any such communication with Mr. Munshani. In an effort to prove their innocence, Signal Lake hired a computer forensic group to conduct a private investigation. The investigation did not show any evidence of the supposed email provided to the court by Mr. Munshani. Mr. Trivedi filed an affidavit stating that the email was forged, while Mr. Munshani filed an affidavit stating the email was real. In March 2001, a computer forensics expert, Kenneth R. Shear, was appointed by the court to perform a forensic examination on the questioned message (the message provided by Mr. Munshani) and the comparative message (a second message from Mr. Trivedi found on Mr. Munshani’s computer). Mr. Shear worked for a company called Electronic Evidence Discovery, Inc. (EED). Mr. Shear’s forensic...

Words: 799 - Pages: 4

Premium Essay

Computer Forensic Analysis and Repor

...Computer Forensic Analysis and Report Nathaniel B. Rollins Jr Kaplan University Computer Forensics I/CF101 Prof: Tatyana Zidarov November 19, 2012 Computer Forensic Analysis and Report A. INTODUCTION I Nathaniel B. Rollins a Computer Forensic Specialist (CFS) with the Metro Police Department (MPD) received a file image from Officer X to conduct a search for electronic evidence. Which he stated was copied from the SNEEKIE BADINUF (COMPLAINANT) computer, with consent. This was verified through COMPLAINANT statement, repot, consent to search form, and chain of custody, provided by Officer X, along with the request for analyzing the evidence. Upon reviewing of her statement filed on May 14 2006, the COMPLAINANT stated she had received an email from a correspondent named NFarious that demanded $5000 in ransom, or the animals would be harmed. The COMPLAINANT also stated her pets had been gone for an entire week, and she was worried that the abductor may already have injured the animals. During a subsequent interview the COMPLAINANT stated that she took out a $20,000 insurance policy on her pets in September 2005 that would not be active for 6 month. The purpose of this investigation is to confer or negate the COMPLAINTANTS involvement with the kidnaping of the animals. B. MATERIALS AVAILABLE FOR REVIEW a. 1 Chain of Custody b. Evidence Log c. Complainants Statement d. Officers Report e. Forensic Disk Image of Computer f. Photos (location...

Words: 1176 - Pages: 5

Free Essay

Computer Forensics Case Analysis

...Project 1 Case Analysis CCJS321 The two cases I have chosen to analyze for Project One is the Max Ray Butler aka “Iceman” cybercrime case and the Albert Gonzalez cybercrime case. I have chosen these two cases because they both had significant impact on the computer forensics field. Both of these cybercrimes are similar in nature because both deal in credit card and identity theft on the grandest scale. Max Ray Butler and Albert Gonzalez were brought to justice after many years of a cyber-forensic investigation that went through a network of multiple U.S. agencies; including the FBI, US Secret Service and US-CERT (United States Computer Emergency Readiness Team) a Department of Homeland Security who were all networked together at the National Computer Forensic Training Academy in Pittsburg, Pennsylvania. Both of these men were given the longest prison sentences ever handed out by a judge for computer crimes of their notoriety and magnitude. Finally, they both set a blue print for digital forensic investigators of the proper procedures to follow in order to capture future want-to-be crime lords. Max Butler aka “Iceman” was a white-hat hacker that went rogue. His story is that, “he was a good hacker hired by the government to test the security of one of their websites, while doing that job he installed a backdoor to their system that would allow him to come in later so he could make some fixes to the system on his own time. Well of course this second part of the...

Words: 1323 - Pages: 6

Free Essay

Forensic Pathology and Miscarriages of Justice: a Journal Article Analysis

...Forensic Pathology and Miscarriages of Justice: a Journal Article Analysis Merlyn Arostegui Prof. Sigal CRJU 443 | Forensic Pathology and Miscarriages of Justice: a Journal Article Analysis The article chosen for analysis is titled “Forensic Pathology and the Miscarriage of Justice” written by Michael S. Pollanen of the Centre of Forensic Science and Medicine, University of Toronto in Toronto, Canada. The article was published in Forensic, Science, Medicine, and Pathology in 2012. The main purpose of the article was to present the fact that in order for the criminal justice system to operate in a safe and fair manner, any evidence presented in the duration of a prosecution must be accurate and objective—especially medical evidence. If either the accuracy or objectivity of evidence presented is compromised, there lies the possibility of unsafe prosecution which can lead to wrongful convictions or other forms of miscarriages of justice. Main Purpose There has been an increased awareness in the number of cases that have experienced a miscarriage of justice due to compromised medical evidence being presented during trial. Although there are legal tools available to regulate the types of evidence admissible in court as well as the “experts” allowed to present said evidence [such as Daubert hearings], these tools are only partially effective because forensic pathology is a discipline that grows and develops over time. The accepted view in pathology [or any field of science...

Words: 1591 - Pages: 7

Premium Essay

Texas Forensic Analysis

...The Texas Forensic Science Commission, or otherwise know as the FSC, is a state agency of Texas. The FSC is located at the College of Criminal Justice of Sam Houston State University in Huntsville. The mission of the FSC is to strengthen the use of forensic science in criminal investigations and courts. The commission has nine members, all of whom are appointed by the governor of Texas. Seven of the members are scientists and the other two are attorneys. The commission is required to investigate allegations of negligence or misconducts that would substantially affect the integrity of the results of a forensic analysis conducted by an accredited laboratory, facility, or entity. The Legislature, who is the creator of the FSC, requires the Commission to develop and implement a reporting system through which accredited laboratories, facilities, or entities may report professional negligence or misconduct. The commission may investigate complaints involving forensic disciplines that are not subject to accreditation under Texas law, with the exception of autopsies. The commission may also start an investigation of a forensic analysis for educational purposes to advance the integrity and reliability of forensic science in Texas....

Words: 546 - Pages: 3

Premium Essay

Forensic Evidence Analysis

...Forensic Evidence Analysis of The Innocence Project data shows that there were errors in the forensic science in 63% of their cases (Cole, 2012). Forensic science is solely based on subjective opinion, and with few processes being backed scientifically, are usually unreliable. Hair comparisons, fingerprint comparisons, bite-mark analysis, shoe print comparisons and voice comparisons have been pointed out as having poor accuracy. Another problem comes with expert testimony, as testifying on a technique with an unknown accuracy should hold no value. The Innocence Project data stated that 61% of 153 cases had invalid expert testimony. Phrases such as “consistent” and “similar” are often used during forensic expert testimony, and while they hold no inherent meaning, they are seen as very valuable to a jury. (Cole, 2012). Forensics in the case The cases against Jessie Miskelley and Damien Echols and Jason Baldwin seem to be circumstantial on hearsay. Not a lot of forensic...

Words: 424 - Pages: 2

Premium Essay

Forensics Team Analysis

...together, we celebrate together, but most importantly we grow together. During my time at Menomonee Falls High School, I have witnessed the growth of my peers’ minds and talents as well as my own. The beautiful part, however, is that the passions that matured usI have simultaneously brought us closer together. The experiences within my forensics team in particular shine as examples of the opportunities that I have had to encourage growth and improvement in others. I joined the forensics team in the winter of 2012 as a timid freshman and have never looked back. At my first tournament, I was transfixed with my competitors speaking abilities; their animation and genuine passion inspired me to see the delight of public speaking as well. I spent the remainder of the freshman season researching, practicing, and perfecting my own piece as well as the other speech categories. By the end of the season, I was happy to be a part of the Menomonee Falls...team of three students. I knew that with the right attitude, I could finally establish the interest that the forensics team deserved. Over the next three years, I devoted my time to developing a strong forensics team. From SPIN night to freshman...

Words: 536 - Pages: 3

Premium Essay

Information System Technology

...Assessment Worksheet Documenting a Workstation Configuration Using Common Forensic Tools Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you performed a forensic analysis of a Windows 2012 machine using three commonly available tools: WinAudit, DevManView, and Frhed. You reviewed the forensic capabilities of each tool, using the sample files provided, to determine any clandestine threats or vulnerabilities such as viruses and malicious software. You also recovered a file that was altered to hide its native file format. You documented your findings in a forensics report. Lab Assessment Questions & Answers 1. What is the main purpose of a software tool like WinAudit in computer forensics? 2. Which item(s) generated by WinAudit would be of critical importance in a computer forensic investigation? 3. Could you run WinAudit from a flash drive or any other external media? If so, why is this important during a computer forensic investigation? 4. Why would you use a tool like DevManView while performing a computer forensic investigation? Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Student Lab Manual ...

Words: 295 - Pages: 2

Premium Essay

Virtopsy Forensic Analysis

...However, there are a number of restrictions or limitations in the application of virtopsy in forensic investigations. First, the technique is insufficient in carrying out a diagnosis of natural causes of death, heart failure, poisonings, infections, and strokes (Christe et al, 2010). Moreover, scholars have underlined the necessity of developing special techniques that allow computers to accurately interpret the scans, in cases where the body is much colder. It is worth noting that MRI machines function through translating the signature vibrations produced by the nuclei pertaining to the varying forms of atoms. Such nuclear vibrations slow down at cooler temperature, thereby limiting the application of such machine (Bixby, 2010). Moreover, it is well acknowledged that the images generated or produced in the course of CT...

Words: 678 - Pages: 3

Premium Essay

Forencis Science Answer Sheet

...Name: Date: TRUE/FALSE Directions: Answer each of the following by indicating if the statement is TRUE or FALSE 1. The word forensics refers to the application of scientific knowledge to legal questions. TRUE 2. A fact is a statement or assertion of information that can be verified. TRUE 3. What we perceive about a person depends in part on their mannerisms and gestures. TRUE 4. Good observation skills come naturally to investigators. They do not need to be trained. FALSE 5. The first task of forensic scientists is to find, examine, and evaluate evidence from a crime scene. TRUE 6. The Innocence Project is an organization that seeks to get convicted killers out of prison. SKIP 7. Our emotional state influences our ability to see and hear what is happening around us. TRUE 8. If we remember seeing something happen, we can trust that is happened just as we think it did. FALSE 9. Through our senses of sight, taste, hearing, smell, and touch, we gather every single moment about what is around us. TRUE 10. Most wrongful convictions seem to be the result of faulty eye-witness testimony. TRUE MULTIPLE CHOICE Directions: Answer the following questions with the choice that best answers the question 1. One of the important tools of the forensic investigator is the ability to: (a) a. Observe, interpret and report observation clearly b. Observer assumptions clearly. c. Report assumptions...

Words: 1075 - Pages: 5

Premium Essay

Forensic Science: Genetic Analysis

...Analysis of DNA samples to identify individuals by characteristics of their DNA, known as DNA profiling, is used in forensic science to establish the guilt or innocence of criminal suspects, to identify victims, to determine paternity, and to contribute to basic research. The polymerase chain reaction (PCR) is used to replicate certain regions of the DNA sample. The short tandem repeat (STR) analysis is used to compare the length of STR sequences at specific sites in the genome. In the restriction fragment length polymorphism (RFLP) analysis, a DNA sample is cut into small pieces using a restriction enzyme, which are them separated by size and made visible on a gel. Population evolution, the generation-to-generation changes in a population’s frequency of alleles, can be used to estimate the frequency of a harmful allele, which can be useful in dealing with genetic diseases. Three examples of this evolution are genetic drift, gene flow, and natural selection. Genetic drift is a change in the gene pool of a small population due to chance. Gene flow is a genetic exchange with another population, which may add or remove alleles. In natural selection, the individuals with heritable traits suitable to the local environment generally leave more surviving, fertile offspring....

Words: 1104 - Pages: 5

Free Essay

Security Job Search

... Title: Forensics Managing Specialist –Security JOB DESCRIPTION All Forensics Candidates are encouraged to apply. Jr. to Sr. level positions are available from 2 years to 10+ years experience. Salary based on experience. A Bachelor's Degree in Forensics or related is a plus. This is a full time perm position. Must be willing to travel nationwide. Our client’s computer forensics team is a comprehensive solution for global data collections and forensic analysis. They offer best-in-class security. From small to large matters, they provide easy to understand interpretations of findings and a single point of contact. The Managing Consultant utilizes state of the art techniques that enable the recovery and use of critical electronic evidence for litigation, investigations and other fact-finding exercises. The Computer Forensics Managing Consultant establishes whether evidence has been erased or modified; analyzes electronic content and patterns of Internet and e-mail usage; recovers deleted data; and assesses and explains metadata within recovered files. RESPONSIBILITIES Manage day to day activities for projects involving computer forensics, information security or rapid response data breach matters. Manage large data preservation and collection activities to ensure that accepted forensic protocols; create and maintain Chain of Custody; document the handling of evidence. Analyze log files from firewalls, web servers and computers. Conduct forensic analysis and write...

Words: 585 - Pages: 3

Free Essay

Assignnment Template

...Job Title | Description | Skills Required (list at least five skills, three of which are specific skills in the field of criminal justice). | Why are the skills listed needed to succeed in the position? | Computer Forensics Science Technicians | Forensic science technicians help investigate crimes by collecting and analyzing physical evidence. Many technicians specialize in either crime scene investigation or laboratory analysis. Most forensic science technicians spend some time writing reports. | Skills required for this career are: communication skills; composure; critical thinking skills; detail oriented; as well as problem solving skills. | Forensic science technicians write reports and testify in court. They often work with other law enforcement and specialists. Crime scenes are often the results of acts of violence and destruction, but technicians have to maintain their professionalism and objectivity. Forensic science technicians use their best judgment when matching physical evidence, such as fingerprints and DNA, to suspects. Forensic science technicians must be able to notice small changes in mundane objects to be good at collecting and analyzing evidence. Forensic science technicians use scientific tests and methods to help law enforcement officials solve crimes. | Information Security Analyst | Information security analysts plan and carry out security measures to protect an organization's computer networks and systems. Their responsibilities are continually expanding...

Words: 529 - Pages: 3