#forensicsciencequestionandanswer
Explore tagged Tumblr posts
forensicfield · 5 years ago
Photo
Tumblr media
Footprint Analysis:-
Evaluation of two-dimensional footprint impressions for comparison purposes are carried out in the field of forensic identification by one or more of the following methods; overlay, Robbins, Gunn, Rossi and the Optical Centre Method.
Three methods for barefoot examination are commonly employed–
A.) Gunn Method: One such method devised by Gunn involves taking multiple linear measurements of the footprints that are being compared. Gunn's basic method involves drawing six lines, five of which come from the rear foot and extend to the apex of each digit. A sixth line is then drawn across the ball of the foot at the widest area.
B.) Optical Centre Method: A distinct point on the foot is identified and concentric circles are drawn in its most suitable location. This point is then isolated and then connected to other recognized regions of the footprint by means of lines.
C.) Overlay Method In the overlay method, the forensic practitioner places a sheet of clear acetate over the question print. The question print may be recovered from the crime scene and presented either in its true form (for example a bloody footprint on a piece of flooring, removed in its entirety), or as a latent print (for example on lifting film) but more often than not, as a life-sized evidence photograph. A fine-tipped marker pen is used to trace around the outline of the exemplar print and the acetate then transferred and placed over the question print.
11 notes · View notes
forensicfield · 5 years ago
Photo
Tumblr media
Question- What is Computer Forensics? Answer- Computer forensics applies forensics procedures to digital evidence. This process involves systematically accumulating and analyzing digital information for use as evidence in civil, criminal, or administrative cases. Computer forensics differs from network forensics, data recovery, and disaster recovery in scope, technique, and objective.
Question- What should you know to become a successful Computer Forensic Investigator? Answer- To be a successful computer forensics investigator, you must be familiar with more than one computing platform. To supplement your knowledge, develop and maintain contact with computer, network, and investigative professionals.
Question- What is Different Between Private Computer Investigation and Public Computer Investigation?
Answer- Public and private computer investigations differ, in that public investigations typically require a search warrant before seizing digital evidence. During public investigations, you search for evidence to support criminal allegations While During private investigations, you search for evidence to support allegations of abuse of assets and, in some cases, criminal complaints.
7 notes · View notes