General provisions of forensic technology. Presentations on forensics Forms for recording detected traces

  1. 1. Computer forensics Balashov V.Yu. Kharkov Research Institute of Forensic Expertise named after. Honored prof. M.S. Bokarius
  2. 2. Cybercrime Fraud (Article 190 of the Criminal Code) Infringement of copyright (Article 176 of the Criminal Code) Illegal actions with documents by means of access to bank accounts (Article 200 of the Criminal Code) Tax evasion (Article 212 of the Criminal Code) Pornography (Article 301 of the Criminal Code) Violation of various types of secrets (Article 231 of the Code of Ukraine)
  3. 3. New types of crimes Section XVI KKU ZLOCHINI U SPHERE VIKORISTANNYA ELECTRONIC-COMPUTING MACHINES (COMP "YUTERIV"), SYSTEMS AND COMPUTER "YUTERNIKH MEREZH I MEREZH ELECTROZV"YAZKU
  4. Article 361 Unauthorized interference with the operation of computer systems and networks, which led to: - Leakage; -Loss; -Fake; -Blocking information; -Distortion of the information processing process; - Violation of the established routing order
  5. 5. Punishable by a fine of 600 to 1000 non-taxable minimums or restriction of freedom for up to 3 years with confiscation of software and hardware with which the offense was committed. Repeated violation or as part of a group of persons: Imprisonment from 3 to 6 years.
  6. 6. 361-1 - malware Creation for the purpose of: use, distribution or sale, or distribution and sale of harmful software or hardware intended for unauthorized interference in the operation of computer systems and networks.
  7. 7. Punishable by - a fine of 500 to 1000 non-taxable minimums, - correctional labor for up to 2 years, - imprisonment for up to 2 years with confiscation of the funds developed or sold. Repeatedly or as part of a group of persons: Imprisonment for up to 5 years
  8. Article 361-2 Unauthorized sale or distribution of restricted information stored electronically.
  9. 9.
  10. Article 362 Unauthorized actions with information with limited access, which is stored electronically, committed by a person who has the right to access this information.
  11. 11. Alteration, destruction or blocking is punishable by: a fine of 600 to 100 non-taxable minimums or correctional labor for up to two years with confiscation of the software or hardware with which the acts were committed. Interception or copying that led to leakage: Imprisonment for up to three years with deprivation of the right to hold certain positions during the same period, with confiscation of software or hardware with which the acts were committed.
  12. Article 363 Violation of the rules for operating information and telecommunication systems and the rules for protecting information stored in them, which led to significant harm.
  13. 13. Punishable by 500 to 1000 non-taxable minimums or imprisonment for up to 3 years with deprivation of the right to hold certain positions or engage in certain activities for the same period.
  14. Article 363 - spam Intentional distribution of telecommunication messages, carried out without the prior consent of the recipients, which leads to disruption or termination of the operation of a computer system or network.
  15. 15. Punishable by a fine of 500 to 1000 non-taxable minimums or restriction of freedom for up to 3 years Repeatedly or as part of a group of persons: Restriction or imprisonment for up to 5 years
  16. 16. Who is looking for Security Service of Ukraine Office for Combating Cybercrime of the Ministry of Internal Affairs of Ukraine CERT-UA Ukrainian State Radio Frequency Center
  17. 17. Who analyzes Specialized forensic institutions of the Ministry of Justice of Ukraine Institute of Special Technology and Forensic Expertise of the SBU Forensic centers of the Ministry of Internal Affairs of Ukraine Experts not working in specialized structures and private specialists
  18. 18. How to search - Receiving data from providers - Receiving information from media in hosting servers - Social interaction - Surveillance - Wiretapping
  19. 19. What are they looking for - Identifying signs of equipment - Presence on the media of information indicating involvement - Chain of sequences of events of the incident - Artifacts indicating any events
  20. 20. Video and sound Identification of a person by oral or written speech Establishing the presence or absence of editing in recordings Establishing the number of persons taking part in a conversation
  21. 21. EXAMPLES FROM LIFE
  22. 22. Incident No. 1, 2011. The company became aware of a leak of internal corporate information received on the corporate email account.
  23. 23. Actions 1. Seizure of the mail server and transfer it for research. 2. Detection of the cause of the leak. 3. Establishing the geographic location of the attacker’s equipment. 4. Identification of the person who owns the equipment. 5. Identifying the attacker 6. Analysis of information on equipment media. 7. Proof of the attacker’s guilt based on information in his PC.
  24. 24. Result: Conviction under Art. 361
  25. 25. Incident No. 2, 2011 Mobile devices. A minor boy took several photos of his genitals with a mobile phone camera and sent them via MMS.
  26. 26. Problem Was this the mobile phone where the pictures were taken? When were the pictures taken? Were the pictures sent? Are there identifying features on the photographed organ?)
  27. 27. Actions Establishing the origin of snapshots: File system timestamps; Metadata in Exif; The uniqueness of the camera matrix; The method and order of naming images.
  28. 28. Establishing the sending of snapshots: analysis of sent messages (including deleted ones) with subsequent confirmation of message transmission by the operator according to the logs of the mobile operator.
  29. 29. Result The origin of photographs has been established with the accuracy of a unique device based on a combination of exclusively digital evidence.
  30. 30. Incident No. 3, 2013. In a large commercial company, the entire network infrastructure once stopped working. On the main server, the data was almost completely destroyed. The work of 100+ personnel is paralyzed.
  31. 31. Investigation objectives 1. Find out the reason for the destruction of data; 2. To establish the identity of the attacker who committed the destruction; 3.Prove the guilt of the attacker and bring him to justice.
  32. 32. Initial data A UNIX-like OS was installed on the hard drive, which performed routing between the internal network and the Internet. The infrastructure included a virtual machine that acted as an IP telephony server. Login to the virtual machine is possible only after successful authentication to the physical server (router).

Description of the presentation by individual slides:

1 slide

Slide description:

Subject, system and methodology of criminology Lecture prepared by Yarovaya N.Yu. Educational questions: 1. Concept and subject of criminology. History of the development of forensic knowledge. 2. The system of forensic science. Its nature and place among other sciences. 3.Forensic methods. Track. literature Lecture. Topic 1

2 slide

Slide description:

RECOMMENDED READING: Next. concept Saltevsky M.V. Forensics. In a modern presentation by lawyers. - Kharkov.: IMP “Rubicon”, 1996.-432 p. Averyanova T.V., Belkin R.S., Rossinskaya E.R., Korukhov Yu.G. Forensics. Textbook for universities.-M.: “Norma” 1999.-990 p. Belkin R.S. History of Russian criminology.-M.: 1999. Filippov A.G., Volynsky A.F. Forensics. Textbook for universities. - M.: "Spark". 2000. Lecture. Topic 1

3 slide

Slide description:

CRIMINALISTICS - (from the Latin сriminalis - criminal) is an area of ​​specific scientific knowledge about criminal activity and its antipode - activities to identify, solve and investigate crimes, to establish the truth in the legal process. Prof. Belkin R.S. Next Gross Lecture. Topic 1

4 slide

Slide description:

Hans Gross (Gross) born December 16, 1847 - d. December 9, 1915 Austrian scientist, founder of European criminology, professor at universities in Graz and Prague. Founder of the world's first forensic museum. One of the pioneers of criminal psychology. At the turn of the 19th and 20th centuries he taught at Chernivtsi University. Author of the “Manual for forensic investigators as a system of criminology” Graz, 1882 (in Russian. Smolensk, 1895) Next Bertillon Lecture. Topic 1

5 slide

Slide description:

Alphonse Bertillon 1853-1914 One of the pioneers of criminology, director of the identification bureau of the Paris police prefecture. Author of the anthropometric method of forensic registration, method of verbal portrait, signaletic photography, sign-descriptive method in handwriting examination Next. Bertillonage Lecture. Topic 1

6 slide

Slide description:

BERTILLONAGE (Measuring a person for the purpose of his identification) First introduced by Bertillonage in France in 1879. A. Bertillon considered 11 measurements of the human body sufficient for identification. “Signaletic survey” Lecture. Topic 1

7 slide

Slide description:

Identification (signal) survey Next. Herschel Installation by A. Bertillon Photography procedure Lecture. Topic 1

8 slide

Slide description:

WILLIAM HERSHEL (Hershel) 1833-1917 English criminologist, pioneer of the phenomenon of papillary patterns. Back in 1858, he used them to identify pension recipients, and subsequently to register prisoners in colonial India. He challenged the primacy of the introduction of fingerprinting by G. Folds Next. Folds Lecture. Topic 1

Slide 9

Slide description:

HENRY FAULDS (Faulds) 1843-1930 English doctor who worked in Japan in the 70s. He was the first to propose using fingerprints from the crime scene to search and identify the criminals. He published his observations in 1880 in the journal Nature. Henry Lecture. Topic 1

10 slide

Slide description:

EDWARD HENRY (Henry) 1850-1931 English criminologist, creator of the fingerprint classification system, which he outlined in the book “Classification and Use of Fingerprints” (1900) FRANCIS HALTON (Halton) 1822-1911 English anthropologist and statistician. In 1891, he proposed a classification of papillary patterns and was the first to statistically prove the individuality of patterns on the nail phalanges of the fingers. “Stages...” Lecture. Topic 1

11 slide

Slide description:

STAGES OF DEVELOPMENT OF FORENSICS (according to R.S. Belkin) Stage of formation and accumulation of empirical material (late 19th - 30s of the 20th century) Stage of formation of private forensic theories (late 30s of the 20th century - late 60s of the 20th century) The stage of formation of the general theory of criminology and the further development of its particular theories (late 60s of the twentieth century - present) Next. Burinsky, Potapov Lecture. Topic 1

12 slide

Slide description:

Evgeniy Fedorovich Burinsky (1849-1912) Father of forensic photography, creator of the first forensic institution in Russia. Author of the so-called “second sight” in criminology. Main work: Forensic examination of documents, its production and use. St. Petersburg, 1903 Potapov Sergey Mikhailovich (1873-1957) Doctor of Law, professor. One of the pioneers of domestic criminology, author of the theory of forensic identification Next. Voronovsky Lecture. Topic 1

Slide 13

Slide description:

Voronovsky Nikolai Dmitrievich (1900-1981) Bokarius Nikolai Sergeevich (1869-1931) Native of Feodosia. Doctor of Medicine, Professor. Outstanding forensic physician and criminologist. Founder and first director of the Kharkov Research Institute of Forensic Science. Main work: Initial external examination of the corpse at the scene of the incident or its discovery. Kharkov.1931. One of the founders of the scientific and technical service in the police. Head of the NTO of the Crimean police. Author of the textbook “Criminal Technology. Beginning Course. - M.: Publishing House of the NKVD of the RSFSR. 1931. Track. Belkin et al. Lecture. Topic 1

Slide 14

Slide description:

Belkin Rafail Samuilovich (1922-2001) Honored Scientist, Doctor of Law, Professor, Major General of the Police. In 1970, he formulated the concept of the general theory of criminology and proposed a new definition of the subject of science. Author of about 300 scientific papers, more than 20 textbooks. Under his leadership, 122 students of E.P. Ishchenko, V.P. Bakhin, N.I. Klimenko defended their dissertations. Lecture system. Topic 1

15 slide

Slide description:

MODERN SYSTEM OF FORENSICS General theory Forensic technology Forensic tactics Forensic methodology Next. Concept of General Theory Lecture. Topic 1

16 slide

Slide description:

The general theory of criminology is a scientific reflection of the entire subject of science and its methodology. Subject of science Objectives of science Place of science Methods of science Concepts and terms Next. Crime technology Lecture. Topic 1

Slide 17

Slide description:

Forensic technology is a system of scientific principles and technical means, techniques and techniques developed on their basis, intended for collecting research and using evidence and other measures for solving and preventing crimes. Track. Crime tactics Lecture. Topic 1

18 slide

Slide description:

Forensic tactics is a system of scientific principles and recommendations developed on their basis for organizing and planning an investigation, determining the investigator’s line of conduct, methods of conducting investigative actions, collecting evidence, and establishing the circumstances that contributed to the commission of a crime. Track. Crime methodology Lecture. Topic 1

Slide 19

Slide description:

Forensic methodology is a synthesizing section of criminology that combines the provisions of forensic technology and forensic tactics in their specific interpretation in relation to the conditions and objectives of the investigation of a specific type of crime. Track. Connection with other sciences Lecture. Topic 1

Slide 1

CRIMINALISTICS: “Subject, system, methods and significance for the activities of future lawyers” Lecture for undergraduate 2nd year Moderator: candidate of legal sciences, senior lecturer of the department of criminal procedure and criminology Kramarenko V.P.

Slide 2

Is lawyer a specialty? - NO!!! LAWYER IS A WAY OF LIFE!!! “It is scarcely possible for the mind of man to conceive such a riddle, which the mind of another of his fellows, properly directed, could not solve.” Edgar Allan Poe

Slide 3

LECTURE PLAN: 1. History of the development of criminology. 2. Subject, object, system, tasks of criminology and its connection with other sciences. 3. Methods of cognition used in criminology. 4. Simulation in crime investigation. Prevention and forecasting.

Slide 4

1. History of the development of criminology. FORENSICS helps to penetrate the veil of secrecy that hides the crime and the criminal. “If you hide the truth and bury it in the ground, it will certainly grow and acquire such strength that one day, when it breaks out, it will sweep away everything in its path.” Emile Zola.

Slide 5

The term "CRIMINALISTICS" comes from the Latin word: "C R I M I N A L I S" - criminal (relating to a crime), was introduced into use by the Austrian scientist Hans Gross. In 1893 he published "The Investigator's Manual as a System of Forensic Science"

Slide 6

Alphonse Bertillon, who worked in the Paris Prefecture since 1879, proposed taking body measurements of criminals. The measurements were entered into cards and used to further individualize their personality. This method is usually called anthropometric. Currently, from A. Bertillon’s method, only a description of a person’s appearance according to the rules of a verbal portrait has been preserved and is widely used in investigative practice.

Slide 7

Slide 8

In 1892, the Englishman Francis Galton, in his monograph on fingerprints “Finger prints,” summarizes research in this area and lays down the basic principles of dermatoglyphics (constancy of finger patterns throughout life, strict individuality and the simple possibility of classification into three types - arcs (arches), loops , curls)

Slide 9

Slide 10

Slide 11

Historically, criminology developed on the basis of a generalization of investigative practice and the active use of natural and technical knowledge for the purposes of solving, investigating and preventing crimes.

Slide 12

Question 2. Subject, purpose, objectives, object, system of forensics and its connection with other sciences. The subject of any science, including criminology, is determined by indicating the patterns of objective reality that are studied by a specific science. Development of forensic science in the 19th and 20th centuries. indicates that she was studying methods of committing crimes and developing tactics for their investigation.

Slide 13

In forensic science, to this day there is no unity in the definition of its subject. However, to give a general idea of ​​the debate, it is worth mentioning the names of scientists who have contributed in this area. 1893 – Hans Gross; 1915 – Tregubov Sergey Nikolaevich; 1921 – Manns Herbert Yulianovich; 1925 – Yakimov Nikolai Ivanovich; 1936 – Zitser Emelyan Usherovich; 1938 – Shaver Boris Matveevich; 1949 – Potapov Sergey Mikhailovich; 1950 – Vinberg Abram Ilyich; 1951 – Tarasov-Rodionov Pyotr Ignatievich; 1956 – Mitrichev Stepan Petrovich; 1962 – Vasiliev Alexander Nikolaevich; Belkin Rafail Samuilovich, who in the period from 1967 to 2001 actively analyzed and proposed his vision of the subject of criminology; 1977 – Krylov Ivan Filippovich; 1980 – Matusovsky Grigory Abramovich, Panteleev Ilya Fedorovich, Obraztsov Viktor Aleksandrovich; 1990 – 2013 – Selivanov Nikolay Alekseevich, Yablokov Nikolay Pavlovich, Koldin Valentin Yakovlevich, Zuev Evgeny Ivanovich and others.

Slide 14

Today, the subject of criminology according to R.S. Belkin defines it as: Forensic science is the science of the laws of the mechanism of a crime, the emergence of information about a crime and its participants, the collection, research, evaluation and use of evidence and special means and methods of forensic research and crime prevention based on the knowledge of these laws.

Slide 15

The purpose of criminology is to ensure the processes of detection, investigation and prevention of crimes.

Slide 16

The main tasks of forensic science: developing new and improving existing technical, organizational, tactical means and methods of working with evidence

Slide 17

The special tasks of forensic science are: 1. Further knowledge and research of a certain group of objective patterns inherent in the mechanisms of committing an unlawful act, the occurrence, collection and use of information (evidence) as a necessary condition for the development of the theoretical foundations of science and increasing the effectiveness of its recommendations for practice. 2. Development and improvement of technical and forensic tools, tactics and methodological recommendations for collecting, researching and using evidence. 3. Development and improvement of organizational, tactical and methodological foundations of preliminary investigation and trial.

Slide 18

4. Development of new and improvement of forensic tools, techniques and methods of crime prevention. 5. Using positive experience accumulated abroad and actively introducing it into practical activities in solving crimes. 6. Development of techniques and methods for studying the conduct of a criminal in a post-criminal situation. Currently, this problem has not been sufficiently developed. Her research mainly ends at the level of studying the method of concealing a crime and its traces, the tools used, as well as property obtained by criminal means.

Slide 19

In criminology, two objects of knowledge are traditionally distinguished - criminal activity and forensic activity. Criminal activity - includes all types and groups of crimes provided for by law. The structure of criminal activity contains such elements as: information about the criminal (physiological, psychological characteristics); about the subject of the criminal offense (victim); purpose and motive, methods and means of the crime, the circumstances of the crime, the result of the criminal act.

Slide 20

Forensic activity (the second object of forensic science) is considered in the following aspects: special techniques for using forensic tools, materials, equipment, and technologies. planning the investigation organization and tactics of investigative actions and tactical techniques used in this case methodology for investigating certain types of crime

Slide 21

The science of criminology consists of 4 main sections: 1. The general theory of criminology is a system of its theoretical concepts, basic concepts, methods, and terms. (history of development, subject, object, goals, objectives, system, methods used, establishment of group affiliation, forensic diagnostics, identification theory)

Slide 22

2. Forensic technology – a system of scientific provisions of recommendations on the use of technical means for collecting and studying evidence. Studies such subsections as: 2.1. Technical and forensic tools, materials; 2.2. Forensic photography, video recording, computer equipment; 2.3. Investigation (trasology including fingerprinting);

Slide 23

2.4. Technical and forensic examination of documents; 2.5. Weapons science (forensic ballistics); 2.6.Habitology (habitoscopy) - forensic study of a person based on his external characteristics; 2.7. Forensic study of writing (graphology or handwriting); 2.8. Criminal registration (Maintaining and using forensic records).

Slide 24

3. Forensic tactics - a system of scientific provisions and recommendations for organizing and planning preliminary and judicial investigations, determining the line of behavior of persons participating in this activity.

Slide 25

This includes as constituent elements investigative situations and tactical decisions, tactical combinations, forensic versions and planning, tactics of individual investigative actions: investigative examination, examination; interrogation; Checking and clarifying indications on site; search, seizure; investigative experiment; presentation for identification, ordering examinations; search and detention.

Slide 26

Forensic methodology – studies the specifics of the investigation of certain types of crimes.

Slide 27

Forensics in the system of scientific knowledge is associated with a number of legal sciences and other branches of scientific knowledge. Forensic science is associated with related legal sciences: criminal law, criminal procedure, criminology, operational investigation, forensic medicine, forensic psychiatry, forensic expertology, etc.

Slide 28

Forensic science is connected with the sciences of the social, humanitarian cycle, philosophy (materialist dialectics); psychology; logics; ethics; management science(MOST); sociology; linguistics.

Slide 29

Forensics is related to the natural and technical sciences of chemistry; physics; mathematics; computer science; biology, anthropology, morphology, physiology, odology

Slide 30

V.D. Pristanskov

Lecture outline

1. Concept, tasks and system
forensic tactics.
2. Tactical technique: concept,
classification.
3. Criteria for acceptable use
tactical techniques.
4. Tactical combination.
5. Tactical operation.
6. Tactical risk.
7. Investigative situation.

Literature

Exarchopulo A.A. Forensics:
Textbook. St. Petersburg, 2009. P.443-448.

Definition of forensic tactics

Forensic
tactics is a system of scientific
provisions and based on
recommendations for
as rational as possible
organization, planning
investigation and conduct
individual investigative
actions.

Main
tasks
forensic tactics
are:
development of recommendations for
organization of the investigation,
tactics
preparation and production
individual investigative
actions.

Main categories of forensic tactics

tactical
reception;
tactical operation;
tactical decision;
tactical risk;
investigative situation

Tactical technique

- maximum
rational and
effective action or
line of conduct when
conducting an investigation,
production of individual
investigative actions and
etc.

Conditions for using a tactical technique

- Legality,
- Admissibility,
- Expediency,
- Ethics.

content and purpose of tactical techniques

1) cognitive (establishing
circumstances of the event under investigation by
discovery and research
forensically significant information);
2) managerial (establishing
interaction with those involved in the case
persons by attracting them to
investigation, establishment
psychological contact and use
optimal forms of tactical
influence and control their behavior);

.

3) organizational and technical (providing
optimal external conditions and
necessary organizational and technical means of activity).
Objectives and tactics
managerial and organizational and technical types are
auxiliary, serving
in relation to tasks
informational and cognitive type.

Tactical operation

- complex
tactical
investigative techniques
actions, ORM, goal
which is
problem solving
investigations.

Tactical operations are divided into:

1) simple tactical
operations - a combination of tactical
receptions within the framework of one
investigative action;
2) complex tactical
operations - a combination of investigative
actions and operational investigative
activities during disclosure and
investigation of a specific
crimes.

Tactical decision

- target selection
tactical impact
as an investigation
the situation in general, and
into its individual elements
(conducting a confrontation, identifying witnesses
eyewitnesses (heard screams, name), holding
identification, familiarization with the findings of judicial
experts, etc.).

Tactical Risk

- risk associated with
failure to achieve
set tasks for
investigation
actions, tactical
operations (confrontation with
unstable victim, conducting repeated
forensic examination at the request of the defense,
identification by an uncertain identifier, etc.).

Investigative situation

- conditions in which
investigation is underway,
which change under
influence of objective and
subjective factors and
state
informational
ensuring the process
investigations.

Classification of investigative situations depending on:

- from time to time
- from opportunity
achieving the goal
investigations (lost
or evidence, traces,
proof),
- on the nature of the relationship
between participants:

Investigative situations

V
depending on time:
Initial;
Intermediate;
Final.

Investigative situations

Depending on
opportunities to achieve
objectives of the investigation:
Favorable (giving a bribe under
control);
Unfavorable
conditions of non-obviousness).
(murder in

Investigative situations

Depending on the character
relations between participants:
non-conflict or situations
"cooperation" when the goals and
interests of the investigator and
the interrogated are the same;
conflict (the detainee denies
the witness hides his involvement
information);

conflict situation:

with mild rivalry,

interrogated in some way coincide, but according to
some positions do not match
(the accused is hiding accomplices and
etc.);
with strict rivalry,
when the goals and interests of the investigator and
questioned absolutely
opposite, there is a “wall” between them
misunderstanding, mistrust, antipathy,
which the investigator must either
destroy or overcome.

The initial situation is unfavorable

Information about the girl's disappearance
was reported to the police on February 2 around 20.00.
According to law enforcement agencies,
the girl lived in a large family in which,
besides her, six more children were raised.
In the morning she went to school. Until 16.00
was in a choreography lesson, after
after which she did not return home.
The last girl was seen by her mother
classmates. She said that together
they saw off Vasilisa with their daughter
to the underground passage, after which
They said goodbye and went home.

The situation is intermediate, favorable, conflict-free

Kidnapping and murder suspect
girls 30 year old man being
detained, confessed to committing
crime and showed where he hid the body.
Found on the child's body
numerous abrasions, knife
wound in the scapula area, traces
sexual violence.
Action taken against the detainee
suppression in the form of detention.

Situation 1: ultimate conflict-free

Forensic examinations were carried out
examinations completed
necessary investigative
actions that allowed
consolidate evidence.
The accused admitted guilt.
Protocol of familiarization with
criminal case materials
signed, no requests.

Situation 2: finite, conflict

Forensic examinations were carried out
examinations, necessary
investigative actions that
allowed evidence to be consolidated.
The accused pleaded guilty to
concealing a crime. Gave
testimony that he learned about the crime
from his fellow countryman, who
committed, at his request he helped
take the child's corpse out of town to
your car and bury it. Blame
admitted because he was beaten
operatives, what do they know about him?
cellmates who saw him
beatings.

Investigative situation?

The Investigation Department received an audit report from
the results of which indicate that in the period 2010-20011.
the administration of the G-th region systematically violated
rules of budget financing. Yes, with LLC
"Golden Ear" (headed by P.K. Kovalenko) were
lease agreements No. 74 and No. 18 were concluded on transfer to
rental of premises with an area of ​​1147.7 sq. m. and 186.4 sq.m.,
relating to the municipal property of the district.
When calculating rent, instead of the coefficient 1.5
a coefficient of 0.4 was applied in violation
Resolution of the Head of Administration “On measures to
increasing budget revenues from rentals
state property", as a result of which
The district budget did not receive 1,584,677 rubles.
The lease agreement was signed by E.I. Kovalenko. - Head
administration of the G-th district of the city and Petrova A.I.
Chairman of the Municipal Management Committee
property of the district.

Investigative situation?

An employee of the reception desk of clinic No. contacted the CO.
5 Egorova with a statement about unfounded registration and
issuing certificates of temporary incapacity for work
traumatologist Pokrovsky, whom she believes
They give bribes for this.
The majority of these “patients” are not residents
Central district, and live in Promyshlenny
area in which Pokrovsky previously worked as head
trauma center.
The applicant testified that she was not present
when receiving bribes and have not heard about it from
other persons, but in medical records
There are no documents (x-rays, results
analyses, etc.), without which the issue cannot be resolved
about long-term release from work.
During the inspection, the facts of issuing leaflets were confirmed
temporary disability for residents of the area and
lack of necessary documents in medical
cards.

Contents1. Concept and system
forensic technology
2. Forensic doctrine of
traces
3. Technical and forensic
means and methods for collecting traces
4.Expert methods
trace research

Literature

Forensics: textbook / ed. I. F. Panteleeva,
N. A. Selivanova.
Forensics: textbook / ed. V. A. Obraztsova.
Forensics: textbook for universities / T. V. Averyanova, R. S. Belkin,
Yu. G. Korukhov, E. R. Rossinskaya / ed. R. S. Belkina.
Forensics: textbook for universities / ed. I. F. Gerasimova,
L. Ya. Drapkina.
Forensics: textbook / rep. ed. N.P. Yablokov.
Belkin, R.S. History of domestic criminology / R. S. Belkin. –
M., 1999.
Belkin, R. S. Criminalistics course. In 3 volumes / R. S. Belkin. M., 1997.
Gross, G. Guide for investigators as a forensic system /
G. Gross. – M., 2002.
Forensic technology: a lawyer's reference book / ed.
B.I. Shevchenko. M., 1959.
Krylov, N.F. Forensic doctrine of traces / N.F. Krylov. –
L., 1976.
Pohl, K.-D. Natural scientific criminology / K.-D. Paul. – M.,
1985.
Yakimov, I. N. Forensics. Guide to Criminal Technology and
tactics / I. N. Yakimov. – M., 2003.

1. Concept and system of forensic technology

1. CONCEPT AND SYSTEM
FORENSICS
TECHNIQUES

The concept of forensic technology as a branch of science

Forensic technology is
chapter
criminology,
V
which
includes scientific provisions and based
technical on them (in a broad sense)
recommendations for the use of products,
techniques and techniques designed for
gathering
And
research
traces
crimes and other measures
disclosures
And
warnings
crimes

The concept of forensic technology as a set of technical means

Forensic technology -
this is a collection of equipment
tools, devices and
materials used for collecting
and investigation of crime traces in
crime investigation process

Forensic technology system

Forensic photography and
video recording
Forensic traceology
Forensic research of weapons and
traces of its use
Forensic examination of documents
Forensic doctrine of signs
a person's appearance
Forensic investigation of substances,
materials and products

Technical and forensic tools differ in the tasks of application

Collection means and methods
(detection, seizure and fixation)
traces of a crime
Research tools and methods
traces of a crime

2. Forensic doctrine of traces

2. FORENSICS
TEACHING ABOUT TRACES

The concept of traces

Traces are imprints (imprints),
in which the external
the shape of the trace-forming object,
as well as all those material
changes that occur in
the situation at the scene of the incident,
environment and objects,
related to the event
crimes
I.N. Yakimov -
founder of the doctrine of
traces in the domestic
criminology

The concept of traces

Traces are
material objects and
macro- and
microtraces that
arise in the process
crimes allow
draw conclusions about the progress
crimes or
circumstances
crimes and indicate
on the criminal
V. Hoffmann
The trace is
material
display external
any building
object for which
this object could be
identified
B.I. Shevchenko

Mechanism of trace formation

PLACE
INCIDENTS
WEAPON OF THE CRIME
SACRIFICE
CRIMINAL
"Cross of traces" corresponding to the principle
cross trace transfer
E. Lokar

3. Technical and forensic tools and methods for collecting traces

3. TECHNICAL FORENSICAL
TOOLS AND METHODS
COLLECTING TRACES

The choice of trace collection method depends on

the nature of the traces themselves;
nature and state of carrier objects;
nature of the crime under investigation
events;
relationship of traces to the investigated
event;
proposed method of follow-up
expert examination of traces;
other factors and circumstances,
occurring at a crime scene or
during the investigation of traces

Trace collection activities consist of

search and detection of traces
recording inspection results
traces
seizure and preservation of traces

To search and detect traces are used


lighting devices: lanterns,
ultraviolet illuminators, sources
laser radiation, light filters, etc.;
– magnifying devices: magnifying glasses,
portable microscopes, etc.;

detection of metal objects;
– instruments and accessories for
detection of voids and non-metallic
items

Expert light source Spectrum™ 9000+,

Forms of recording detected traces:





verbal;
visual-figurative;
graphic;
subject

Basic means for removing traces:

absorbent materials (fabric napkins,
cotton swabs, paper filters, etc.);
materials for making impressions (gypsum,
silicone pastes, trace-copying compounds and
etc.);
adhesive materials (adhesive tapes and films);
magnets (magnetic finder-lifters, magnetic
brushes, etc.);
– brushes, brushes, tweezers, scalpels, etc.;
– electrostatic dust trace removers;
– micro vacuum cleaners, etc.

Electrostatic dust remover

Packaging of traces must meet the following requirements:

do not make additional
pollution;
not to be destructive or
changing impact on
the nature of the tracks;
prevent loss of traces when
transportation and storage

4.Methods of expert research of traces

4. METHODS OF EXPERT
TRACE STUDIES

The following groups of expert research methods are distinguished:

;
chemical analysis methods
composition;
phase and structural methods
analysis

Methods of morphological analysis

Photographic
methods
research
Special installation “Foto-Light-Box” for photography
forensic objects

Methods of morphological analysis

Microscopic
methods
research
Optical microscope company
"LEICA"

Methods of morphological analysis

Microscopic
methods
research
Comparative optical
microscope from LEICA

Methods of morphological analysis

Microscopic
methods
research
Raster electronic
JEOL microscope

Elemental Methods
analysis
-emission spectral
- atomic absorption
- X-ray fluorescence

Methods for analyzing chemical composition

Methods
molecular
analysis
- molecular spectroscopy
Infrared
Spectrometer "Nicolet"
850,06
1323,56
942,79
1431,37
1346,92
868,08
1238,94
910,07
1129,56
1069,41
1053,95
990,92
2942,30
3565,10
%T
3388,08
3356,13
4000
3000
2000
1500
CM-1
1000
472,51
552,49
450

Methods for analyzing chemical composition

Methods
molecular
analysis
-chromatographic methods
S
ig
. 1inC
:\H
P
C
H
E
M
\1
\D
A
T
A
\P
O
Z
H
A
R
\D
I
S
E
L
_
W
.
4
.0
e5
3
.0
e5
Gas chromatograph
Hewlett-Packard
2
.0
e5
1
.0
e5
0
2
4
6
8
1
0
1
2
T
im
e(
m
in
.)
1
4
1
6
1
8

Methods of phase and structural analysis

Under phase
understand the composition
quality or
quantitative
content
certain phases in
this object
Metallographic
analysis
X-ray diffraction
phase analysis


Top