SlideShare uma empresa Scribd logo
1 de 28
Chapter 14 Biological Stain Analysis: DNA
Nature of Blood ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Blood Typing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Forensics of Blood ,[object Object],[object Object],[object Object],[object Object]
Blood Tests ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Blood Origin Testing ,[object Object],[object Object],[object Object],[object Object]
Individualizing Bloodstains ,[object Object],[object Object],[object Object]
Testing for Seminal Stains ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sexual Assault Evidence ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SEXUAL ASSAULT EVIDENCE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sex Determination ,[object Object],[object Object],[object Object],[object Object]
Alleles ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Structure of DNA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DNA Replication ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
PCR Testing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DNA Typing ,[object Object],[object Object],[object Object],[object Object],[object Object]
Short Tandem Repeats (STRs) ,[object Object],[object Object],[object Object],[object Object],[object Object]
STR Advantages ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Power of STR ,[object Object],[object Object],[object Object],[object Object]
Standardizing STR Testing ,[object Object],[object Object],[object Object]
Capillary Electrophoresis ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sex Determination by STRs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mitochondrial DNA ,[object Object],[object Object],[object Object],[object Object]
Mitochondrial DNA Testing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CODIS ,[object Object],[object Object],[object Object],[object Object],[object Object]
Packaging Biological Evidence ,[object Object],[object Object],[object Object],[object Object]
Packaging Biological Evidence ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados

Dna library lecture-Gene libraries and screening
Dna library lecture-Gene libraries and screening  Dna library lecture-Gene libraries and screening
Dna library lecture-Gene libraries and screening Abdullah Abobakr
 
cDNA and Genomic libraries preparation
cDNA and Genomic libraries preparationcDNA and Genomic libraries preparation
cDNA and Genomic libraries preparationDr. Shekhar Jain
 
Genomic and c dna library by Kailash Sontakke
Genomic and c dna library by Kailash SontakkeGenomic and c dna library by Kailash Sontakke
Genomic and c dna library by Kailash SontakkeKAILASHSONTAKKE
 
Cloning in eukaryotes
Cloning in eukaryotesCloning in eukaryotes
Cloning in eukaryotesPriyengha R.S
 
construction of genomicc dna libraries
construction of genomicc dna librariesconstruction of genomicc dna libraries
construction of genomicc dna librariesgohil sanjay bhagvanji
 
Nidhi sharma ppt gene library
Nidhi sharma ppt gene library Nidhi sharma ppt gene library
Nidhi sharma ppt gene library nidhi sharma
 
Various strategies for molecular cloning
Various strategies for molecular cloningVarious strategies for molecular cloning
Various strategies for molecular cloningUka Tarsadia University
 
Biochem recombinant dna technology(29.6.10)
Biochem   recombinant dna technology(29.6.10)Biochem   recombinant dna technology(29.6.10)
Biochem recombinant dna technology(29.6.10)MBBS IMS MSU
 
Artificial chromosomes
Artificial chromosomesArtificial chromosomes
Artificial chromosomesDarshana Ajith
 
Basics of molecular cloning
Basics of molecular cloningBasics of molecular cloning
Basics of molecular cloningJavier Alvarez
 
Gene cloning lecture notes 5 for 2010
Gene cloning lecture notes 5 for 2010Gene cloning lecture notes 5 for 2010
Gene cloning lecture notes 5 for 2010Shadrach Meynscer
 

Mais procurados (20)

Dna library lecture-Gene libraries and screening
Dna library lecture-Gene libraries and screening  Dna library lecture-Gene libraries and screening
Dna library lecture-Gene libraries and screening
 
cDNA and Genomic libraries preparation
cDNA and Genomic libraries preparationcDNA and Genomic libraries preparation
cDNA and Genomic libraries preparation
 
Cloning dna f inal
Cloning dna f inalCloning dna f inal
Cloning dna f inal
 
Genomic and c dna library by Kailash Sontakke
Genomic and c dna library by Kailash SontakkeGenomic and c dna library by Kailash Sontakke
Genomic and c dna library by Kailash Sontakke
 
Cloning in eukaryotes
Cloning in eukaryotesCloning in eukaryotes
Cloning in eukaryotes
 
construction of genomicc dna libraries
construction of genomicc dna librariesconstruction of genomicc dna libraries
construction of genomicc dna libraries
 
Nidhi sharma ppt gene library
Nidhi sharma ppt gene library Nidhi sharma ppt gene library
Nidhi sharma ppt gene library
 
Gene Libarries
Gene LibarriesGene Libarries
Gene Libarries
 
Various strategies for molecular cloning
Various strategies for molecular cloningVarious strategies for molecular cloning
Various strategies for molecular cloning
 
DNA cloning
DNA cloningDNA cloning
DNA cloning
 
Biochem recombinant dna technology(29.6.10)
Biochem   recombinant dna technology(29.6.10)Biochem   recombinant dna technology(29.6.10)
Biochem recombinant dna technology(29.6.10)
 
Gene cloning presentation
Gene cloning presentationGene cloning presentation
Gene cloning presentation
 
Artificial chromosomes
Artificial chromosomesArtificial chromosomes
Artificial chromosomes
 
Dna libraries
Dna librariesDna libraries
Dna libraries
 
Basics of molecular cloning
Basics of molecular cloningBasics of molecular cloning
Basics of molecular cloning
 
gene cloning
gene cloninggene cloning
gene cloning
 
DNA Library
DNA Library DNA Library
DNA Library
 
Gene cloning lecture notes 5 for 2010
Gene cloning lecture notes 5 for 2010Gene cloning lecture notes 5 for 2010
Gene cloning lecture notes 5 for 2010
 
Dna cloning
Dna cloningDna cloning
Dna cloning
 
Cloning a to z
Cloning a to zCloning a to z
Cloning a to z
 

Semelhante a Fs Ch 14

8 f forensic d n a analysis (student)
8 f forensic d n a analysis (student)8 f forensic d n a analysis (student)
8 f forensic d n a analysis (student)San Raj
 
Lecture2 nucleic acid (1)
Lecture2 nucleic acid (1)Lecture2 nucleic acid (1)
Lecture2 nucleic acid (1)SourabhKumar240
 
Polymerase Chain Reaction - PCR
Polymerase Chain Reaction - PCRPolymerase Chain Reaction - PCR
Polymerase Chain Reaction - PCRAhmad Qudah
 
chapter 9 - dna powerpoint for forensics
chapter 9 - dna powerpoint for forensicschapter 9 - dna powerpoint for forensics
chapter 9 - dna powerpoint for forensicskaganmiller24
 
Functional genomics
Functional genomicsFunctional genomics
Functional genomicsAjit Shinde
 
Recombinant DNA Technology
Recombinant DNA TechnologyRecombinant DNA Technology
Recombinant DNA TechnologyFarhana Atia
 
Forensic Serology
Forensic SerologyForensic Serology
Forensic Serologyannperry09
 
GENE gene marker blood typing , abo blood typing vntr
GENE gene marker blood typing , abo blood typing vntrGENE gene marker blood typing , abo blood typing vntr
GENE gene marker blood typing , abo blood typing vntrAparnaAjayan8
 
Polymerase Chain Reaction Practical
Polymerase Chain Reaction PracticalPolymerase Chain Reaction Practical
Polymerase Chain Reaction PracticalSabahat Ali
 
Lecture 10 2023Lecture 10 2023Lecture 10 2023.ppt
Lecture 10 2023Lecture 10 2023Lecture 10 2023.pptLecture 10 2023Lecture 10 2023Lecture 10 2023.ppt
Lecture 10 2023Lecture 10 2023Lecture 10 2023.pptAbdelrhman Abooda
 
Detection and Measurement of Genetic Variation.pptx
Detection and Measurement of Genetic Variation.pptxDetection and Measurement of Genetic Variation.pptx
Detection and Measurement of Genetic Variation.pptxalizain9604
 

Semelhante a Fs Ch 14 (20)

DNA FORENSIC ANALYSIS
DNA FORENSIC ANALYSISDNA FORENSIC ANALYSIS
DNA FORENSIC ANALYSIS
 
8 f forensic d n a analysis (student)
8 f forensic d n a analysis (student)8 f forensic d n a analysis (student)
8 f forensic d n a analysis (student)
 
Lecture2 nucleic acid (1)
Lecture2 nucleic acid (1)Lecture2 nucleic acid (1)
Lecture2 nucleic acid (1)
 
Polymerase Chain Reaction - PCR
Polymerase Chain Reaction - PCRPolymerase Chain Reaction - PCR
Polymerase Chain Reaction - PCR
 
chapter 9 - dna powerpoint for forensics
chapter 9 - dna powerpoint for forensicschapter 9 - dna powerpoint for forensics
chapter 9 - dna powerpoint for forensics
 
Functional genomics
Functional genomicsFunctional genomics
Functional genomics
 
PCR
PCRPCR
PCR
 
Recombinant DNA
Recombinant DNARecombinant DNA
Recombinant DNA
 
Power of MBT.ppt
Power of MBT.pptPower of MBT.ppt
Power of MBT.ppt
 
Recombinant DNA Technology
Recombinant DNA TechnologyRecombinant DNA Technology
Recombinant DNA Technology
 
Forensic Serology
Forensic SerologyForensic Serology
Forensic Serology
 
DNA Profiling_HMD_2020.pptx
DNA Profiling_HMD_2020.pptxDNA Profiling_HMD_2020.pptx
DNA Profiling_HMD_2020.pptx
 
GENE gene marker blood typing , abo blood typing vntr
GENE gene marker blood typing , abo blood typing vntrGENE gene marker blood typing , abo blood typing vntr
GENE gene marker blood typing , abo blood typing vntr
 
Polymerase Chain Reaction Practical
Polymerase Chain Reaction PracticalPolymerase Chain Reaction Practical
Polymerase Chain Reaction Practical
 
Hamas 1
Hamas 1Hamas 1
Hamas 1
 
Lecture 10 2023Lecture 10 2023Lecture 10 2023.ppt
Lecture 10 2023Lecture 10 2023Lecture 10 2023.pptLecture 10 2023Lecture 10 2023Lecture 10 2023.ppt
Lecture 10 2023Lecture 10 2023Lecture 10 2023.ppt
 
Pcr new
Pcr newPcr new
Pcr new
 
DNA Fingerprinting
DNA FingerprintingDNA Fingerprinting
DNA Fingerprinting
 
Detection and Measurement of Genetic Variation.pptx
Detection and Measurement of Genetic Variation.pptxDetection and Measurement of Genetic Variation.pptx
Detection and Measurement of Genetic Variation.pptx
 
Molecular markers
Molecular markersMolecular markers
Molecular markers
 

Mais de warren142 (20)

Ch 8 fingerprints
Ch 8 fingerprintsCh 8 fingerprints
Ch 8 fingerprints
 
Chapter02
Chapter02Chapter02
Chapter02
 
Ch 7
Ch 7Ch 7
Ch 7
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Ch 6
Ch 6Ch 6
Ch 6
 
Ch 6
Ch 6Ch 6
Ch 6
 
Ch 5
Ch 5Ch 5
Ch 5
 
Cj 101 ch 4
Cj 101 ch 4Cj 101 ch 4
Cj 101 ch 4
 
Criminal justice 101 ch 3
Criminal justice 101 ch 3Criminal justice 101 ch 3
Criminal justice 101 ch 3
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
Chapter 16
Chapter 16Chapter 16
Chapter 16
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Ch 14
Ch 14Ch 14
Ch 14
 
Ch 15
Ch 15Ch 15
Ch 15
 
Ch 15
Ch 15Ch 15
Ch 15
 
Ch 14
Ch 14Ch 14
Ch 14
 
Ch 13
Ch 13Ch 13
Ch 13
 
Chapter 9
Chapter 9Chapter 9
Chapter 9
 

Último

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 

Último (20)

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 

Fs Ch 14

  • 1. Chapter 14 Biological Stain Analysis: DNA
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.

Notas do Editor

  1. The word blood refers to a highly complex mixture of cells, enzymes, proteins, and inorganic substances. Plasma, which is the fluid portion of blood, is composed principally of water. Red blood cells (erythrocytes), white blood cells (leukocytes), and platelets are the solid materials suspended in plasma. Antigens, usually proteins, are located on the surface of red blood cells and are responsible for blood-type characteristics.
  2. More than 15 blood antigen systems have been identified, but the A-B-O and Rh systems are the most important. An individual that is type A has A antigens on his/her red blood cells, type B has B antigens, AB has both A and B antigens, and type O has neither A nor B antigens. Rh factor is determined by the presence of another antigen, the D antigen. People having the D antigen are Rh positive; those not having the antigen are Rh negative. For every antigen there is a specific antibody that will react with it to form clumps known as agglutination. Thus, if serum containing anti-B is added to red blood cells carrying B antigen, they will immediately react.
  3. A positive result from the Kastle-Meyer color test is highly indicative of blood. Hemoglobin causes a deep pink color. Alternatively, the luminol test is used to search out trace amounts of blood located at crime scenes. Produces light (luminescence) in a darkened area. Microcrystalline tests, such as the Takayama and Teichmann tests, depend on the addition of specific chemicals to the blood so that characteristic crystals will be formed.
  4. Once the stain has been characterized as blood, the precipitin test will determine whether the stain is of human or animal origin. The precipitin test uses antisera normally derived from rabbits that have been injected with the blood of a known animal to determine the species origin of a questioned bloodstain. The technique of gel diffusion takes advantage of the fact that antibodies and antigens diffuse or move toward one another on an agar plate. The extracted bloodstain and the human antiserum are placed in separate holes opposite each other on the gel. If the blood is human, a line of precipitation forms where the antigens and antibodies meet.
  5. Once it has been determined that the bloodstain is of human origin, an effort must be made to associate or dissociate the stain with a particular individual. DNA analysis has allowed forensic scientists to associate blood to a single individual.
  6. Many of the cases sent to a forensic laboratory involve sexual offenses, making it necessary to examine exhibits for the presence of seminal stains. The best way to locate and at the same time characterize a seminal stain is to perform the acid phosphatase (an enzyme secreted into seminal fluid) color test. A purple color indicates acid phosphatase enzyme. Semen can be unequivocally identified by either the presence of spermatozoa or of p30, a protein unique to seminal plasma. Forensic scientists can successfully link seminal material to an individual by DNA typing.
  7. The rape victim must undergo a medical examination as soon as possible after the assault. At that time the appropriate items of physical evidence including clothing, hairs, and vaginal and rectal swabs can be collected for subsequent laboratory examination. All outer and undergarments should be carefully removed and packaged separately in paper (not plastic) bags. Bedding, or the object upon which the assault took place, may also be carefully collected.
  8. Suspect: -24 hours -ble to detect the victim’s DNA on the male’s underwear or on a penile swab of the suspect. Items routinely collected from the suspect include all clothing, pubic hair, head hair, penile swab, and a blood sample or buccal swab for DNA typing. The forceful physical contact between victim and assailant may result in a transfer of such physical evidence of blood, semen, saliva, hairs, and fibers.
  9. Portions of the DNA structure are as unique to each individual as fingerprints. The gene is the fundamental unit of heredity. Each gene is actually composed of DNA specifically designed to carry the task of controlling the genetic traits of our cells. The genes are positioned on chromosomes , threadlike bodies that appear in the nucleus of every body cell
  10. The egg cell from the mother always contains a long chromosome known as the X chromosome . The sperm cell from the father may contain either a long X chromosome or a short Y chromosome . When an X-carrying sperm fertilizes an egg, the new cell is XX and develops into a female. A Y-carrying sperm produces an XY fertilized egg and develops into a male.
  11. The position a gene occupies on a chromosome is its locus . Alternative forms of genes that influence a given characteristic and are aligned with one another on a chromosome pair are known as alleles . A gene pair made up of two similar alleles is said to be homozygous . A gene pair made up of two different alleles is said to be heterozygous .
  12. DNA is constructed as a very large molecule made by linking a series of repeating units called nucleotides. A nucleotide is composed of a sugar, a phosphorous-containing group, and a nitrogen-containing molecule called a base. Four types of bases are associated with the DNA structure: adenine (A), guanine (G), cytosine (C), and thymine (T). The bases on each strand are properly aligned in a double-helix configuration, which is two strands of DNA coiled together. As a result, adenine pairs with thymine and guanine pairs with cytosine. This concept is known as base pairing.
  13. DNA duplicates itself prior to cell division. DNA replication begins with the unwinding of the DNA strands of the double helix. Each strand is now exposed to a collection of free nucleotides that will be used to recreate the double helix, letter by letter, using base pairing. Many enzymes and proteins, such as DNA polymerases, are involved in unwinding the DNA, keeping the DNA strands apart, and assembling the new DNA strands. Polymerase chain reaction (PCR) is a technique for replicating small quantities of DNA or broken pieces of DNA found at a crime scene, outside a living cell. The ability to multiply small bits of DNA by PCR now means that sample size is no longer a limitation in characterizing DNA recovered at a crime scene.
  14. Polymerase chain reaction is the outgrowth of knowledge gained from an understanding of how DNA strands naturally replicate within a cell. For the forensic scientist, PCR offers a distinct advantage in that it can amplify minute quantities of DNA many millions of times. First, the DNA is heated to separate it. Second, primers (short strands of DNA used to target specific regions of DNA for replication) are added, which hybridize with the strands. Third, DNA polymerase and free nucleotides are added to rebuild each of the separated strands. Now, this process is repeated 25 to 30 times.
  15. Portions of the DNA molecule contain sequences of bases that are repeated numerous times, known as tandem repeats. To a forensic scientist, these tandem repeats offer a means of distinguishing one individual from another through DNA typing. Tandem repeats seem to act as filler or spacers between the coding regions of DNA. What is important to understand is that all humans have the same type of repeats, but there is tremendous variation in the number of repeats each of us have.
  16. The latest method of DNA typing, short tandem repeat (STR) analysis, has emerged as the most successful and widely used DNA profiling procedure. STRs are locations on the chromosome that contain short sequences that repeat themselves within the DNA molecule. They serve as useful markers for identification because they are found in great abundance throughout the human genome.
  17. STRs normally consist of repeating sequences of 3 to 7 bases in length, and the entire strand of an STR is also very short, less than 450 bases in length. This means that STRs are much less susceptible to degradation and may often be recovered from bodies or stains that have been subjected to extreme decomposition. Also, because of their shortness, STRs are ideal candidates for multiplication by PCR, thus overcoming the previously mentioned limited-sample-size problem often associated with crime-scene evidence.
  18. What makes STRs so attractive to forensic scientists is that hundreds of different types of STRs are found in human genes. The more STRs one can characterize, the smaller will be the percentage of the population from which a particular combination of STRs can emanate. This gives rise to the concept of multiplexing. Using the technology of PCR, one can simultaneously extract and amplify a combination of different STRs.
  19. Currently, U.S. crime laboratories have standardized on 13 STRs for entry into a national database (CODIS). A high degree of discrimination and even individualization can be attained by analyzing a combination of STRs (multiplexing) and determining the product of their frequencies. With STR, as little as 125 picograms of DNA is required for analysis.
  20. Capillary electrophoresis separates DNA fragments on a thin glass column. Each end of the column is immersed in a reservoir of buffer liquid with electrodes. The DNA-containing sample solution is injected into one end of the column. The STR fragments move through the electrified column at a speed that is related to the length of the STR fragments. As the DNA peaks pass through the detector, they are recorded on a display known as an electropherogram.
  21. The amelogenin gene , which is actually the gene for tooth pulp, is shorter by six bases in the X chromosome than in the Y chromosome. Hence, when the amelogenin gene is amplified by PCR and separated by electrophoresis, males, who have an X and a Y chromosome, show two bands; females, who have two X chromosomes, have just one band.
  22. Another type of DNA used for individual characterization is mitochondrial DNA. Mitochondrial DNA (mtDNA) is located outside the cell’s nucleus and is inherited from the mother. Mitochondria are structures found in all our cells used to provide energy that our bodies need to function. A single mitochondria contains several loops of DNA.
  23. Mitochondrial DNA typing does not approach STR analysis in its discrimination power and thus is best reserved for samples, such as hair, for which STR analysis may not be possible. Forensic analysis of mtDNA is more rigorous, time consuming, and costly when compared to nuclear DNA analysis. Also, all individuals of the same maternal lineage will be indistinguishable by mtDNA analysis. Two regions of mtDNA have been found to be highly variable and a procedure known as sequencing is used to determine the order of base pairs.
  24. Perhaps the most significant tool to arise from DNA typing is the ability to compare DNA types recovered from crime scene evidence to those of convicted sex offenders and other convicted criminals. CODIS (Combined DNA Index System) is a computer software program developed by the FBI that maintains local, state, and national databases of DNA profiles from convicted offenders, unsolved crime scene evidence, and profiles of missing persons.
  25. Before the collection of biological evidence begins, it is important that it be photographed and recorded on sketches. Wearing disposable latex gloves while handling the evidence is required. Clothing from victim and suspect with blood evidence must be collected. The packaging of biological evidence in plastic or airtight containers must be avoided because the accumulation of residual moisture could contribute to the growth of DNA-destroying bacteria and fungi.
  26. Each stained article should be packaged separately in a paper bag or in a well-ventilated box. Dried blood is best removed from a surface by using a sterile cotton swab lightly moistened with distilled water that is air dried before being placed in a swab box, then a paper or manila envelope. All biological evidence should be refrigerated or stored in a cool location until delivery to the laboratory. Standard/reference DNA specimens must also be collected, such as blood or the buccal swab (swabbing the mouth and cheek).