917 resultados para forensic toxicology
Resumo:
There are several unresolved problems in forensic authorship profiling, including a lack of research focusing on the types of texts that are typically analysed in forensic linguistics (e.g. threatening letters, ransom demands) and a general disregard for the effect of register variation when testing linguistic variables for use in profiling. The aim of this dissertation is therefore to make a first step towards filling these gaps by testing whether established patterns of sociolinguistic variation appear in malicious forensic texts that are controlled for register. This dissertation begins with a literature review that highlights a series of correlations between language use and various social factors, including gender, age, level of education and social class. This dissertation then presents the primary data set used in this study, which consists of a corpus of 287 fabricated malicious texts from 3 different registers produced by 96 authors stratified across the 4 social factors listed above. Since this data set is fabricated, its validity was also tested through a comparison with another corpus consisting of 104 naturally occurring malicious texts, which showed that no important differences exist between the language of the fabricated malicious texts and the authentic malicious texts. The dissertation then reports the findings of the analysis of the corpus of fabricated malicious texts, which shows that the major patterns of sociolinguistic variation identified in previous research are valid for forensic malicious texts and that controlling register variation greatly improves the performance of profiling. In addition, it is shown that through regression analysis it is possible to use these patterns of linguistic variation to profile the demographic background of authors across the four social factors with an average accuracy of 70%. Overall, the present study therefore makes a first step towards developing a principled model of forensic authorship profiling.
Resumo:
The process of automatic handwriting investigation in forensic science is described. The general scheme of a computer-based handwriting analysis system is used to point out at the basic problems of image enhancement and segmentation, feature extraction and decision-making. Factors that may compromise the accuracy of expert’s conclusion are underlined and directions for future investigations are marked.
Resumo:
Communication in Forensic Contexts provides in-depth coverage of the complex area of communication in forensic situations. Drawing on expertise from forensic psychology, linguistics and law enforcement worldwide, the text bridges the gap between these fields in a definitive guide to best practice. •Offers best practice for understanding and improving communication in forensic contexts, including interviewing of victims, witnesses and suspects, discourse in courtrooms, and discourse via interpreters •Bridges the knowledge gaps between forensic psychology, forensic linguistics and law enforcement, with chapters written by teams bringing together expertise from each field •Published in collaboration with the International Investigative Interviewing Research Group, dedicated to furthering evidence-based practice and practice-based research amongst researchers and practitioners •International, cross-disciplinary team includes contributors from North America, Europe and Asia Pacific, and from psychology, linguistics and forensic practice
Resumo:
This chapter reviews the important areas that psychology, linguistics and law enforcement have impacted upon in terms of rigorous and collaborative scientific endeavours. Important areas that will be of interest to both researchers and practitioners for research relating to communication in forensic contexts are discussed in detail, including vulnerability, the use of intermediaries and interpreters in forensic interviews and questioning techniques.
Resumo:
This chapter introduces Native Language Identification (NLID) and considers the casework applications with regard to authorship analysis of online material. It presents findings from research identifying which linguistic features were the best indicators of native (L1) Persian speakers blogging in English, and analyses how these features cope at distinguishing between native influences from languages that are linguistically and culturally related. The first chapter section outlines the area of Native Language Identification, and demonstrates its potential for application through a discussion of relevant case history. The next section discusses a development of methodology for identifying influence from L1 Persian in an anonymous blog author, and presents findings. The third part discusses the application of these features to casework situations as well as how the features identified can form an easily applicable model and demonstrates the application of this to casework. The research presented in this chapter can be considered a case study for the wider potential application of NLID.
Resumo:
Interactions with second language speakers in public service contexts in England are normally conducted with the assistance of one interpreter. Even in situations where team interpreting would be advisable, for example in lengthy courtroom proceedings, financial considerations mean only one interpreter is normally booked. On occasion, however, more than one interpreter, or an individual (or individuals) with knowledge of the languages in question, may be simultaneously present during an interpreted interaction, either monitoring it or indeed volunteering unsolicited input. During police interviews or trials in England this may happen when the interpreter secured by the defence team to interpret during private consultation with the suspect or defendant is present also in the interview room or the courtroom but two independently sourced interpreters need not be limited to legal contexts. In healthcare settings for example, service users sometimes bring friends or relatives along to help them communicate with service providers only to find that the latter have booked an interpreter as a matter of procedure. By analogy to the nature of the English legal system, I refer to contexts where an interpreter’s output is monitored and/or challenged, either during the speech event or subsequently, as ‘adversarial interpreting’. This conceptualisation reflects the fact that interpreters in such encounters are sourced independently, often by opposing parties, and as a result can rarely be considered a team. My main concern in this paper is to throw spotlight on adversarial interpreting as a hitherto rarely discussed problem in its own right. That it is not an anomaly is evidenced by the many cases around the world where the officially recorded interpreted output was challenged, as mentioned in for example Berk-Seligson (2002), Hayes and Hale (2010), and Phelan (2011). This paper reports on the second stage of a research project which has previously involved the analysis of a transcript of an interpreted police interview with a suspect in a murder case. I will mention the findings of the analysis briefly and introduce some new findings based on input from practising interpreters who have shared their experience of adversarial interpreting by completing an online questionnaire. I will try to answer the question of how the presence of two interpreters, or an interpreter and a monitoring participant, in the same speech event impacts on the communication process. I will also address the issue of forensic linguistic arbitration in cases where incompetent interpreting has been identified or an expert opinion is sought in relation to an adversarial interpreting event of significance to a legal dispute. References Berk-Seligson (2002), The Bilingual Courtroom: Court Interpreters in the Judicial Process, University of Chicago Press. Hayes, A. and Hale, S. (2010), "Appeals on incompetent interpreting", Journal of Judicial Administration 20.2, 119-130. Phelan, M. (2011), "Legal Interpreters in the news in Ireland", Translation and Interpreting 3.1, 76-105.
Resumo:
The Routledge Handbook of Forensic Linguistics provides a unique work of reference to the leading ideas, debates, topics, approaches and methodologies in Forensic Linguistics. Forensic Linguistics is the study of language and the law, covering topics from legal language and courtroom discourse to plagiarism. It also concerns the applied (forensic) linguist who is involved in providing evidence, as an expert, for the defence and prosecution, in areas as diverse as blackmail, trademarks and warning labels. The Routledge Handbook of Forensic Linguistics includes a comprehensive introduction to the field written by the editors and a collection of thirty-seven original chapters written by the world’s leading academics and professionals, both established and up-and-coming, designed to equip a new generation of students and researchers to carry out forensic linguistic research and analysis. The Routledge Handbook of Forensic Linguistics is the ideal resource for undergraduates or postgraduates new to the area.
Resumo:
In this article I first divide Forensic Linguistics into three sub-disciplines: the language of written legal texts, the spoken language of legal proceedings, and the linguist as expert witness and then go on to give a small number of examples of the research undertaken in these three areas. For the language of written legal texts, I present work on the (in) comprehensibility of police cautions and of judges instructions to juries. For the spoken language of legal proceedings, I report work on the problems of interpreted interaction, of vulnerable witnesses and the need for more detailed research comparing the interactive rules in adversarial and investigative systems. Finally, to illustrate the role of the linguist as expert witness I report a trademark case, five different authorship attribution cases, three very different plagiarism cases and I end reporting briefly the contribution of linguists to language assessment techniques used in the linguistic classification of asylum seekers. © Langage et société no 132 - juin 2010.
Resumo:
The volatile chemicals which comprise the odor of the illicit drug cocaine have been analyzed by adsorption onto activated charcoal followed by solvent elution and GC/MS analysis. A series of field tests have been performed to determine the dominant odor compound to which dogs alert. All of our data to date indicate that the dominant odor is due to the presence of methyl benzoate which is associated with the cocaine, rather than the cocaine itself. When methyl benzoate and cocaine are spiked onto U.S. currency, the threshold level of methyl benzoate required for a canine to signal an alert is typically 1-10 $\mu$g. Humans have been shown to have a sensitivity similar to dogs for methyl benzoate but with poorer selectivity/reliability. The dominant decomposition pathway for cocaine has been evaluated at elevated temperatures (up to 280$\sp\circ$C). Benzoic acid, but no detectable methyl benzoate, is formed. Solvent extraction and SFE were used to study the recovery of cocaine from U.S. currency. The amount of cocaine which could be recovered was found to decrease with time. ^
Resumo:
Cardiac troponin I (cTnI) is one of the most useful serum marker test for the determination of myocardial infarction (MI). The first commercial assay of cTnI was released for medical use in the United States and Europe in 1995. It is useful in determining if the source of chest pains, whose etiology may be unknown, is cardiac related. Cardiac TnI is released into the bloodstream following myocardial necrosis (cardiac cell death) as a result of an infarct (heart attack). In this research project the utility of cardiac troponin I as a potential marker for the determination of time of death is investigated. The approach of this research is not to investigate cTnI degradation in serum/plasma, but to investigate the proteolytic breakdown of this protein in heart tissue postmortem. If our hypothesis is correct, cTnI might show a distinctive temporal degradation profile after death. This temporal profile may have potential as a time of death marker in forensic medicine. The field of time of death markers has lagged behind the great advances in technology since the late 1850's. Today medical examiners are using rudimentary time of death markers that offer limited reliability in the medico-legal arena. Cardiac TnI must be stabilized in order to avoid further degradation by proteases in the extraction process. Chemically derivatized magnetic microparticles were covalently linked to anti-cTnI monoclonal antibodies. A charge capture approach was also used to eliminate the antibody from the magnetic microparticles given the negative charge on the microparticles. The magnetic microparticles were used to extract cTnI from heart tissue homogenate for further bio-analysis. Cardiac TnI was eluted from the beads with a buffer and analyzed. This technique exploits banding pattern on sodium dodecyl sulfate polyacrylamide gel electrophoresis (SDS-PAGE) followed by a western blot transfer to polyvinylidene fluoride (PVDF) paper for probing with anti-cTnI monoclonal antibodies. Bovine hearts were used as a model to establish the relationship of time of death and concentration/band-pattern given its homology to human cardiac TnI. The final concept feasibility was tested with human heart samples from cadavers with known time of death. ^
Resumo:
The investigations of human mitochondrial DNA (mtDNA) have considerably contributed to human evolution and migration. The Middle East is considered to be an essential geographic area for human migrations out of Africa since it is located at the crossroads of Africa, and the rest of the world. United Arab Emirates (UAE) population inhabits the eastern part of Arabian Peninsula and was investigated in this study. Published data of 18 populations were included in the statistical analysis. The diversity indices showed (1) high genetic distance among African populations and (2) high genetic distance between African populations and non-African populations. Asian populations clustered together in the NJ tree between the African and European populations. MtDNA haplotypes database of the UAE population was generated. By incorporating UAE mtDNA dataset into the existing worldwide mtDNA database, UAE Forensic Laboratories will be able to analyze future mtDNA evidence in a more significant and consistent manner. ^
Resumo:
The Internet has become an integral part of our nation’s critical socio-economic infrastructure. With its heightened use and growing complexity however, organizations are at greater risk of cyber crimes. To aid in the investigation of crimes committed on or via the Internet, a network forensics analysis tool pulls together needed digital evidence. It provides a platform for performing deep network analysis by capturing, recording and analyzing network events to find out the source of a security attack or other information security incidents. Existing network forensics work has been mostly focused on the Internet and fixed networks. But the exponential growth and use of wireless technologies, coupled with their unprecedented characteristics, necessitates the development of new network forensic analysis tools. This dissertation fostered the emergence of a new research field in cellular and ad-hoc network forensics. It was one of the first works to identify this problem and offer fundamental techniques and tools that laid the groundwork for future research. In particular, it introduced novel methods to record network incidents and report logged incidents. For recording incidents, location is considered essential to documenting network incidents. However, in network topology spaces, location cannot be measured due to absence of a ‘distance metric’. Therefore, a novel solution was proposed to label locations of nodes within network topology spaces, and then to authenticate the identity of nodes in ad hoc environments. For reporting logged incidents, a novel technique based on Distributed Hash Tables (DHT) was adopted. Although the direct use of DHTs for reporting logged incidents would result in an uncontrollably recursive traffic, a new mechanism was introduced that overcome this recursive process. These logging and reporting techniques aided forensics over cellular and ad-hoc networks, which in turn increased their ability to track and trace attacks to their source. These techniques were a starting point for further research and development that would result in equipping future ad hoc networks with forensic components to complement existing security mechanisms.