Free Essay

Types of Forensics

In:

Submitted By Spandana
Words 1917
Pages 8
FORENSICS
Forensics, by and large, is the application of science to the legal process. It is an emerging research domain in India. There are many different types of forensic sciences baring their vital presence possibly in every field of human endeavor. Of these, let us now discuss about the computational, cyber and the DNA forensics.

COMPUTATIONAL FORENSICS:
The development of computational methods or mathematical and software techniques to solve forensic issues is called computational forensics. These methods analyze the evidence beyond human cognitive ability. They scrutinize a large volume of data, which is at any case impossible for a human mind to figure out. In spite of this, we can’t say that these techniques alone would serve our purpose because computational forensics is a field which needs huge collaboration between recognition and reasoning abilities of humans combined with comprehension and analytic abilities of the tool or a machine, which is most of the times, a computer.
Computational forensics aids us to model the uncertain. At the crime scenes, we usually get incomplete or broken evidences. These evidences are later on modeled by the computational forensic tool which gives us first clues from its largest biometric database (fingerprints, criminal histories, mug-shots, scar and tattoo, physical characteristics like height, weight, hair and eye color and aliases), which is a collection of significant information regarding the criminals, their criminal history and the nature of crimes committed. It gives possible hints and suggests possible matches of who the suspect is.
Computational forensics is not as easy as it seems. It is an intrinsic process whose central themes are accuracy and precision. For example, during finger – print analysis, as finger – prints are invisible to the naked eye, a computational forensic scientist lifts evidences carefully using either powder or ultraviolet illumination, avoiding the possibility of misinterpretation on the part of computer. In this type of cases, they employ techniques such as predicting the core point of finger - print, usually the center in the finger around which the ridges flow. By this, they guess from which part of the finger it came from and thus orient the print for further analysis. Usually, this sought of examination provides them with three kinds of results namely individualization (where there are strong evidences to confirm the identity of the suspect), exclusion (where they are unlikely to confirm who the suspect is and rely on elimination by which few possibilities are ruled out) and inconclusive (where they are in a dilemma). This categorization is not only limited to computational forensic scientists. These are the areas which any forensic scientist will experience in his life – time.

CYBER FORENSICS:
Cyber forensics is also known as computer forensics, which is a kind of digital forensics, or forensic information technology. It is usually the process of extracting lost (or) manipulated data from the computer storage media. They help in maintaining information security and also protect corporate assets. It deals with intensive data analysis. Electronic evidences are fragile and can easily be modified. Additionally, cyber thieves, criminals, and dishonest employees hide, wipe, disguise, cloak, encrypt and destroy evidence from storage media. In order to prevent these and analyze every possibility, cyber forensic scientists collect the content of all servers, personal computers, mobile phones, PDAs (Personal Data / Digital Assistants), printers, copiers, backups, etc. After this, they also collect data from paper documents and surf the net, to connect the dots pertaining to data specified by all these devices.
The scope of a forensic analysis can vary from simple information retrieval to reconstructing a series of events. It also investigates a wide variety of crime like child pornography; murder; money laundering; and cyber warfare, a product of international terrorism. Computer forensics has been used as evidence in criminal law since the mid 1980s. The recent case of Michael Jackson’s mysterious death accounts recovery of its major evidence to cyber forensics. Dr. Conrad Murray, the doctor of the deceased Michael Jackson, was convicted partially by digital evidence on his computer. This evidence included medical documentation showing lethal amounts of propofol.
A number of techniques like cross – drive analysis (correlates information found on multiple hard drives by which social networks are identified), live analysis (examining the operating system [OS], imaging the hard drive volume, etc.), retrieval of deleted files (though files are deleted, they are still stored in the OS and can be reconstructed from physical disk sectors), and tracing of volatile data (using a software like Capture GUARD Gateway which bypasses windows login on locked computers of the accused) were used during computer forensics investigations.
The live analysis is a complicated process which has to be done before the machines’ battery is low as charging heats up the sensors, leads to thermal runaway and affects the accuracy of data leading to cold boot attack (low temperatures and high cell voltages increase the time of data recovery). Maybe, it is due to this sensitiveness that these machines are put in AC rooms. In case we have no other option but to charge a died down computer, we have to provide the machine with continuous power supply using UPS (Uninterruptible Power Supply) and shouldn’t allow the screen to go blank i.e; operate the mouse – jiggler (move the mouse rapidly in small movements). However, one of the easiest ways to capture data is by actually saving the RAM data to disk. The other techniques used include reviewing the Windows registry for suspect information, discovering and cracking passwords, keyword searches for topics related to the crime, and extracting e-mails through IP tracking.
So far, we have seen only one side of a coin and the other side of equal potential is also awaiting our due attention, that is, the perpetrators of crime came up with a conflicting branch called Anti – computer forensics which employs techniques such as IP Address Spoofing, attaching virus through spyware, malware and adware, and of course, hacking. The terror attacks in Mumbai, though are known to take place due to negligence of authorities, the principle reason behind them are master minds who employed IP address spoofing for financial transactions and planning the attacks. Computer forensics also detects practices like steganography, the process hiding data inside of a picture or digital image. These pictures / images are easily traceable as they have a unique has tag (#) that can be detected by computer forensic analysis.

Finally, to avoid confusion and differentiate between computational and computer / cyber forensics, in the former, the crime is committed out there and evidences are predicted to greater perfection with the aid of computer. In the latter, crime takes place within the computer, that is, the computer, along with its owner is victimized by the perpetrator.

DNA FORENSICS:
This is a distinct field of forensics that deals with the alphabet of life, the DNA. Every cell in our body contains DNA. 99.9 % of human DNA is the same in everyone, only 0.1% of our DNA is unique. Each human cell contains three billion DNA base pairs. Our unique DNA, 0.1 percent of 3 billion, amounts to 3 million base pairs. This is more than enough to provide profiles that accurately identify a person. DNA is generally collected from samples of blood, saliva, urine, hair, nails, etc. The method of DNA procurement has transformed tremendously all these years. In olden days, the DNA has to be in the size of a dime to profile it. But, now – a – days, even saliva from that of a cigarette butt is also enough.
The father of DNA forensic analysis is Alec Jeffery. In 1985, he discovered the method of DNA fingerprinting (also known as DNA profiling or DNA typing), which is nothing but the process of maintaining the largest biometric database as in computational forensics, but here the profile is summarized with the help of DNA where information regarding the person’s physical or psychological characteristics, diseases or predisposition for diseases is also detected, but usually not disclosed. This, no doubt revolutionarized the whole field of forensics and today, national and international law enforcement agencies exchange DNA profiles found at crime scenes to identify serial perpetrators and to help solve crimes around the globe.
There are many DNA databases all around the world, but the one that is considered as a standard is the CODIS (COmbined Dna Index System) database. A CODIS consists of two indexes. The Convicted Offender Index which contains DNA profiles of individuals convicted of felony sex offenses (and other violent crimes), and the Forensic Index which contains DNA profiles developed from crime scene evidence. There are different methods by which DNA profiling can be done. These include Restriction Fragment Length Polymorphism (RFLP), PCR (Polymerase Chain Reaction) Analysis, STR (Short Tandem Repeat) Analysis, Mitochondrial DNA Analysis, and the Y-Chromosome Analysis where the perpetrator containing XY chromosome is identified as male and XX chromosome as female and the one belonging to neither of the two as trans – gender. All DNA profiles stored in CODIS are generated using STR analysis. If a match is made between a sample and a stored profile, CODIS can identify the perpetrator. This technology is authorized by the DNA Identification Act of 1994.
But, the main constraint of DNA forensics is that there is every possibility of evidence tampering and contamination, that is, the DNA of the suspect might be mixed up with that of the victims’ (called as cross – contamination) or any random person. This method is complex due to its susceptibility in every part of the world, especially in India because people spit and urinate on roads, leading to environmental contamination and that of the DNA as well. It is due to this that there are debates on the authenticity and the reliability of DNA as evidence. In order to avoid this contamination, at least on the part of forensic scientists, they were supposed to change gloves frequently and use disposable tools for collection and detection.
DNA is not only useful for detecting crimes. It can also be used for identifying the victims of blasts (ex: 9/11, World Trade Centre attack), re – uniting families displaced due to war (ex: the Holocaust of Europe), and establishing the biological parents (N. D. Thiwari case). A relatively new method that recently emerged is DNA sketching, by which we could predict the features and nationalism of the suspect and draw a sketch of it, making our investigation easy, as large part of the world population could be eliminated by this.

REFERENCES
Note: Article name followed by Link is listed below. * CEDAR forensics file:///E:/forensics/computational/CEDAR%20Forensics.htm * Computational forensics file:///E:/forensics/computational/Computational%20Forensics.htm * How rare is the finger print? file:///E:/forensics/computational/How%20rare%20is%20that%20fingerprint%20%20Computational%20forensics%20provides%20the%20first%20clues.htm * IWCFI report - 5 file:///E:/forensics/computational/IWCF12%20-%20Home.htm * Computer forensics wiki file:///E:/forensics/cyber,%20computer/Computer%20forensics%20-%20Wikipedia,%20the%20free%20encyclopedia.htm * Cyber forensics in India file:///E:/forensics/cyber,%20computer/CYBER%20FORENSICS%20IN%20INDIA.htm * Cyber forensics file:///E:/forensics/cyber,%20computer/Cyber%20Forensics.htm * Can DNA demand a verdict? file:///E:/forensics/DNA%20forensics/Can%20DNA%20Demand%20a%20Verdict.htm * Forensic DNA file:///E:/forensics/DNA%20forensics/DF.htm * INTERPOL and forensic investigation file:///E:/forensics/DNA%20forensics/DNA%20_%20Forensics%20_%20INTERPOL%20expertise%20_%20Internet%20_%20Home%20-%20INTERPOL.htm * DNA forensics file:///E:/forensics/DNA%20forensics/DNA%20Forensics.htm * The history of DNA forensics
file:///E:/forensics/DNA%20forensics/The%20History%20of%20DNA%20Forensics%20_%20eHow.com.htm

Similar Documents

Premium Essay

Gunshot Wounds To The Spine Case Study

...Forensic Significance of Radiography in Evaluation of Gunshot Wounds to the Spine Samantha Lawson Introduction Gunshot wounds cases are continuing to increase across the country. One of the most severe cases of gunshot wounds is the spinal injuries as a result of penetration of bullet fragments towards the spinal column. Determining the projectile of the bullet and its position is vital for physicians to treat such an injury. Forensic Radiography is a technique that can be used in medical facilities to determine the exact position of the bullet fragments. Forensic Radiography is quite useful in the medical profession. Understanding the right type of radiography is vital in ensuring that physicians are able to make sound decisions in treating patients with spinal injuries as a...

Words: 3033 - Pages: 13

Free Essay

Forensic Accounting

...Forensic Accounting Forensic Accounting has a broad range of opportunity, and there are many different purposes for forensic accountants. Forensic Accountants are highly in demand during periods of financial crisis, and soaring bankruptcy rates (Chiang, 2013). The recession has generated a high demand for this type of accounting. Today we have decided to write about the two different types of forensic accounting, who they are employed by, and finally, how forensic accounting is emerging, and had changed over the recent years. “Forensic Accountants are often called upon to analyze, interpret, and present complex issues” (Forensic accounting.com) Forensics may also have refined computer programs that help with the process, while they assist in legal proceedings (Chiang 2013).Firstly, there are two different types of Forensic accountants; Litigation Support and Investigative. The nature of litigation support corresponds with economic damages (Forensic Accounting.com); this may include partnership disputes, criminal investigations, medical malpractice claims, personal injury, and loss of breach of contract (Chiang, 2013). Another type of Forensic accounting is investigative (Chiang, 2013). This type of forensics deals with professional negligence, business and/or employee fraud, embezzlement, theft, internal auditing, observing employees, etc. (Chiang, 2013). The list for investigative accounting is quite large. Secondly, in order for forensics to participate in law they must...

Words: 531 - Pages: 3

Premium Essay

Forensic Science Essay

...The definition of forensic science is all sciences that are applied to the law. There are many different types of forensic sciences: forensic psychology, forensic nursing, forensic anthropology, forensic pathology, crime scene investigations, etc. For these sciences to run smoothly and efficiently, technology must be used. The technology for forensic science has evolved and developed in a short amount of time. Forensic psychology is the interaction between psychology and the law. Psychologists who are interested in these jobs usually work with criminals in jails, rehabilitation centers, prisons, government agencies, police departments, etc. Technology can be used in this branch of forensic science like electronic stress assistants and the software “Optimism”. These...

Words: 715 - Pages: 3

Free Essay

A History of Modern

...Guide to Computer Forensics and Investigations Fourth Edition Chapter 7 Current Computer Forensics Tools Objectives • Explain how to evaluate needs for computer forensics tools • Describe available computer forensics software tools • List some considerations for computer forensics hardware tools • Describe methods for validating and testing computer forensics tools Guide to Computer Forensics and Investigations 2 Evaluating Computer Forensics Tool Needs • Look for versatility, flexibility, and robustness – – – – – OS File system Script capabilities Automated features Vendor’s reputation • Keep in mind what application files you will be analyzing Guide to Computer Forensics and Investigations 3 Types of Computer Forensics Tools • Hardware forensic tools – Range from single-purpose components to complete computer systems and servers • Software forensic tools – Types • Command-line applications • GUI applications – Commonly used to copy data from a suspect’s disk drive to an image file Guide to Computer Forensics and Investigations 4 Tasks Performed by Computer Forensics Tools • Five major categories: – – – – – Acquisition Validation and discrimination Extraction Reconstruction Reporting Guide to Computer Forensics and Investigations 5 Tasks Performed by Computer Forensics Tools (continued) • Acquisition – Making a copy of the original drive • Acquisition subfunctions: – – – – – – – Physical data copy Logical data copy...

Words: 2076 - Pages: 9

Premium Essay

Forensic Computing Practice Case Study

...SCHOOL OF COMPUTING Bachelor of Computer Science / Bachelor of Software Engineering Forensic Computing Practice Assignment 2 Student declaration: I declare that:  I understand what is meant by plagiarism  The implication of plagiarism have been explained to me by our lecturer This assignment is my own work. Name ID 1)Nicholas Tan Tian Shen 0307878 Forensic Computing Practice Assignment 2 Due Date : Soft-copy submission on 10/11/14. Individual Assignment Question 1 a. What can a cloud provider do in terms of providing digital forensics data in the event of any legal dispute, civil or criminal case, cyber-attack, or data breach? Cloud provider need to provide the evidence by being forensically ready. To...

Words: 3104 - Pages: 13

Premium Essay

Cis 4203 Forensics Discussion 1 - Overview of Evidence

...Determine the appropriate digital forensic analysis technique for a given scenario. Assignment Requirements Review the information in the text sheet entitled “Overview of Evidence and Digital Forensic Analysis Techniques,” which describes different types of digital forensic analysis techniques, such as disk forensics and e-mail forensics. Based on the information in the text sheet and in your assigned reading for this week, discuss the following scenarios and determine which type of forensic analysis technique(s) should be used, and why:   1. The Federal Trade Commission disclosed a law suit against unknown credit card fraudsters. Over 15 companies were being run by "money mules," people who transfer stolen goods or money from one country to another. The money mules were recruited via a spam e-mail message. E-mail forensics—The study of the source and content of e-mail as evidence. E-mail forensics includes the process of identifying the sender, recipient, date, time, and origination location of an e-mail message. You can use e-mail forensics to identify harassment, discrimination, or unauthorized activities. There is also a body of laws that deal with retention and storage of e-mails that are specific to certain fields, such as financial and medical. Disk forensics—The process of acquiring and analyzing information stored on physical storage media, such as computer hard drives, smartphones, GPS systems, and removable media. Disk forensics includes both the recovery of...

Words: 951 - Pages: 4

Premium Essay

Forensic Accountant

... 05/19/2013 05/19/2013 forensic accountant CONTEMPORARY BUSINESS forensic accountant CONTEMPORARY BUSINESS 125/19/20135/19/20135/19/2013 fraud busters In today’s world, it is knows by everyone that different developments were taken place in the last periods. Our globalized world in a state of continuous technological change and innovations has been challenged by new generation criminology risk factors. From business, government, regulatory authorities, and the courts evidence indicates that a higher level of expertise is necessary to analyze current financial transactions and events. Forensic accounting is a specialized area of an accounting practice that describes engagements which results from actual or anticipated disputes or litigations. Forensic accounting has been defined as accounting analyzers that can uncover possible fraud that is suitable for presentation in court. A Forensic accountant needs accounting, law, finance, investigative and research skills to identify and prevent fraud. Forensic accountant uses her/his knowledge of accounting, law, and criminology to uncover fraud, as well as gather any evidence and present it to the court....

Words: 2300 - Pages: 10

Premium Essay

Forensic Pathology

...Forensic Pathology Have you ever just wanted to come home from a long days at work and kick off your shoes and grab some food and pig out in front of the television? You began to flick through all the channels and can’t find what you are looking for so you come to CSI Miami and this had caught your attention and now you’re toned in and intrigued of what they are doing. You find yourself yelling at the T.V. saying “how they do that?” “What is that?” “Why are they doing that?” and “how did they solve the case?” Well as you began to read further all of your questions will be answered, and you will see the real from the fake and what exactly a forensic pathologist is and as well as what it takes to become one. You will learn the ins and outs of how forensic pathologist has more than just one obligation. Forensic pathology has to do with the cause and manner of how someone died, as well as working with the police and their overall investigation it is almost like they are an investigator too. There is a lot of schooling and training that goes into becoming a forensic pathologist. As you continue further you will see that forensic pathology is a part of everyday life because, someone passes on every day. Forensic pathologist are specially trained doctors/physicians that study and examine the bodies of people who are deceased suddenly, violently, or unexpectedly. It is their job to figure out the immediate reason for this cessation of life. What are the duties of a forensic pathologist...

Words: 1288 - Pages: 6

Premium Essay

Forensic Analysis

...This program follows the career of Doctor Temperance ‘Bones’ Brennan as she works as Forensic Anthropologist alongside her team and the FBI. By using her knowledge of the human skeletal system, Temperance identifies the gender, race, and age of the victims. Bones holds the title of one of the most factual—yet fictional— television program on the T.V;however, not everything that appears remains factual. One of the most obvious mistakes appears in how fast Temperance deduces the majority of the characteristics of a victim. “As the show is written by a forensic anthropologist (Kathy Reichs) all of the procedures and methodologies Dr. Brennan uses are real, HOWEVER, she is usually able to assess a victim age and sex from a quick look at the bones at the crime scene, this is simply not true” (Calmon, “How Realistic is...

Words: 1959 - Pages: 8

Free Essay

Forensic Science

...WEEK 1- INTRODUCTION TO FORENSIC SCIENCE Quote "Every contact leaves a trace." - Edmond Locard (1877 - 1966) Learning Objective(s) At the end of this topic, you should be able to: 1. Define 'Forensic Science'; 2. Explain the limits of Forensic Science; 3. Identify the types of forensic work; 4. Describe Locard's Exchange Principle; 5. Differentiate Reconstruction & Re-enactment. Synopsis To illustrate the scope and diversity of Forensic Science, place it in its legal context, and describe the various types of forensic work. There will also be a discussion of Comparison leading to Association, Reconstruction versus Re-enactment, Locard's Exchange Principle, and the limits of Forensic Science. Various case studies will also be analysed throughout the lecture. Case Studies Felicia Lee; Walter Dinivan; Madam Jetkor Miang Singh; Roberto Calvi; Buck Ruxton & the Jigsaw Murders; Acid Bath Haigh; 2005 London Bombings; "Brides in the Bath"; Gareth Williams; The Woodchipper Murder WEEK 2- CHEMICAL ANALYSIS IN FORENSIC SCIENCE Quote "Actus non facit reum nisi mens sit rea" The act is not culpable unless the mind is also guilty. Learning Objective(s) At the end of this topic, you should be able to: 2A. Atomic Structure & Spectroscopy 1. Explain the structure of the atom and Bohr's model; 2. Differentiate between emission and absorption spectroscopy; 3. Explain the chemistry behind EDX and SEM-EDX; 4. Explain the chemistry in NAA; 2B. Molecular...

Words: 1646 - Pages: 7

Premium Essay

Forensic Accounting

...Forensic Accounting & Auditing: A New Paradigm INTRODUCTION Thanks to the popularity of some criminal dramas, the word "forensic" might cause you to think about the process of working a crime scene. These investigators track down criminals using DNA samples, fingerprints, bloodstains, photos and other clues. So at first, you may wonder how the word "forensic" could ever be joined with the word "accounting." It's not as if you've seen accountants working with the other investigators at a crime scene. However, it really depends on the type of crime. “Auditor should be watchdog and not be the bloodhound”. It’s a good quote that every auditor should know. This quote makes the definition of forensic accountants even simpler. The forensic accountant is the bloodhound of Book keeping. External auditors look at the numbers but the forensic auditors look beyond the numbers. Only Forensic just means "relating to the application of scientific knowledge to a legal problem" or "usable in a court of law." Most of the crimes, such as homicides, investigated on a show like "CSI" are known as "crimes against the person." Forensic accounting is simply a specialty field within the broader arena of accounting. The types of crimes forensic accountants investigate are classified as "crimes against property." They investigate crimes such as fraud and give expert testimony in court trials. They also perform work related to civil disputes. Forensic accountants are also known as fraud investigators...

Words: 2890 - Pages: 12

Free Essay

Forensic Testimony in Court

...Examine Forensic Testimony Forensic evidence has become more and more important in the court case for proving the guilt or innocence of a criminal defendant. Due to new technology the world of forensics is becoming more and more advanced providing law enforcement with all types of new investigatory tools and ways for the court to prove or disprove guilt. It is essential for law enforcement agencies to have trained forensic personnel with the skills to properly collect the evidence first to ensure the evidence does not become lost, destroyed, or damaged and the forensic evidence is accepted in a court of law. Improper collection of evidence is only one of many potential challenges associated with forensic evidence but it is an important challenge that must be addressed. Forensic evidence is collected at the crime scene. If the evidence is not properly documented and collected it can be found to be unreliable in the court process. In order for forensic evidence to be accepted in a court of law it must be documented through sketches, photographs, and video tapings and it must be collected using accepted standard forensic collection methods. If evidence is not properly documented or collected the chain of evidence is broken and the court will exclude the evidence from the court case. The chain of evidence refers to an important aspect of forensic involving the movement of evidence. In order to show the court the evidence was located and collected at the scene...

Words: 1538 - Pages: 7

Premium Essay

Toxicology

...Rebecca Walker Forensic Toxicology CRJ 311 Dawn George 4/22/2013 History Forensic science is defined as the application of science to the law. There are different types of forensic science, and each plays an integral part in the criminal justice system. Forensic biology usually involved DNA testing and its results. Forensic anthropologists examine human remains that have become skeletons in an attempt to determine how long the remains have been in a location and to try to determine a possible cause of death. Forensic toxicology falls into the category of forensic chemistry. Forensic toxicologists study toxins, drugs, poisons, alcohol, and other things found in the blood or tissues of crime victims or perpetrators. Forensic toxicologists study the blood and tissues of living people as well as deceased persons. The rapid advancement of technology in the last century and, in particular, the last three decades, has helped forensic scientists solve many crimes, even those that had been cold for decades. Technology is quickly changing and improving the methods by which crimes can be solved. The first evidence of scientific methods being used to identify people occurred in China in 700BC. Chinese artists used fingerprints to identify pieces of art they had produced. Of course, there was not computerized system to file or categorize these fingerprints. However, this is the first known instance of fingerprints being used for identification purposes. Clearly, things...

Words: 3940 - Pages: 16

Premium Essay

Facial Reconstructions

...Forensic Facial Reconstructions Samantha McAnally CRMJ430 April 20, 2013 Abstract This paper will focus mainly on the history and the various techniques that forensic facial reconstruction has to offer. It will also go over some problems or an issue that is process has faced over the years. The Daubert Standard will discuss and how facial reconstruction was allowed as evidence thru this standard. I will go over all the periods of time that facial reconstruction was used. Computerized and Clay reconstruction will be discussed and how they have help investigators solved current and cold case crimes. Forensic Facial Reconstruction Forensic facial reconstruction is the method of restoring the appearance of a person (whose identity is frequently not recognized) from their skeletal remnants through a combination of creativity, forensic science, anthropology, osteology, and anatomy. The situation can also display what an individual would look like as an adult if they were abducted or gone missing as adolescents. In this paper, we will discuss the different approaches that can be used in facial reconstruction from computerized techniques to sketch artist techniques. The fortitude of forensic facial reconstruction is to yield an image from a skull that suggests an adequate resemblance of the thriving individual that the situation will assist in the proof of identity of the skeletal remnants while there are not any additional resources accessible. Finding skeletons used...

Words: 2024 - Pages: 9

Premium Essay

Forensics

...In the article it was discussing all the different types of forensics there are. People think there is just one type of forensics, but there’s a wide range of all different types. I also picked this article because I think people should realize that forensics is a very hard field to go into. You really have to really have heart to be able to go into this field. Investigator’s really have to go into detail about every little thing. In the investigations you really cannot miss a single detail. The article also goes in depth about what sciences are required to take, and for that person to really know. To be in the field you really have to love what you do. Many people often misunderstand Forensic Science and believe it is much more capable than it really is. People typically think that what they watch on T.V. is 100% true. Actually what you see on T.V. is mainly false or over exaggerated in some way. Criminal Investigation is the largest and most known form of Forensic Science. More of the known areas that people know about Forensics are; Fingerprinting, DNA Identification, Fiber Samples, Computer Animation, etc. What people see on T.V. is that it takes about an hour for the people on the NCIS, or Law & Order to figure everything. Typically it takes months at a time, and most of the time aren’t even accurate concepts. This article relates to my life, because forensics is really all about a puzzle. I feel like my life is like a puzzle. But in a good way. This article was...

Words: 314 - Pages: 2