General provisions of forensic technology. Presentations on forensics Forms for recording detected traces
- 1. Computer forensics Balashov V.Yu. Kharkov Research Institute of Forensic Expertise named after. Honored prof. M.S. Bokarius
- 2. Cybercrime Fraud (Article 190 of the Criminal Code) Infringement of copyright (Article 176 of the Criminal Code) Illegal actions with documents by means of access to bank accounts (Article 200 of the Criminal Code) Tax evasion (Article 212 of the Criminal Code) Pornography (Article 301 of the Criminal Code) Violation of various types of secrets (Article 231 of the Code of Ukraine)
- 3. New types of crimes Section XVI KKU ZLOCHINI U SPHERE VIKORISTANNYA ELECTRONIC-COMPUTING MACHINES (COMP "YUTERIV"), SYSTEMS AND COMPUTER "YUTERNIKH MEREZH I MEREZH ELECTROZV"YAZKU
- Article 361 Unauthorized interference with the operation of computer systems and networks, which led to: - Leakage; -Loss; -Fake; -Blocking information; -Distortion of the information processing process; - Violation of the established routing order
- 5. Punishable by a fine of 600 to 1000 non-taxable minimums or restriction of freedom for up to 3 years with confiscation of software and hardware with which the offense was committed. Repeated violation or as part of a group of persons: Imprisonment from 3 to 6 years.
- 6. 361-1 - malware Creation for the purpose of: use, distribution or sale, or distribution and sale of harmful software or hardware intended for unauthorized interference in the operation of computer systems and networks.
- 7. Punishable by - a fine of 500 to 1000 non-taxable minimums, - correctional labor for up to 2 years, - imprisonment for up to 2 years with confiscation of the funds developed or sold. Repeatedly or as part of a group of persons: Imprisonment for up to 5 years
- Article 361-2 Unauthorized sale or distribution of restricted information stored electronically.
- 9.
- Article 362 Unauthorized actions with information with limited access, which is stored electronically, committed by a person who has the right to access this information.
- 11. Alteration, destruction or blocking is punishable by: a fine of 600 to 100 non-taxable minimums or correctional labor for up to two years with confiscation of the software or hardware with which the acts were committed. Interception or copying that led to leakage: Imprisonment for up to three years with deprivation of the right to hold certain positions during the same period, with confiscation of software or hardware with which the acts were committed.
- Article 363 Violation of the rules for operating information and telecommunication systems and the rules for protecting information stored in them, which led to significant harm.
- 13. Punishable by 500 to 1000 non-taxable minimums or imprisonment for up to 3 years with deprivation of the right to hold certain positions or engage in certain activities for the same period.
- Article 363 - spam Intentional distribution of telecommunication messages, carried out without the prior consent of the recipients, which leads to disruption or termination of the operation of a computer system or network.
- 15. Punishable by a fine of 500 to 1000 non-taxable minimums or restriction of freedom for up to 3 years Repeatedly or as part of a group of persons: Restriction or imprisonment for up to 5 years
- 16. Who is looking for Security Service of Ukraine Office for Combating Cybercrime of the Ministry of Internal Affairs of Ukraine CERT-UA Ukrainian State Radio Frequency Center
- 17. Who analyzes Specialized forensic institutions of the Ministry of Justice of Ukraine Institute of Special Technology and Forensic Expertise of the SBU Forensic centers of the Ministry of Internal Affairs of Ukraine Experts not working in specialized structures and private specialists
- 18. How to search - Receiving data from providers - Receiving information from media in hosting servers - Social interaction - Surveillance - Wiretapping
- 19. What are they looking for - Identifying signs of equipment - Presence on the media of information indicating involvement - Chain of sequences of events of the incident - Artifacts indicating any events
- 20. Video and sound Identification of a person by oral or written speech Establishing the presence or absence of editing in recordings Establishing the number of persons taking part in a conversation
- 21. EXAMPLES FROM LIFE
- 22. Incident No. 1, 2011. The company became aware of a leak of internal corporate information received on the corporate email account.
- 23. Actions 1. Seizure of the mail server and transfer it for research. 2. Detection of the cause of the leak. 3. Establishing the geographic location of the attacker’s equipment. 4. Identification of the person who owns the equipment. 5. Identifying the attacker 6. Analysis of information on equipment media. 7. Proof of the attacker’s guilt based on information in his PC.
- 24. Result: Conviction under Art. 361
- 25. Incident No. 2, 2011 Mobile devices. A minor boy took several photos of his genitals with a mobile phone camera and sent them via MMS.
- 26. Problem Was this the mobile phone where the pictures were taken? When were the pictures taken? Were the pictures sent? Are there identifying features on the photographed organ?)
- 27. Actions Establishing the origin of snapshots: File system timestamps; Metadata in Exif; The uniqueness of the camera matrix; The method and order of naming images.
- 28. Establishing the sending of snapshots: analysis of sent messages (including deleted ones) with subsequent confirmation of message transmission by the operator according to the logs of the mobile operator.
- 29. Result The origin of photographs has been established with the accuracy of a unique device based on a combination of exclusively digital evidence.
- 30. Incident No. 3, 2013. In a large commercial company, the entire network infrastructure once stopped working. On the main server, the data was almost completely destroyed. The work of 100+ personnel is paralyzed.
- 31. Investigation objectives 1. Find out the reason for the destruction of data; 2. To establish the identity of the attacker who committed the destruction; 3.Prove the guilt of the attacker and bring him to justice.
- 32. Initial data A UNIX-like OS was installed on the hard drive, which performed routing between the internal network and the Internet. The infrastructure included a virtual machine that acted as an IP telephony server. Login to the virtual machine is possible only after successful authentication to the physical server (router).
Description of the presentation by individual slides:
1 slide
Slide description:
Subject, system and methodology of criminology Lecture prepared by Yarovaya N.Yu. Educational questions: 1. Concept and subject of criminology. History of the development of forensic knowledge. 2. The system of forensic science. Its nature and place among other sciences. 3.Forensic methods. Track. literature Lecture. Topic 1
2 slide
Slide description:
RECOMMENDED READING: Next. concept Saltevsky M.V. Forensics. In a modern presentation by lawyers. - Kharkov.: IMP “Rubicon”, 1996.-432 p. Averyanova T.V., Belkin R.S., Rossinskaya E.R., Korukhov Yu.G. Forensics. Textbook for universities.-M.: “Norma” 1999.-990 p. Belkin R.S. History of Russian criminology.-M.: 1999. Filippov A.G., Volynsky A.F. Forensics. Textbook for universities. - M.: "Spark". 2000. Lecture. Topic 1
3 slide
Slide description:
CRIMINALISTICS - (from the Latin сriminalis - criminal) is an area of specific scientific knowledge about criminal activity and its antipode - activities to identify, solve and investigate crimes, to establish the truth in the legal process. Prof. Belkin R.S. Next Gross Lecture. Topic 1
4 slide
Slide description:
Hans Gross (Gross) born December 16, 1847 - d. December 9, 1915 Austrian scientist, founder of European criminology, professor at universities in Graz and Prague. Founder of the world's first forensic museum. One of the pioneers of criminal psychology. At the turn of the 19th and 20th centuries he taught at Chernivtsi University. Author of the “Manual for forensic investigators as a system of criminology” Graz, 1882 (in Russian. Smolensk, 1895) Next Bertillon Lecture. Topic 1
5 slide
Slide description:
Alphonse Bertillon 1853-1914 One of the pioneers of criminology, director of the identification bureau of the Paris police prefecture. Author of the anthropometric method of forensic registration, method of verbal portrait, signaletic photography, sign-descriptive method in handwriting examination Next. Bertillonage Lecture. Topic 1
6 slide
Slide description:
BERTILLONAGE (Measuring a person for the purpose of his identification) First introduced by Bertillonage in France in 1879. A. Bertillon considered 11 measurements of the human body sufficient for identification. “Signaletic survey” Lecture. Topic 1
7 slide
Slide description:
Identification (signal) survey Next. Herschel Installation by A. Bertillon Photography procedure Lecture. Topic 1
8 slide
Slide description:
WILLIAM HERSHEL (Hershel) 1833-1917 English criminologist, pioneer of the phenomenon of papillary patterns. Back in 1858, he used them to identify pension recipients, and subsequently to register prisoners in colonial India. He challenged the primacy of the introduction of fingerprinting by G. Folds Next. Folds Lecture. Topic 1
Slide 9
Slide description:
HENRY FAULDS (Faulds) 1843-1930 English doctor who worked in Japan in the 70s. He was the first to propose using fingerprints from the crime scene to search and identify the criminals. He published his observations in 1880 in the journal Nature. Henry Lecture. Topic 1
10 slide
Slide description:
EDWARD HENRY (Henry) 1850-1931 English criminologist, creator of the fingerprint classification system, which he outlined in the book “Classification and Use of Fingerprints” (1900) FRANCIS HALTON (Halton) 1822-1911 English anthropologist and statistician. In 1891, he proposed a classification of papillary patterns and was the first to statistically prove the individuality of patterns on the nail phalanges of the fingers. “Stages...” Lecture. Topic 1
11 slide
Slide description:
STAGES OF DEVELOPMENT OF FORENSICS (according to R.S. Belkin) Stage of formation and accumulation of empirical material (late 19th - 30s of the 20th century) Stage of formation of private forensic theories (late 30s of the 20th century - late 60s of the 20th century) The stage of formation of the general theory of criminology and the further development of its particular theories (late 60s of the twentieth century - present) Next. Burinsky, Potapov Lecture. Topic 1
12 slide
Slide description:
Evgeniy Fedorovich Burinsky (1849-1912) Father of forensic photography, creator of the first forensic institution in Russia. Author of the so-called “second sight” in criminology. Main work: Forensic examination of documents, its production and use. St. Petersburg, 1903 Potapov Sergey Mikhailovich (1873-1957) Doctor of Law, professor. One of the pioneers of domestic criminology, author of the theory of forensic identification Next. Voronovsky Lecture. Topic 1
Slide 13
Slide description:
Voronovsky Nikolai Dmitrievich (1900-1981) Bokarius Nikolai Sergeevich (1869-1931) Native of Feodosia. Doctor of Medicine, Professor. Outstanding forensic physician and criminologist. Founder and first director of the Kharkov Research Institute of Forensic Science. Main work: Initial external examination of the corpse at the scene of the incident or its discovery. Kharkov.1931. One of the founders of the scientific and technical service in the police. Head of the NTO of the Crimean police. Author of the textbook “Criminal Technology. Beginning Course. - M.: Publishing House of the NKVD of the RSFSR. 1931. Track. Belkin et al. Lecture. Topic 1
Slide 14
Slide description:
Belkin Rafail Samuilovich (1922-2001) Honored Scientist, Doctor of Law, Professor, Major General of the Police. In 1970, he formulated the concept of the general theory of criminology and proposed a new definition of the subject of science. Author of about 300 scientific papers, more than 20 textbooks. Under his leadership, 122 students of E.P. Ishchenko, V.P. Bakhin, N.I. Klimenko defended their dissertations. Lecture system. Topic 1
15 slide
Slide description:
MODERN SYSTEM OF FORENSICS General theory Forensic technology Forensic tactics Forensic methodology Next. Concept of General Theory Lecture. Topic 1
16 slide
Slide description:
The general theory of criminology is a scientific reflection of the entire subject of science and its methodology. Subject of science Objectives of science Place of science Methods of science Concepts and terms Next. Crime technology Lecture. Topic 1
Slide 17
Slide description:
Forensic technology is a system of scientific principles and technical means, techniques and techniques developed on their basis, intended for collecting research and using evidence and other measures for solving and preventing crimes. Track. Crime tactics Lecture. Topic 1
18 slide
Slide description:
Forensic tactics is a system of scientific principles and recommendations developed on their basis for organizing and planning an investigation, determining the investigator’s line of conduct, methods of conducting investigative actions, collecting evidence, and establishing the circumstances that contributed to the commission of a crime. Track. Crime methodology Lecture. Topic 1
Slide 19
Slide description:
Forensic methodology is a synthesizing section of criminology that combines the provisions of forensic technology and forensic tactics in their specific interpretation in relation to the conditions and objectives of the investigation of a specific type of crime. Track. Connection with other sciences Lecture. Topic 1
Slide 1
CRIMINALISTICS: “Subject, system, methods and significance for the activities of future lawyers” Lecture for undergraduate 2nd year Moderator: candidate of legal sciences, senior lecturer of the department of criminal procedure and criminology Kramarenko V.P.Slide 2
Is lawyer a specialty? - NO!!! LAWYER IS A WAY OF LIFE!!! “It is scarcely possible for the mind of man to conceive such a riddle, which the mind of another of his fellows, properly directed, could not solve.” Edgar Allan PoeSlide 3
LECTURE PLAN: 1. History of the development of criminology. 2. Subject, object, system, tasks of criminology and its connection with other sciences. 3. Methods of cognition used in criminology. 4. Simulation in crime investigation. Prevention and forecasting.Slide 4
1. History of the development of criminology. FORENSICS helps to penetrate the veil of secrecy that hides the crime and the criminal. “If you hide the truth and bury it in the ground, it will certainly grow and acquire such strength that one day, when it breaks out, it will sweep away everything in its path.” Emile Zola.Slide 5
The term "CRIMINALISTICS" comes from the Latin word: "C R I M I N A L I S" - criminal (relating to a crime), was introduced into use by the Austrian scientist Hans Gross. In 1893 he published "The Investigator's Manual as a System of Forensic Science"Slide 6
Alphonse Bertillon, who worked in the Paris Prefecture since 1879, proposed taking body measurements of criminals. The measurements were entered into cards and used to further individualize their personality. This method is usually called anthropometric. Currently, from A. Bertillon’s method, only a description of a person’s appearance according to the rules of a verbal portrait has been preserved and is widely used in investigative practice.Slide 7
Slide 8
In 1892, the Englishman Francis Galton, in his monograph on fingerprints “Finger prints,” summarizes research in this area and lays down the basic principles of dermatoglyphics (constancy of finger patterns throughout life, strict individuality and the simple possibility of classification into three types - arcs (arches), loops , curls)Slide 9
Slide 10
Slide 11
Historically, criminology developed on the basis of a generalization of investigative practice and the active use of natural and technical knowledge for the purposes of solving, investigating and preventing crimes.Slide 12
Question 2. Subject, purpose, objectives, object, system of forensics and its connection with other sciences. The subject of any science, including criminology, is determined by indicating the patterns of objective reality that are studied by a specific science. Development of forensic science in the 19th and 20th centuries. indicates that she was studying methods of committing crimes and developing tactics for their investigation.Slide 13
In forensic science, to this day there is no unity in the definition of its subject. However, to give a general idea of the debate, it is worth mentioning the names of scientists who have contributed in this area. 1893 – Hans Gross; 1915 – Tregubov Sergey Nikolaevich; 1921 – Manns Herbert Yulianovich; 1925 – Yakimov Nikolai Ivanovich; 1936 – Zitser Emelyan Usherovich; 1938 – Shaver Boris Matveevich; 1949 – Potapov Sergey Mikhailovich; 1950 – Vinberg Abram Ilyich; 1951 – Tarasov-Rodionov Pyotr Ignatievich; 1956 – Mitrichev Stepan Petrovich; 1962 – Vasiliev Alexander Nikolaevich; Belkin Rafail Samuilovich, who in the period from 1967 to 2001 actively analyzed and proposed his vision of the subject of criminology; 1977 – Krylov Ivan Filippovich; 1980 – Matusovsky Grigory Abramovich, Panteleev Ilya Fedorovich, Obraztsov Viktor Aleksandrovich; 1990 – 2013 – Selivanov Nikolay Alekseevich, Yablokov Nikolay Pavlovich, Koldin Valentin Yakovlevich, Zuev Evgeny Ivanovich and others.Slide 14
Today, the subject of criminology according to R.S. Belkin defines it as: Forensic science is the science of the laws of the mechanism of a crime, the emergence of information about a crime and its participants, the collection, research, evaluation and use of evidence and special means and methods of forensic research and crime prevention based on the knowledge of these laws.Slide 15
The purpose of criminology is to ensure the processes of detection, investigation and prevention of crimes.Slide 16
The main tasks of forensic science: developing new and improving existing technical, organizational, tactical means and methods of working with evidenceSlide 17
The special tasks of forensic science are: 1. Further knowledge and research of a certain group of objective patterns inherent in the mechanisms of committing an unlawful act, the occurrence, collection and use of information (evidence) as a necessary condition for the development of the theoretical foundations of science and increasing the effectiveness of its recommendations for practice. 2. Development and improvement of technical and forensic tools, tactics and methodological recommendations for collecting, researching and using evidence. 3. Development and improvement of organizational, tactical and methodological foundations of preliminary investigation and trial.Slide 18
4. Development of new and improvement of forensic tools, techniques and methods of crime prevention. 5. Using positive experience accumulated abroad and actively introducing it into practical activities in solving crimes. 6. Development of techniques and methods for studying the conduct of a criminal in a post-criminal situation. Currently, this problem has not been sufficiently developed. Her research mainly ends at the level of studying the method of concealing a crime and its traces, the tools used, as well as property obtained by criminal means.Slide 19
In criminology, two objects of knowledge are traditionally distinguished - criminal activity and forensic activity. Criminal activity - includes all types and groups of crimes provided for by law. The structure of criminal activity contains such elements as: information about the criminal (physiological, psychological characteristics); about the subject of the criminal offense (victim); purpose and motive, methods and means of the crime, the circumstances of the crime, the result of the criminal act.Slide 20
Forensic activity (the second object of forensic science) is considered in the following aspects: special techniques for using forensic tools, materials, equipment, and technologies. planning the investigation organization and tactics of investigative actions and tactical techniques used in this case methodology for investigating certain types of crimeSlide 21
The science of criminology consists of 4 main sections: 1. The general theory of criminology is a system of its theoretical concepts, basic concepts, methods, and terms. (history of development, subject, object, goals, objectives, system, methods used, establishment of group affiliation, forensic diagnostics, identification theory)Slide 22
2. Forensic technology – a system of scientific provisions of recommendations on the use of technical means for collecting and studying evidence. Studies such subsections as: 2.1. Technical and forensic tools, materials; 2.2. Forensic photography, video recording, computer equipment; 2.3. Investigation (trasology including fingerprinting);Slide 23
2.4. Technical and forensic examination of documents; 2.5. Weapons science (forensic ballistics); 2.6.Habitology (habitoscopy) - forensic study of a person based on his external characteristics; 2.7. Forensic study of writing (graphology or handwriting); 2.8. Criminal registration (Maintaining and using forensic records).Slide 24
3. Forensic tactics - a system of scientific provisions and recommendations for organizing and planning preliminary and judicial investigations, determining the line of behavior of persons participating in this activity.Slide 25
This includes as constituent elements investigative situations and tactical decisions, tactical combinations, forensic versions and planning, tactics of individual investigative actions: investigative examination, examination; interrogation; Checking and clarifying indications on site; search, seizure; investigative experiment; presentation for identification, ordering examinations; search and detention.Slide 26
Forensic methodology – studies the specifics of the investigation of certain types of crimes.Slide 27
Forensics in the system of scientific knowledge is associated with a number of legal sciences and other branches of scientific knowledge. Forensic science is associated with related legal sciences: criminal law, criminal procedure, criminology, operational investigation, forensic medicine, forensic psychiatry, forensic expertology, etc.Slide 28
Forensic science is connected with the sciences of the social, humanitarian cycle, philosophy (materialist dialectics); psychology; logics; ethics; management science(MOST); sociology; linguistics.Slide 29
Forensics is related to the natural and technical sciences of chemistry; physics; mathematics; computer science; biology, anthropology, morphology, physiology, odologySlide 30
V.D. PristanskovLecture outline
1. Concept, tasks and systemforensic tactics.
2. Tactical technique: concept,
classification.
3. Criteria for acceptable use
tactical techniques.
4. Tactical combination.
5. Tactical operation.
6. Tactical risk.
7. Investigative situation.
Literature
Exarchopulo A.A. Forensics:Textbook. St. Petersburg, 2009. P.443-448.
Definition of forensic tactics
Forensictactics is a system of scientific
provisions and based on
recommendations for
as rational as possible
organization, planning
investigation and conduct
individual investigative
actions. Main
tasks
forensic tactics
are:
development of recommendations for
organization of the investigation,
tactics
preparation and production
individual investigative
actions.
Main categories of forensic tactics
tacticalreception;
tactical operation;
tactical decision;
tactical risk;
investigative situation
Tactical technique
- maximumrational and
effective action or
line of conduct when
conducting an investigation,
production of individual
investigative actions and
etc.
Conditions for using a tactical technique
- Legality,- Admissibility,
- Expediency,
- Ethics.
content and purpose of tactical techniques
1) cognitive (establishingcircumstances of the event under investigation by
discovery and research
forensically significant information);
2) managerial (establishing
interaction with those involved in the case
persons by attracting them to
investigation, establishment
psychological contact and use
optimal forms of tactical
influence and control their behavior);
.
3) organizational and technical (providingoptimal external conditions and
necessary organizational and technical means of activity).
Objectives and tactics
managerial and organizational and technical types are
auxiliary, serving
in relation to tasks
informational and cognitive type.
Tactical operation
- complextactical
investigative techniques
actions, ORM, goal
which is
problem solving
investigations.
Tactical operations are divided into:
1) simple tacticaloperations - a combination of tactical
receptions within the framework of one
investigative action;
2) complex tactical
operations - a combination of investigative
actions and operational investigative
activities during disclosure and
investigation of a specific
crimes.
Tactical decision
- target selectiontactical impact
as an investigation
the situation in general, and
into its individual elements
(conducting a confrontation, identifying witnesses
eyewitnesses (heard screams, name), holding
identification, familiarization with the findings of judicial
experts, etc.).
Tactical Risk
- risk associated withfailure to achieve
set tasks for
investigation
actions, tactical
operations (confrontation with
unstable victim, conducting repeated
forensic examination at the request of the defense,
identification by an uncertain identifier, etc.).
Investigative situation
- conditions in whichinvestigation is underway,
which change under
influence of objective and
subjective factors and
state
informational
ensuring the process
investigations.
Classification of investigative situations depending on:
- from time to time- from opportunity
achieving the goal
investigations (lost
or evidence, traces,
proof),
- on the nature of the relationship
between participants:
Investigative situations
Vdepending on time:
Initial;
Intermediate;
Final.
Investigative situations
Depending onopportunities to achieve
objectives of the investigation:
Favorable (giving a bribe under
control);
Unfavorable
conditions of non-obviousness).
(murder in
Investigative situations
Depending on the characterrelations between participants:
non-conflict or situations
"cooperation" when the goals and
interests of the investigator and
the interrogated are the same;
conflict (the detainee denies
the witness hides his involvement
information);
conflict situation:
with mild rivalry,interrogated in some way coincide, but according to
some positions do not match
(the accused is hiding accomplices and
etc.);
with strict rivalry,
when the goals and interests of the investigator and
questioned absolutely
opposite, there is a “wall” between them
misunderstanding, mistrust, antipathy,
which the investigator must either
destroy or overcome.
The initial situation is unfavorable
Information about the girl's disappearancewas reported to the police on February 2 around 20.00.
According to law enforcement agencies,
the girl lived in a large family in which,
besides her, six more children were raised.
In the morning she went to school. Until 16.00
was in a choreography lesson, after
after which she did not return home.
The last girl was seen by her mother
classmates. She said that together
they saw off Vasilisa with their daughter
to the underground passage, after which
They said goodbye and went home.
The situation is intermediate, favorable, conflict-free
Kidnapping and murder suspectgirls 30 year old man being
detained, confessed to committing
crime and showed where he hid the body.
Found on the child's body
numerous abrasions, knife
wound in the scapula area, traces
sexual violence.
Action taken against the detainee
suppression in the form of detention.
Situation 1: ultimate conflict-free
Forensic examinations were carried outexaminations completed
necessary investigative
actions that allowed
consolidate evidence.
The accused admitted guilt.
Protocol of familiarization with
criminal case materials
signed, no requests.
Situation 2: finite, conflict
Forensic examinations were carried outexaminations, necessary
investigative actions that
allowed evidence to be consolidated.
The accused pleaded guilty to
concealing a crime. Gave
testimony that he learned about the crime
from his fellow countryman, who
committed, at his request he helped
take the child's corpse out of town to
your car and bury it. Blame
admitted because he was beaten
operatives, what do they know about him?
cellmates who saw him
beatings.
Investigative situation?
The Investigation Department received an audit report fromthe results of which indicate that in the period 2010-20011.
the administration of the G-th region systematically violated
rules of budget financing. Yes, with LLC
"Golden Ear" (headed by P.K. Kovalenko) were
lease agreements No. 74 and No. 18 were concluded on transfer to
rental of premises with an area of 1147.7 sq. m. and 186.4 sq.m.,
relating to the municipal property of the district.
When calculating rent, instead of the coefficient 1.5
a coefficient of 0.4 was applied in violation
Resolution of the Head of Administration “On measures to
increasing budget revenues from rentals
state property", as a result of which
The district budget did not receive 1,584,677 rubles.
The lease agreement was signed by E.I. Kovalenko. - Head
administration of the G-th district of the city and Petrova A.I.
Chairman of the Municipal Management Committee
property of the district.
Investigative situation?
An employee of the reception desk of clinic No. contacted the CO.5 Egorova with a statement about unfounded registration and
issuing certificates of temporary incapacity for work
traumatologist Pokrovsky, whom she believes
They give bribes for this.
The majority of these “patients” are not residents
Central district, and live in Promyshlenny
area in which Pokrovsky previously worked as head
trauma center.
The applicant testified that she was not present
when receiving bribes and have not heard about it from
other persons, but in medical records
There are no documents (x-rays, results
analyses, etc.), without which the issue cannot be resolved
about long-term release from work.
During the inspection, the facts of issuing leaflets were confirmed
temporary disability for residents of the area and
lack of necessary documents in medical
cards.
Contents1. Concept and system
forensic technology
2. Forensic doctrine of
traces
3. Technical and forensic
means and methods for collecting traces
4.Expert methods
trace research
Literature
Forensics: textbook / ed. I. F. Panteleeva,N. A. Selivanova.
Forensics: textbook / ed. V. A. Obraztsova.
Forensics: textbook for universities / T. V. Averyanova, R. S. Belkin,
Yu. G. Korukhov, E. R. Rossinskaya / ed. R. S. Belkina.
Forensics: textbook for universities / ed. I. F. Gerasimova,
L. Ya. Drapkina.
Forensics: textbook / rep. ed. N.P. Yablokov.
Belkin, R.S. History of domestic criminology / R. S. Belkin. –
M., 1999.
Belkin, R. S. Criminalistics course. In 3 volumes / R. S. Belkin. M., 1997.
Gross, G. Guide for investigators as a forensic system /
G. Gross. – M., 2002.
Forensic technology: a lawyer's reference book / ed.
B.I. Shevchenko. M., 1959.
Krylov, N.F. Forensic doctrine of traces / N.F. Krylov. –
L., 1976.
Pohl, K.-D. Natural scientific criminology / K.-D. Paul. – M.,
1985.
Yakimov, I. N. Forensics. Guide to Criminal Technology and
tactics / I. N. Yakimov. – M., 2003.
1. Concept and system of forensic technology
1. CONCEPT AND SYSTEMFORENSICS
TECHNIQUES
The concept of forensic technology as a branch of science
Forensic technology ischapter
criminology,
V
which
includes scientific provisions and based
technical on them (in a broad sense)
recommendations for the use of products,
techniques and techniques designed for
gathering
And
research
traces
crimes and other measures
disclosures
And
warnings
crimes
The concept of forensic technology as a set of technical means
Forensic technology -this is a collection of equipment
tools, devices and
materials used for collecting
and investigation of crime traces in
crime investigation process
Forensic technology system
Forensic photography andvideo recording
Forensic traceology
Forensic research of weapons and
traces of its use
Forensic examination of documents
Forensic doctrine of signs
a person's appearance
Forensic investigation of substances,
materials and products
Technical and forensic tools differ in the tasks of application
Collection means and methods(detection, seizure and fixation)
traces of a crime
Research tools and methods
traces of a crime
2. Forensic doctrine of traces
2. FORENSICSTEACHING ABOUT TRACES
The concept of traces
Traces are imprints (imprints),in which the external
the shape of the trace-forming object,
as well as all those material
changes that occur in
the situation at the scene of the incident,
environment and objects,
related to the event
crimes
I.N. Yakimov -
founder of the doctrine of
traces in the domestic
criminology
The concept of traces
Traces arematerial objects and
macro- and
microtraces that
arise in the process
crimes allow
draw conclusions about the progress
crimes or
circumstances
crimes and indicate
on the criminal
V. Hoffmann
The trace is
material
display external
any building
object for which
this object could be
identified
B.I. Shevchenko
Mechanism of trace formation
PLACEINCIDENTS
WEAPON OF THE CRIME
SACRIFICE
CRIMINAL
"Cross of traces" corresponding to the principle
cross trace transfer
E. Lokar
3. Technical and forensic tools and methods for collecting traces
3. TECHNICAL FORENSICALTOOLS AND METHODS
COLLECTING TRACES
The choice of trace collection method depends on
the nature of the traces themselves;nature and state of carrier objects;
nature of the crime under investigation
events;
relationship of traces to the investigated
event;
proposed method of follow-up
expert examination of traces;
other factors and circumstances,
occurring at a crime scene or
during the investigation of traces
Trace collection activities consist of
search and detection of tracesrecording inspection results
traces
seizure and preservation of traces
To search and detect traces are used
–lighting devices: lanterns,
ultraviolet illuminators, sources
laser radiation, light filters, etc.;
– magnifying devices: magnifying glasses,
portable microscopes, etc.;
detection of metal objects;
– instruments and accessories for
detection of voids and non-metallic
items
Expert light source Spectrum™ 9000+,
Forms of recording detected traces:
––
–
–
verbal;
visual-figurative;
graphic;
subject
Basic means for removing traces:
absorbent materials (fabric napkins,cotton swabs, paper filters, etc.);
materials for making impressions (gypsum,
silicone pastes, trace-copying compounds and
etc.);
adhesive materials (adhesive tapes and films);
magnets (magnetic finder-lifters, magnetic
brushes, etc.);
– brushes, brushes, tweezers, scalpels, etc.;
– electrostatic dust trace removers;
– micro vacuum cleaners, etc.
Electrostatic dust remover
Packaging of traces must meet the following requirements:
do not make additionalpollution;
not to be destructive or
changing impact on
the nature of the tracks;
prevent loss of traces when
transportation and storage
4.Methods of expert research of traces
4. METHODS OF EXPERTTRACE STUDIES
The following groups of expert research methods are distinguished:
;chemical analysis methods
composition;
phase and structural methods
analysis
Methods of morphological analysis
Photographicmethods
research
Special installation “Foto-Light-Box” for photography
forensic objects
Methods of morphological analysis
Microscopicmethods
research
Optical microscope company
"LEICA"
Methods of morphological analysis
Microscopicmethods
research
Comparative optical
microscope from LEICA
Methods of morphological analysis
Microscopicmethods
research
Raster electronic
JEOL microscope
Elemental Methods
analysis
-emission spectral
- atomic absorption
- X-ray fluorescence
Methods for analyzing chemical composition
Methodsmolecular
analysis
- molecular spectroscopy
Infrared
Spectrometer "Nicolet"
850,06
1323,56
942,79
1431,37
1346,92
868,08
1238,94
910,07
1129,56
1069,41
1053,95
990,92
2942,30
3565,10
%T
3388,08
3356,13
4000
3000
2000
1500
CM-1
1000
472,51
552,49
450
Methods for analyzing chemical composition
Methodsmolecular
analysis
-chromatographic methods
S
ig
. 1inC
:\H
P
C
H
E
M
\1
\D
A
T
A
\P
O
Z
H
A
R
\D
I
S
E
L
_
W
.
4
.0
e5
3
.0
e5
Gas chromatograph
Hewlett-Packard
2
.0
e5
1
.0
e5
0
2
4
6
8
1
0
1
2
T
im
e(
m
in
.)
1
4
1
6
1
8
Methods of phase and structural analysis
Under phaseunderstand the composition
quality or
quantitative
content
certain phases in
this object
Metallographic
analysis
X-ray diffraction
phase analysis