Introduction to Criminal Investigation: Processes, Practices and Thinking Introduction to Criminal Investigation: Processes, Practices and Thinking

Total Page:16

File Type:pdf, Size:1020Kb

Introduction to Criminal Investigation: Processes, Practices and Thinking Introduction to Criminal Investigation: Processes, Practices and Thinking Introduction to Criminal Investigation: Processes, Practices and Thinking Introduction to Criminal Investigation: Processes, Practices and Thinking ROD GEHL AND DARRYL PLECAS JUSTICE INSTITUTE OF BRITISH COLUMBIA NEW WESTMINSTER, BC Introduction to Criminal Investigation: Processes, Practices and Thinking by Rod Gehl is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License, except where otherwise noted. Introduction to Criminal Investigation: Processes, Practices and Thinking by Rod Gehl and Darryl Plecas is, unless otherwise noted, released under a Creative Commons Attribution 4.0 International (CC BY-NC) license. This means you are free to copy, retain (keep), reuse, redistribute, remix, and revise (adapt or modify) this textbook but not for commercial purposes. Under this license, anyone who revises this textbook (in whole or in part), remixes portions of this textbook with other material, or redistributes a portion of this textbook, may do so without gaining the author’s permission providing they properly attribute the textbook or portions of the textbook to the author as follows: Introduction to Criminal Investigation: Processes, Practices and Thinking by Rod Gehl and Darryl Plecas is used under a CC BY-NC 4.0 International license. Additionally, if you redistribute this textbook (in whole or in part) you must retain the below statement, Download this book for free at https://pressbooks.bccampus.ca/criminalinvestigation/ as follows: 1. digital format: on every electronic page 2. print format: on at least one page near the front of the book To cite this textbook using APA, for example, follow this format: Gehl, Rod & Plecas, Darryl. (2016). Introduction to Criminal Investigation: Processes, Practices and Thinking. New Westminster, BC: Justice Institute of British Columbia. Contents Acknowledgements vi Foreward vii Chapter 1: Introduction 1 Chapter 2: Some Important Basic Concepts 11 Chapter 3: What You Need To Know About Evidence 33 Chapter 4: The Process of Investigation 46 Chapter 5: Strategic Investigative Response 60 Chapter 6: Applying the Investigative Tools 69 Chapter 7: Witness Management 84 Chapter 8: Crime Scene Management 102 Chapter 9: Interviewing, Questioning, and Interrogation 122 Chapter 10: Forensic Sciences 136 Chapter 11: Summary 154 References 159 About the Authors 166 Testimonials 167 References 168 References Acknowledgements The authors wish to thank Dr. Gary Bass (LLD Honorary and Senior Research Fellow, Simon Fraser University and Retired RCMP Deputy Commissioner West), Inspector Steven McCartney (Program Director, BC Police Academy), Dr. Tim Croisdale (Associate Professor, California State University), Dr. Yvon Dandurand (School of Criminology and Criminal Justice, UFV, and Fellow, International Centre for Criminal Law Reform and Criminal Justice Policy), Steven Gehl (Sergeant, RCMP Forensic Identification Section, Retired) Robert Gehl (Inspector, Victoria Police Department, Retired), Stuart K. Wyatt, (BA, MA, Asc Forensic Identification Officer, Retired), for their very helpful reviews of earlier drafts of the manuscript. They are also very grateful to Dr. Irwin Cohen (Senior University Research Chair (RCMP) and Director of the Centre for Public Safety and Criminal Justice Research, University of the Fraser Valley) for work in editing the manuscript. Finally, the authors wish to thank Dr. Tannis Morgan (Associate Director, Office of Applied Research and Graduate Studies, JIBC) for her guidance and facilitation of JIBC assistance in publication, Krista Lambert (Instructional Designer, JIBC, CTLI) for her assistance in graphics and manuscript formatting for this book, and to Stephanie Hipkin (JIBC graduate) for her collaboration in copyediting the final draft. vi Foreward I am honored to have been asked to write the foreword for this important book, written by an accomplished police officer in collaboration with a prominent Canadian criminologist. Rod Gehl began his career with the Royal Canadian Mounted Police, and went on to have a highly successful career retiring as an Inspector with the Abbotsford Police Department, one of the most respected departments in Canada. Since retirement Rod has continued to use his investigative expertise providing advice to government and teaching at the Justice Institute of British Columbia. Now, coming together with Dr. Darryl Plecas, University of the Fraser Valley Professor Emeritus and former RCMP Research Chair, Rod has completed this book which speaks to the operational application of the criminal investigation, processes, practices, and thinking. Having known Rod professionally for over 22 years, he has my respect and that of our colleagues for his capacity in mastering the investigative processes as well as for his policing leadership. The breadth of his expertise in Major Case Management uniquely qualifies him to have written this book. This introduction to criminal investigation fills a void in the literature and will benefit police officers starting their careers in virtually all aspects of what is important to learn to be effective in policing, It not only speaks to the investigative processes but also the day to day work that policing involves. More importantly, the underlying theories, processes, practices and thinking skills remain relevant throughout the career of a police officer and therefore this book will be of value to both new recruits and seasoned police officers. The underlying themes of integrity, diligence, investigative thinking, tenacity, respect, and striving to do the best that one can do at all times, are just as important at the end of a policing career as they are at the beginning. I therefore see this book as having an enduring value to police officers at all levels and stages of their careers, and I am pleased to fully endorse it as such. Gary D. Bass (Rtd.) Deputy Commissioner Canada West Royal Canadian Mount Police vii Chapter 1: Introduction “A good investigator needs to be conscious of his or her-own thinking, and that thinking needs to be an intentional process.” It is too bad we can not just provide you with a basic template to follow every time you needed to conduct a criminal investigation; but it is not that simple. Criminal investigations can be imprecise undertakings, often performed in reaction to unpredictable and still-evolving events with incomplete information to guide the process. As such, it is impossible to teach or learn a precise methodology that can be applied in every case. Still, there are important concepts, legal rules, and processes that must be respected in every investigation. This book outlines these concepts, rules, and processes with the goal of providing practical tools to ensure successful investigative processes and investigative practices. Most importantly, this book informs you on how to approach the investigative process using “investigative thinking”. In this first chapter, we set the foundation for the book by calling attention to five important topics: 1. Criminal investigation as a thinking process 2. The need to think through the process 3. Towards modern-day investigation 4. The path to becoming an investigator 5. Understanding the investigative mind Topic 1: Criminal Investigation as a Thinking Process Criminal investigation is a multi-faceted, problem-solving challenge. Arriving at the scene of a crime, an officer is often required to rapidly make critical decisions, sometimes involving life and death, based on limited information in a dynamic environment of active and still evolving events. After a criminal event is over, the investigator is expected to preserve the crime scene, collect the evidence, and devise an investigative plan that will lead to the forming of reasonable grounds to identify and arrest the person or persons responsible for the crime. To meet these challenges, police investigators, through training and experience, learn investigative processes to develop investigative plans and prioritize responses. In this book, these investigative responses, information analyses, and plan-making skills are broken out using 1 CHAPTER 1: INTRODUCTION • 2 illustrations of both tactical and strategic investigative thinking. The aim of the book is to guide you into the structured practices of tactical investigative response and strategic investigative thinking. Criminal investigation is not just a set of task skills, it is equally a set of thinking skills. To become an effective investigator, these skills need to be consciously understood and developed to the point where they are deliberately engaged to work through the problem-solving process that is criminal investigation. Trained thinking and response can be difficult to adapt into our personal repertoires because we are all conditioned to be much less formal and less evidence driven in our everyday thinking. Still, as human beings, we are all born investigators of sorts. As Taber (2006) pointed out in his book, Beyond Constructivism, people constantly construct knowledge, and, in our daily lives, we function in a perpetual state of assessing the information that is presented to us. Interpreting the perceptions of what we see and what we hear allows us reach conclusions about the world around us (Taber, 2006). Some people are critically analytical and want to see evidence to confirm their beliefs, while others are prepared to accept information at face value until they are presented facts that disprove their previously held beliefs. Either strategy is generally acceptable for ordinary people
Recommended publications
  • Role of Orthodontics in Forensic Odontology- a Social Responsibility Dentistry Section
    DOI: 10.7860/JCDR/2016/15798.7633 Review Article Role of Orthodontics in Forensic Odontology- A Social Responsibility Dentistry Section GIRIDHAR REDDY1, VINAY P REDDY2, MEENAKSHI SHARMA3, MONIKA AGGARWAL4 ABSTRACT Orthodontics like any other specialty has much to offer law enforcement in the detection and solution of crime or in civil proceedings. Forensic odontology often requires an interdisciplinary approach towards dentistry for the purpose of proper diagnosis of cases. In cases where the forensic odontologist has to establish a person’s identity, an orthodontist can be of great help at times. Teeth, with their anatomic/physiologic variations and therapy such as orthodontic treatment, restorations and prosthesis may record information that remains throughout life and beyond. The teeth may also be used as weapons for defense or offense and as such may leave information about the identity of the biter at the time of crime. Forensic odontology also plays an important role in the recognition of crime and abuse among people of all ages. Orthodontists like all other dental professionals can play a major role by maintaining proper dental records and thus providing important or vital information or clues to the legal authorities in order to help them in their search. Keywords: Bite marks, Cephalometric software, Forensic science, Orthodontic scars INTRODUCTION cases, virtually a certain identification tool. Even when data are Forensic science is the application of a broad spectrum of sciences sparse, it may result in recognized identification that can later be used in order to answer questions of interest to a legal system confirmed by more scientific techniques such as the DNA samping related to crime or civil action [1,2].
    [Show full text]
  • Csi: Forensic Challenge
    ACTIVITY OPTION CSI: FORENSIC CHALLENGE Step into the world of crime scene investigation to unravel a true crime using some of the latest forensic detective technology. Teams are presented with the facts and visual evidence of a real life crime. Their challenge, using a real process of investigation, is to solve the mystery and identify the murderer and motive. Our head of investigation will teach your team how to properly examine a simulated crime scene. Your team will also use their observational skills to create a composite sketch of a suspect using the same software used by police agencies around the world. They will then implicate the suspect after carrying out a variety of forensic techniques including simulated blood typing, blood spatter analysis, fingerprint analysis, glass analysis, luminol detection of simulated blood and DNA analysis. At the start of the event each team will be given their own "Crime File", which contains everything they need to know about the investigation. Each person is also given their own examination kit, comprising of a one piece white body suit, masks and gloves. After kitting up it is time for the RUNNING TIME: The ideal length of time for this activity is 2-3 investigation to commence! Your task is to investigate the crime, using hours. forensics to prove it. Participants will need to use a variety of forensic techniques to solve the MIN/MAX GROUP SIZE: Suitable for 15-150 participants. murder, including ballistics, blood spatter pattern analysis, fingerprint dusting, forensic dentistry, hair and fibre, photofit, and DNA. PEOPLE PER TEAM: We would recommend 8-10 participants per team.
    [Show full text]
  • Nuclear Forensics in Support of Investigations
    IAEA Nuclear Security Series No. 2-G (Rev.1) Implementing Guide Nuclear Forensics in Support of Investigations This publication is a revision of IAEA Nuclear Security Series No. 2, Nuclear Forensics Support, which was published in 2006 and has been widely adopted by States to develop a nuclear forensic capability. This publication provides up to date information on investigating nuclear security events, the legal basis for nuclear forensics, nuclear forensics within a national response plan, the initiation of an examination, the availability of a nuclear forensics laboratory using existing national capabilities, and forensic analysis of nuclear and other radioactive material and of evidence contaminated by radionuclides. INTERNATIONAL ATOMIC ENERGY AGENCY VIENNA ISBN 978–92–0–102115–1 ISSN 1816–9317 @ RELATED PUBLICATIONS IAEA NUCLEAR SECURITY SERIES RADIOLOGICAL CRIME SCENE MANAGEMENT Nuclear security issues relating to the prevention and detection of, and response IAEA Nuclear Security Series No. 22-G to, criminal or intentional unauthorized acts involving, or directed at, nuclear material, STI/PUB/1672 (93 pp.; 2014) other radioactive material, associated facilities or associated activities are addressed in the ISBN 978–92–0–108714–0 Price: €48.00 IAEA Nuclear Security Series. These publications are consistent with, and complement, international nuclear security instruments, such as the Convention on the Physical Protection NUCLEAR SECURITY RECOMMENDATIONS of Nuclear Material and its Amendment, the International Convention for the Suppression of ON NUCLEAR AND OTHER RADIOACTIVE MATERIAL Acts of Nuclear Terrorism, United Nations Security Council resolutions 1373 and 1540, and the Code of Conduct on the Safety and Security of Radioactive Sources. OUT OF REGULATORY CONTROL IAEA Nuclear Security Series No.
    [Show full text]
  • 2021-22 Undergraduate Catalog
    Undergraduate and Graduate Course Descriptions for the 2021 - 2022 Academic Year ACCT - Accounting ACCT 201 INTRO TO FINANCIAL ACCOUNTING: A comprehensive study of basic financial accounting processes applicable to a service, merchandising, and manufacturing business. An analysis of transactions, journalizing, posting, preparation of working papers and ­financial statements. ACCT 202 INTRO TO MANAGERIAL ACCT: An introductory study of managerial accounting processes including job order costing, process costing, cost­volume­profit analysis, standard costs, activity­based costing, cost analysis, budgeting, and managerial decision making. Prerequisite: ACCT 201 or equivalent with a minimum grade of C. ACCT 301 INTERMEDIATE ACCOUNTING I: A study of financial accounting ­standard setting, the conceptual framework underlying financial accounting, balance sheet and income statement ­presentations, revenue and expense ­recognition, and accounting for current assets, and current liabilities. Prerequisite: ACCT 202 with a minimum grade of C. ACCT 302 INTERMEDIATE ACCOUNTING II: This class is the second course of the three­semester sequence of intermediate financial accounting. This course focuses on issues related to the reporting and analysis of financial accounting information. The objective in this course is to examine in detail (with an emphasis on both the "what" and the "why") the following financial topics: 1) Operational Assets 2) Time value of money 3) Bonds and long term notes 4) Leases 5) Employee benefits and pensions. Prerequisite: ACCT301 or equivalent with a minimum grade of C. ACCT 306 COST ACCOUNTING: A study of cost behavior, overhead cost ­allocations, cost systems design, and an introduction to activity­based costing and control systems. Emphasis is on case studies and other practical applications.
    [Show full text]
  • Digital Forensic Tools & Cloud-Based Machine Learning for Analyzing
    Georgia Southern University Digital Commons@Georgia Southern Electronic Theses and Dissertations Graduate Studies, Jack N. Averitt College of Spring 2018 Digital Forensic Tools & Cloud-Based Machine Learning for Analyzing Crime Data Majeed Kayode Raji Follow this and additional works at: https://digitalcommons.georgiasouthern.edu/etd Part of the Business Analytics Commons, Business Intelligence Commons, Computational Engineering Commons, and the Other Engineering Commons Recommended Citation Raji, Majeed Kayode, "Digital Forensic Tools & Cloud-Based Machine Learning for Analyzing Crime Data" (2018). Electronic Theses and Dissertations. 1879. https://digitalcommons.georgiasouthern.edu/etd/1879 This thesis (open access) is brought to you for free and open access by the Graduate Studies, Jack N. Averitt College of at Digital Commons@Georgia Southern. It has been accepted for inclusion in Electronic Theses and Dissertations by an authorized administrator of Digital Commons@Georgia Southern. For more information, please contact [email protected]. DIGITAL FORENSIC TOOLS & CLOUD-BASED MACHINE LEARNING FOR ANALYZING CRIME DATA by MAJEED KAYODE RAJI (Under the Direction of Hayden Wimmer) ABSTRACT Digital forensics is a branch of forensic science in which we can recreate past events using forensic tools for a legal measure. Also, the increase in the availability of mobile devices has led to their use in criminal activities. Moreover, the rate at which data is being generated has been on the increase which has led to big data problems. With cloud computing, data can now be stored, processed and analyzed as they are generated. This thesis document consists of three studies related to data analysis. The first study involves analyzing data from an Android smartphone while making a comparison between two forensic tools; Paraben E3: DS and Autopsy.
    [Show full text]
  • Hacking Exposed Computer Forensics, Second Edition, Delivers the Most Valuable Insight on the Market
    HACKING EXPOSED™ COMPUTER FORENSICS SECOND EDITION REVIEWS “This book provides the right mix of practical how-to knowledge in a straightforward, informative fashion that ties all the complex pieces together with real-world case studies. With so many books on the topic of computer forensics, Hacking Exposed Computer Forensics, Second Edition, delivers the most valuable insight on the market. The authors cut to the chase of what people must understand to effectively perform computer forensic investigations.” —Brian H. Karney, COO, AccessData Corporation “Hacking Exposed Computer Forensics is a ‘must-read’ for information security professionals who want to develop their knowledge of computer forensics.” —Jason Fruge, Director of Consulting Services, Fishnet Security 00-FM.indd i 8/23/2009 3:54:42 AM “Computer forensics has become increasingly important to modern incident responders attempting to defend our digital castles. Hacking Exposed Computer Forensics, Second Edition, picks up where the first edition left off and provides a valuable reference, useful to both beginning and seasoned forensic professionals. I picked up several new tricks from this book, which I am already putting to use.” —Monty McDougal, Raytheon Information Security Solutions, and author of the Windows Forensic Toolchest (WFT) (www.foolmoon.net) “Hacking Exposed Computer Forensics, Second Edition, is an essential reference for both new and seasoned investigators. The second edition continues to provide valuable information in a format that is easy to understand and reference.” —Sean Conover, CISSP, CCE, EnCE “This book is an outstanding point of reference for computer forensics and certainly a must-have addition to your forensic arsenal.” —Brandon Foley, Manager of Enterprise IT Security, Harrah’s Operating Co.
    [Show full text]
  • Rugoscopy: a Fingerprint of Oral Cavity in Forensic Dentistry
    Review Article Indian Journal of Forensic Odontology Volume 12 Number 1, January - June 2019 DOI: http://dx.doi.org/10.21088/ijfo.0974.505X.12119.4 Rugoscopy: A Fingerprint of Oral Cavity in Forensic Dentistry Mounabati Mohapatra1, Priyanka Sarangi2, Sukanta Satapathy3 1Professor HOD, Dental Surgery, All India Institute of Medical Sciences (AIIMS), Bhubaneswar, Odisha 751019, India. 2Dental Surgeon, Department of Conservative Dentistry and Endodontics, SCB Dental College and Hospital, Cuttack, Odisha 753001, India. 3Associate Professor, Department of Dentistry, Balasore Medical College, Balasore, Odisha 756019, India. How to cite this article: Mounabati Mohapatra, Priyanka Sarangi and Sukanta Satapathy. Rugoscopy: A Fingerprint of Oral Cavity in Forensic Dentistry. 2019;12(1):19-21 Abstract It is a well-known fact that the pattern of palatal rugae is very unique, similar to fingerprints. Rugal length and transverse palatal rugal region width advances with age in both male and females. This advancement stops once the somatic growth stops. Also, there appears to be a significant correlation between rugae patterns and ethnicity. Palatal rugae pattern of an individual may be considered as a useful adjunct in the field of forensic dentistry for identification purposes. Hence, this review article aims at providing a detail insight into the role of palatal rugae in the field of forensic dentistry. Keywords: Palatal rugae, Forensic dentistry. Introduction anterior third of the palate”. They are also called “plica palatinae” or “rugae palatine” [4]. Con rming a person's indentity can be a typically The earliest reference to rugae was in anatomy complicated procedure, one of the main standpoints book by Winslow in 1732 and was rst illustrated of the forensic sciences.
    [Show full text]
  • IEEE Paper Template in A4 (V1)
    ISSN 2319 – 1953 International Journal of Scientific Research in Computer Science Applications and Management Studies Digital Forensics in Cloud Computing Environment Santhosh B, Nelson Dsouza#2, Akash D Kumbhar*2 #1,Associate Professor, Dept of MCA,AIMIT, Mangaluru, Karnataka, India #2Department of MCA, AIMIT, Mangaluru, Karnataka, India Abstract— The Internet is growing explosively, as is the • In a lawful manner, preserving, extracting, storing, analyzing number of crimes committed against or using computers. As a and presenting the evidence. response to the growth of computer crime, the field of computer • To gain an insight into the activities and techniques used by forensics has emerged. Computer forensics involves carefully cybercriminals. And find a counter way to solve the loopholes. collecting and examining electronic evidence that not only assesses the damage to a computer as a result of an electronic III. CHALLENGES AND RESEARCH GAPS attack, but also to recover lost information from such a system to prosecute a criminal. With the growing importance of computer The states not available, suspect and court ready becomes a security today and the seriousness of cybercrime, it is important challenge for cloud forensic investigator to recognize the data for computer professionals to understand the technology that is set for them. The increase in data storage capacity in a cloud used in computer forensics. This paper will discuss the need, goal is a disadvantage for a digital forensic investigation as it for computer forensics to be practiced in an effective, legal ways increases the time for analyzing the abundant data. and challenges. Forensics is the process of using scientific Lack of tools and little expertise in cloud forensics is of knowledge for collecting, analyzing and presenting evidence to concern, involves more challenging when encryption, multi- the courts.
    [Show full text]
  • About the AAFS
    American Academy of Forensic Sciences 410 North 21st Street Colorado Springs, Colorado 80904 Phone: (719) 636-1100 Email: [email protected] Website: www.aafs.org @ AAFS Publication 20-2 Copyright © 2020 American Academy of Forensic Sciences Printed in the United States of America Publication Printers, Inc., Denver, CO Typography by Kathy Howard Cover Art by My Creative Condition, Colorado Springs, CO WELCOME LETTER Dear Attendees, It is my high honor and distinct privilege to welcome you to the 72nd AAFS Annual Scientific Meeting in Anaheim, California. I would like to thank the AAFS staff, the many volunteers, and everyone else who have worked together to create an excellent program for this meeting with the theme Crossing Borders. You will have many opportunities to meet your colleagues and discuss new challenges in the field. There are many workshops and special sessions that will be presented. The Interdisciplinary and Plenary Sessions will provide different views in forensic science—past, present, and future. The Young Forensic Scientists Forum will celebrate its 25th Anniversary and is conducting a workshop related to the meeting theme. More than 1,000 presentations are scheduled that will provide you with more insight into the developments in forensic science. The exhibit hall, always interesting to explore, is where you will see the latest forensic science equipment, technology, and literature. The theme Crossing Borders was chosen by me and my colleagues at the Netherlands Forensic Institute (NFI). We see many definitions of crossing borders in forensic science today. For the 2020 meeting, six words starting with the letters “IN” are included in the theme.
    [Show full text]
  • Use of DNA Technology in Forensic Dentistry
    orensi f F c R o e l s a e n r a r u c Shambulingappa et al., J Forensic Res 2012, 3:7 o h J Journal of Forensic Research DOI: 10.4172/2157-7145.1000155 ISSN: 2157-7145 Review Article Open Access Use of DNA Technology in Forensic Dentistry Shambulingappa P, Soheyl S, Rajesh Gupta*, Simranpreet Kaur, Amit Aggarwal, Ravinder Singh and Deepak Gupta Department of oral medicine and radiology, M.M. College of Dental Sciences and Research, Mullana, Ambala, Haryana, India Abstract The discovery of DNA plays vital role in Human identification is one of the major fields of study and research in forensic science. This discovery was the basis for the development of techniques that allow characterizing each person’s individuality based on the DNA sequence. Individual identification of ancient human remains the most fundamental requisites for studies of paleo-population genetics, including kinship among ancient people, intra- and inter population structures in ancient times, and the origin of human populations. However, knowledge of these subjects has been based mainly on circumstantial archaeological evidence for kinship and intra population structure and on genetic studies of modern human populations. Tooth and several biological materials such as bone tissue, hair bulb, saliva, blood and other body tissues may be employed for isolation of DNA and accomplishment of laboratory tests for human identification. Here we describe individual identification of ancient humans by using short-nucleotide tandem repeats and mitochondrial DNA (mtDNA) extracted from a tooth as genetic markers. The application of this approach to kinship analysis shows clearly the presence or absence of kinship among the ancient remains examined.
    [Show full text]
  • Forensic Dentistry REVIEW ARTICLE
    Garg Y et al: Forensic Dentistry REVIEW ARTICLE Forensic Dentistry: An Aid in Criminal Investigation Yogesh Garg1, D.J. Bhaskar2, Chandan Agali R3, Kamal Garg4 1- Post Graduate Student, Department of Public Health Dentistry, Teerthanker Mahaveer Dental College and Research Centre, Moradabad, Uttar Pradesh, India. 2- Correspondence to: Professor, Department of Public Health Dentistry, Teerthanker Mahaveer Dental Dr. Yogesh Garg, Post Graduate Student, Department of Public Health College and Research Centre, Moradabad, Uttar Pradesh, India. 3- Reader, Dentistry, Teerthanker Mahaveer Dental College and Research Centre, Department of Public Health Dentistry, Teerthanker Mahaveer Dental College and Moradabad, Uttar Pradesh, India. Research Centre, Moradabad, Uttar Pradesh, India. 4- Reader, Department of Periodontics, Surendra Dental College, Sri Gangnagar, Rajasthan, India. ABSTRACT Forensic dentistry is an upcoming branch of dentistry that utilizes the dentist‟s knowledge to serve the legal system. Around the world, the dental practitioners qualified in forensic science are playing as a key part in the identification of human for criminal purposes or in any accidental case, etc. The dental structure in any individual apart from providing aesthetics, and functionality in a sense of speech or mastication also gives a unique identity to that individual. This uniqueness of individuality allows the Forensic odontologists to form a strong opinion of association in cases of identification and bite mark analysis. These analysis thus helps in identification of the main culprit with the help of evidence related to dental structures.The increasing number of criminal activities such as child abuse, domestic violence, rape cases gets the long-term delay in the legal systems due to unavailability of the evidences.
    [Show full text]
  • Periodontal Link in Forensic Research – an Overview
    Review Article http://doi.org/10.18231/j.idjsr.2019.021 Periodontal link in forensic research – An overview S. Gopalakrishnan 1*, Gomathi G D2, Vivekanandan U3, M Sharmila4 1Professor, 2,4Post Graduate, 3Senior Lecturer, 1,2Dept. of Periodontics, 3,4Dept. of Orthodontics, Thai Moogambigai Dental College & Hospital, Chennai, Tamil Nadu, India *Corresponding Author: S. Gopalakrishnan Email: [email protected] Abstract Forensic Dentistry is defined as a budding branch of dentistry dealing with dental evidence for human identification. Periodontal tissues are the supporting apparatus of the tooth which has many hidden genetic components that could be useful in the field of Forensic science. This article highlights the importance of periodontal tissues in various aspects of forensic research. Keywords: Forensic research, Periodontal tissues. Introduction identification in India started in around 1193 where Jai Forensic dentistry is a stream of forensic science that Chand was identified by his false teeth.6 explores dental evidences like case records, bitemarks, lip print, tooth morphology, palatal rugae pattern and Periodontal link in forensics periodontal tissues patterns for comparing the ante Periodontology is defined as the study of periodontium in mortem and postmortem records.1 An ante mortem health and disease that could be utilized for identification record contains written case sheets, past dental and of victims through anatomy and pathology. The medical histories, radiographs, photographs, study periodontal structure of
    [Show full text]