SlideShare uma empresa Scribd logo
1 de 19
Collection of Crime Scene Evidence Chapter 4
Crime Scene Evidence ,[object Object],[object Object],[object Object],[object Object],[object Object]
Forensic Science ,[object Object],[object Object],[object Object],[object Object]
Types of Physical Evidence ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Procedures for Collection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Procedures for Collection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Packaging ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Packaging ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Packaging ,[object Object],[object Object],[object Object],[object Object],[object Object]
Packaging ,[object Object],[object Object],[object Object],[object Object]
Packaging ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Chain of Custody ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Obtaining Reference Samples ,[object Object],[object Object],[object Object],[object Object],[object Object]
Submitting Evidence ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Crime Scene Safety ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Crime Scene Safety ,[object Object],[object Object],[object Object],[object Object]
Search and Seizure Protocols ,[object Object],[object Object]
Search and Seizure Protocols ,[object Object],[object Object],[object Object],[object Object],[object Object]
Search and Seizure Landmark Cases ,[object Object],[object Object],[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Semelhante a Fs Ch4

18.0 COLLECTION OF FORENSIC EVIDENCES_688c2aaeb09d3e72f4d5983a65c87f18.pptx
18.0 COLLECTION OF FORENSIC EVIDENCES_688c2aaeb09d3e72f4d5983a65c87f18.pptx18.0 COLLECTION OF FORENSIC EVIDENCES_688c2aaeb09d3e72f4d5983a65c87f18.pptx
18.0 COLLECTION OF FORENSIC EVIDENCES_688c2aaeb09d3e72f4d5983a65c87f18.pptxKennyjrLMunisi
 
Day 1 london met at adp
Day 1  london met at adpDay 1  london met at adp
Day 1 london met at adpBashar Sasa
 
collection and packing of biological and firearm evidences
collection and packing of biological and firearm evidencescollection and packing of biological and firearm evidences
collection and packing of biological and firearm evidencesSandeep Kumar Pathak
 
Criminalistics Unit 3
Criminalistics Unit 3Criminalistics Unit 3
Criminalistics Unit 3Don Caeiro
 
Forensics ch 3 notes
Forensics ch 3 notesForensics ch 3 notes
Forensics ch 3 notesLeah Morgan
 
1.-LEGAL-MEDICINE- BACHELOR OF SCIENCE IN CRIMnew.pdf
1.-LEGAL-MEDICINE- BACHELOR OF SCIENCE IN CRIMnew.pdf1.-LEGAL-MEDICINE- BACHELOR OF SCIENCE IN CRIMnew.pdf
1.-LEGAL-MEDICINE- BACHELOR OF SCIENCE IN CRIMnew.pdfJemaicaCondesa
 
Crime Scene Processing
Crime Scene ProcessingCrime Scene Processing
Crime Scene Processingwarren142
 
Sample managemen tby kananika
Sample managemen tby kananikaSample managemen tby kananika
Sample managemen tby kananikaBruno Mmassy
 
2018 Crime Scenes, Collection and Preservation of Evidence2.pptx
2018 Crime Scenes, Collection and Preservation of Evidence2.pptx2018 Crime Scenes, Collection and Preservation of Evidence2.pptx
2018 Crime Scenes, Collection and Preservation of Evidence2.pptxdravidmishra1
 
Concepts of Forensic Science for Lawyers
Concepts of Forensic Science for LawyersConcepts of Forensic Science for Lawyers
Concepts of Forensic Science for LawyersPrashant Mehta
 

Semelhante a Fs Ch4 (20)

Fs Ch4
Fs Ch4Fs Ch4
Fs Ch4
 
18.0 COLLECTION OF FORENSIC EVIDENCES_688c2aaeb09d3e72f4d5983a65c87f18.pptx
18.0 COLLECTION OF FORENSIC EVIDENCES_688c2aaeb09d3e72f4d5983a65c87f18.pptx18.0 COLLECTION OF FORENSIC EVIDENCES_688c2aaeb09d3e72f4d5983a65c87f18.pptx
18.0 COLLECTION OF FORENSIC EVIDENCES_688c2aaeb09d3e72f4d5983a65c87f18.pptx
 
Day 1 london met at adp
Day 1  london met at adpDay 1  london met at adp
Day 1 london met at adp
 
collection and packing of biological and firearm evidences
collection and packing of biological and firearm evidencescollection and packing of biological and firearm evidences
collection and packing of biological and firearm evidences
 
Criminalistics Unit 3
Criminalistics Unit 3Criminalistics Unit 3
Criminalistics Unit 3
 
Fs Ch 5
Fs Ch 5Fs Ch 5
Fs Ch 5
 
Fs Ch 5
Fs Ch 5Fs Ch 5
Fs Ch 5
 
Forensics ch 3 notes
Forensics ch 3 notesForensics ch 3 notes
Forensics ch 3 notes
 
1.-LEGAL-MEDICINE- BACHELOR OF SCIENCE IN CRIMnew.pdf
1.-LEGAL-MEDICINE- BACHELOR OF SCIENCE IN CRIMnew.pdf1.-LEGAL-MEDICINE- BACHELOR OF SCIENCE IN CRIMnew.pdf
1.-LEGAL-MEDICINE- BACHELOR OF SCIENCE IN CRIMnew.pdf
 
Crime Scene Processing
Crime Scene ProcessingCrime Scene Processing
Crime Scene Processing
 
Fs Ch 5
Fs Ch 5Fs Ch 5
Fs Ch 5
 
Sample managemen tby kananika
Sample managemen tby kananikaSample managemen tby kananika
Sample managemen tby kananika
 
Fs Ch 5
Fs Ch 5Fs Ch 5
Fs Ch 5
 
Dna theory 3
Dna theory 3Dna theory 3
Dna theory 3
 
Fs Ch 1
Fs Ch 1Fs Ch 1
Fs Ch 1
 
Fs Ch 1
Fs Ch 1Fs Ch 1
Fs Ch 1
 
Fs Ch 1
Fs Ch 1Fs Ch 1
Fs Ch 1
 
Fs Ch 1
Fs Ch 1Fs Ch 1
Fs Ch 1
 
2018 Crime Scenes, Collection and Preservation of Evidence2.pptx
2018 Crime Scenes, Collection and Preservation of Evidence2.pptx2018 Crime Scenes, Collection and Preservation of Evidence2.pptx
2018 Crime Scenes, Collection and Preservation of Evidence2.pptx
 
Concepts of Forensic Science for Lawyers
Concepts of Forensic Science for LawyersConcepts of Forensic Science for Lawyers
Concepts of Forensic Science for Lawyers
 

Mais de warren142 (20)

Ch 8 fingerprints
Ch 8 fingerprintsCh 8 fingerprints
Ch 8 fingerprints
 
Chapter02
Chapter02Chapter02
Chapter02
 
Ch 7
Ch 7Ch 7
Ch 7
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Ch 6
Ch 6Ch 6
Ch 6
 
Ch 6
Ch 6Ch 6
Ch 6
 
Ch 5
Ch 5Ch 5
Ch 5
 
Cj 101 ch 4
Cj 101 ch 4Cj 101 ch 4
Cj 101 ch 4
 
Criminal justice 101 ch 3
Criminal justice 101 ch 3Criminal justice 101 ch 3
Criminal justice 101 ch 3
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
Chapter 16
Chapter 16Chapter 16
Chapter 16
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Ch 14
Ch 14Ch 14
Ch 14
 
Ch 15
Ch 15Ch 15
Ch 15
 
Ch 15
Ch 15Ch 15
Ch 15
 
Ch 14
Ch 14Ch 14
Ch 14
 
Ch 13
Ch 13Ch 13
Ch 13
 
Chapter 9
Chapter 9Chapter 9
Chapter 9
 

Último

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 

Último (20)

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 

Fs Ch4

  • 1. Collection of Crime Scene Evidence Chapter 4
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.

Notas do Editor

  1. As automobiles run on gasoline, crime laboratories “run” on physical evidence. Physical evidence encompasses any and all objects that can establish that a crime has been committed or can provide a link between a crime and its victim or a crime and its perpetrator. But if physical evidence is to be used effectively for aiding the investigator, its presence first must be recognized at the crime scene.
  2. Forensic science begins at the crime scene. If the investigator cannot recognize physical evidence or cannot properly preserve it for laboratory examination, no amount of sophisticated laboratory instrumentation or technical expertise can salvage the situation. Here, investigators must recognize and properly preserve evidence for laboratory examination. It must be emphasized that the techniques of crime-scene investigation are not difficult to master and certainly lie within the bounds of comprehension of the average police officer
  3. Often, many items of evidence are clearly visible but others may be detected only through examination at the crime laboratory. For this reason, it is important to collect possible carriers of trace evidence, such as clothing, vacuum sweepings, and fingernail scrapings, in addition to more discernible items.
  4. Investigators handle and process physical evidence in a way that prevents changes to the evidence through contamination , breakage, evaporation, accidental scratching or bending, or through improper or careless packaging. The use of latex gloves, disposable forceps, and sanitized equipment reduces the chance for contamination. Whenever possible, one should keep evidence in its original condition as found at the crime scene
  5. Each different item or similar items collected at different locations must be placed in separate containers. Packaging evidence separately prevents damage through contact and prevents cross-contamination. The well-prepared evidence collector will arrive at a crime scene with a large assortment of packaging materials and tools ready to encounter any type of situation.
  6. Disposable forceps and similar tools may have to be used to pick up small items. Unbreakable plastic pill bottles with pressure lids are excellent containers for hairs, glass, fibers, and various other kinds of small or trace evidence. Alternatively, manila envelopes, screw-cap glass vials, or cardboard pillboxes are adequate containers for most trace evidence encountered at crime sites. Ordinary mailing envelopes should not be used as evidence containers because powders and fine particles will leak out of their corners.
  7. Small amounts of trace evidence can also be conveniently packaged in a carefully folded paper, using what is known as a “druggist fold.” Evidence from arson scenes should be packaged in airtight metal or glass containers to prevent the loss of accelerant vapors.
  8. If biological or bloodstained materials are stored in airtight containers, the accumulation of moisture may encourage the growth of mold, which can destroy the evidential value. In these instances, the material should be allowed to air-dry before being packaged in wrapping paper, manila envelopes, or paper bags.
  9. Contamination is a key concern during the collection of DNA-containing specimens such as blood, saliva, sweat or skin cells. Contamination can occur either by introducing foreign DNA through coughing or sneezing onto evidence or if items of evidence are incorrectly placed in contact with each other during packaging. To prevent contamination, the evidence collector must wear a face mask and use disposable latex gloves and disposable forceps when collecting evidence that may contain DNA
  10. Chain of Custody - a list of all persons who came into possession of an item of evidence . Continuity of possession, or the chain of custody, must be established whenever evidence is presented in court as an exhibit. Adherence to standard procedures in recording the location of evidence, marking it for identification, and properly completing evidence submission forms for laboratory analysis is critical to chain of custody. This means that every person who handled or examined the evidence and where it is at all times must be accounted for.
  11. Standard/Reference Sample —Physical evidence whose origin is known, such as blood or hair from a suspect, that can be compared to crime-scene evidence. The examination of evidence, whether it is soil, blood, glass, hair, fibers, and so on, often requires comparison with a known standard/reference sample. Although most investigators have little difficulty recognizing and collecting relevant crime-scene evidence, few seem aware of the necessity and importance of providing the crime lab with a thorough sampling of standard/reference materials.
  12. Evidence is usually submitted to the laboratory either by personal delivery or by mail shipment. Care must be taken in packaging evidence that will be sent by mail in order to prevent breakage or other accidental destruction during transit to the laboratory. Most laboratories require that an evidence submission form accompany all evidence submitted. Case information provided on this form enables the laboratory analyst to make an intelligent and complete examination of the evidence.
  13. Crime scenes: -biological specimens of unknown origin -no way of gauging health hazards -use caution and protection at all times -International Association for Identification Safety Committee that crime scene personnel wear a minimum of latex gloves (double gloved) and protective shoe covers. In cases of large contamination areas, coveralls are also recommended.
  14. The use of a particle mask/respirator, goggles, or face shield is recommended in addition to the minimum protective items when potentially infectious dust or mist are present. Personnel should be alert to sharp objects, knives, hypodermic syringes, razor blades, and similar items. Personnel should maintain a red biohazard plastic bag for the disposal of contaminated gloves, clothing, masks, pencils, wrapping paper, and so on.
  15. The removal of any evidence from a person or from the scene of a crime must be done in conformity with Fourth Amendment privileges: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizure, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”
  16. Supreme Court has determined that search and seizure without a court-approved warrant is justified in four cases: The existence of emergency circumstances The need to prevent the immediate loss or destruction of evidence A search of a person and property within the immediate control of the person provided it is made incident to a lawful arrest A search made by consent of the parties involved
  17. Mincey v. Arizona, the Court dealt with the legality of a four-day search at a homicide scene and determined that the evidence was illegally seized because a warrant was never issued and the circumstances of the case did not justify a warrantless search. In Michigan v. Tyler, fire destroyed a business establishment leased by Loren Tyler and a business partner. The court decided that evidence obtained from the initial search was legally seized, but evidence obtained from searches 4, 7, and 24 days after the incident were illegally seized. Chimel v CA: