SlideShare a Scribd company logo
1 of 48
Download to read offline
F rensicM A G A Z I N E
®
technology, trends, products,and solutions for forensic professionals
Vol.9| No.3 JUNE | JULY 2012
Trace Evidence
Optimal Temperatures for
Latent Print Recovery
Evidence Photography
Touch DNA Analysis
Fingerprint Patterns
VICONA Subsidiary of Advantage Business Media, LLC.
Business Media,Inc. www.forensicmag.com
Vol.9 | No.3 JUNE I JULY 2012
35Products 44Advertiser Index 45 How it Works
departments
features
Forensic Magazine®
(ISSN 1553-6262) is published bi-monthly by Vicon Business Media, Inc. a subsidiary of
Advantage Business Media, 4 Limbo Lane, Amherst, NH 03031. USPS 023-655 Periodicals Postage Paid at
Amherst, NH 03031 and at additional mailing office. A requester publication, Forensic Magazine®
is distributed to
qualified subscribers.
Non-qualified subscription rates in the U.S. and Canada: $120 per year. All other countries: $180 per year, payable in
U.S. funds. Back issues may be purchased at a cost of $15 each in the U.S. and $20 elsewhere. While every attempt is
made to ensure the accuracy of the information contained herein, the publisher and its employees cannot accept
responsibility for the correctness of information supplied, advertisements or opinions expressed.
POSTMASTER: Send address changes to Forensic Magazine,®
P.O. Box 1273, Skokie, IL 60076.
©2012 Forensic Magazine®
by Vicon Business Media, Inc. All rights reserved. No part of this publication may be
reproduced without permission from the publisher. Permission is granted for those registered with the
Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923 (phone: 978-750-8400;
fax: 978-750-4470) to photocopy articles for a base fee of $1 per copy of the article plus $.35 per page.
Canada Agreement number: PM40063731
Return Undeliverable Canadian Addresses to: Station A,
PO Box 54, Windsor, ON N9A 6J5
E-mail: returnsil@imex.pb.com
8 POINT OF VIEW
The Case for a Professional Doctorate in Forensic Science
Michael Cole
12 THE DNA CONNECTION
DNA Activism
Chris Asplen
15 AMAZING TRACE
Douglas Page
19 OPTIMAL TEMPERATURES FOR LATENT PRINT RECOVERY
Anthony Iten
23 EVIDENCE PHOTOGRAPHY: THINKING OUTSIDE
THE BOX BUT MORE DNA TESTING
Mike Voelker
31 TOUCH DNA ANALYSIS: USING THE LITERATURE TO
HELP ANSWER SOME COMMON QUESTIONS
Suzanna R. Ryan
36 FINGERPRINT PATTERNS
Erika Di Palma and Anthony Smith
39 THE SAFETY GUYS
Winning with LOTO
Vince McLeod, CIH
41 MOST WANTED: ANSWERS TO FACILITY ISSUES
Laboratory Storage Solutions: Efficient Solutions to the
Ever Present Issue of Stuff
Susan Halla and Cy Henningsen
43 DIGITAL FORENSIC INSIDER
Windows 7 Registry Forensics: Part 5
John J. Barbara
46 WHO SAYS YOU CAN’T DO THAT?
Impression Evidence: Building Your Case with Duplicate
Evidence
Dick Warrington
4 Forensic Magazine I www.forensicmag.com JUNE I JULY 2012
IETHE
EVIDENCE
AT THE SCENE.IN THE LAB.
CONFERENCE
October1-2,2012, Washington, DC
THE
Geta handle
on the
evidence
you collect
WWW.THEEVIDENCECONFERENCE.COMPresented by
Forensic Magazine®
and DFI News ®
Bruker‘s new LUMOS is a fully automated FT-IR microscope with an integrated
FT-IR spectrometer. LUMOS is designed to combine highest quality in visible
inspection and highest performance in infrared spectral analysis. With motorization
and networking of all moveable components, the LUMOS provides an ease of use
never before seen in FT-IR microscopy.
LUMOS
FT-IR microscopy made easy
Stand-alone FT-IR microscope
with full automation
Simple easy-to-use interface
Motorized ATR crystal
Automated measurements in
transmission, reflection and ATR
Comprehensive validation
with 21 CFR part 11
FT-IR
Innovation with Integrity
Contact us for more details: www.brukeroptics.com www.lumos-ir.com
Bruker Optics Inc.
Billerica, MA · USA
Phone +1 (978) 439-9899
Fax +1 (978) 663-9177
E-Mail: info@brukeroptics.com
a 3M Company
Advanced Biometric
Identification Systems
Systems to multi-biometric
AFIS
mobile devices that bring the functionalitySystems to multi-biometric
MobileMugshot
mobile devices that bring the functionality
AFISMobile
.cogentsystems.com | CGTwww
a 3M Company
info@cogentsystems.com.cogentsystems.com | CGT
el. +1 (626) 325-9600 | FaxTTe
639 N. Rosemead Blvd., Pasadena, CA
info@cogentsystems.com
el. +1 (626) 325-9600 | Fax +1 (626) 325-9700
10791639 N. Rosemead Blvd., Pasadena, CA
3M Cogent, Inc.
Liz Vickers
Group Publisher
631-241-6161
liz.vickers@advantagemedia.com
Tim Studt
Editorial Director
973-920-7748
tim.studt@advantagemedia.com
EDITORIAL
Rebecca Waters
Editor-in-Chief
603-672-9997 x105
rwaters@forensicmag.com
Elizabeth Doughman
Editor
603-672-9997 x109
edoughman@viconpublishing.com
EDITORIAL ADVISORY BOARD
John J. Barbara Digital Forensics Consulting, LLC
Lisa M. Calandro Applied Biosystems
Peter Massey Henry C. Lee Institute of
Forensic Science University of New Haven
Kenneth C. Mohr, Jr. Crime Lab Design
Robert S. McLaren Promega Corporation
Anthony J. Tambasco Mansfield Police Laboratory
ART AND PRODUCTION
Joan Sullivan
VP, Art & Production
jsullivan@viconpublishing.com
Alice Scofield
Ad Traffic Manager
603-672-9997 x101
ascofield@forensicmag.com
ADVERTISING SALES
Eric Basta
Sales Manager
603-672-9997 x121
ebasta@forensicmag.com
Patty Grogis
Sales
603-672-9997 x114
pgrogis@forensicmag.com
REPRINTS/EPRINTS
Betsy White: 877-394-7350
bwhite@reprintoutsource.com
CUSTOMER SERVICE
forensicmag@halldata.com • 847-763-9505;
New subscriptions, renewals, changes of address,
back issues, and all customer service questions
VICON BUSINESS MEDIA, INC.
a subsidiary of Advantage Business Media
4 Limbo Lane • Amherst, NH 03031
Phone: 603-672-9997 • Fax: 603-672-3028
EXECUTIVE OFFICE
ADVANTAGE BUSINESS MEDIA
100 Enterprise Drive, Suite 600
Rockaway, NJ 07866-0912
Phone: 973-920-7000 • Fax: 973-920-7541
Rich Reiff
CEO
George Fox
President
Terry Freeburg
Chief Financial Officer
Susanne Foulds
Vice President/Human Resources
F rensicM A G A Z I N E
®
6 Forensic Magazine I www.forensicmag.com
Advanced Safety Engineering for the effective handling
of hazardous particulate drugs and powders in a Class
II, Type A2 Biosafety Cabinet.
The CellGard™
HD (Hazardous Drug) ES (Energy
Saver) Class II, Type A2 Biological Safety Cabinet
offers ISO Class 5 sterility and personnel, product, and
environmental protection for your valuable in process
work materials.
®
2100 Fernbrook Lane | Plymouth, MN 55447 | U.S.A. | 763.553.1270 | WWW.NUAIRE.COM
/nuaire @nuaire /nuaire /nuaire
Learn more online www.nuaire.com
Room Air
Contaminated
Worksurface Air
Clean HEPA Filtered Air
Clean Oval Canister
HEPA Filtered Air
Your Energy Saving Alternative
Forensic science is at a cross-
roads.TheNationalAcademy
of Sciences (NAS) Report
“Strengthening Forensic
Science in the United States;
A Path Forward” has caused
the profession in the United States to question its direction. The debate, started in 2009, has yet to be resolved. The
demise of the Forensic Science Service in the UK and the development of other providers has prompted heated debate
in the UK and elsewhere concerning whether forensic science should be publicly and/or privately funded as a service
to the criminal justice system. The growth of the European Network of Forensic Sciences in Europe highlights the dif-
ferences between those well-established laboratories and those fledgling institutions setting out on the journey in sup-
port of the legal process. What should be clear to all is that scientific excellence is the cornerstone of support for any
justice system, and that academic and training provision is required from pre-university, through degree and on to doc-
toral level and onward as continuing education.
In order that research be carried out in forensic science, it is essential that there is research degree provision for the
profession. However, for those who wish to develop within their practice, particularly up to and including doctoral level,
there is currently little or no provision. This needs to change and one instrument to implement the change is the Pro-
fessional Doctorate (D.Prof.).
Why is the D.Prof. the solution? In many systems the opportunity for curiosity-driven and practice-based tradi-
tional Ph.D. research in operational laboratories has been lost or is absent. In the UK the traditional Ph.D. offered by
universities has been criticized for not delivering a rounded graduate. It may not be possible to access or return to labo-
ratory facilities to undertake laboratory-based research in busy operational laboratories. The reasons for this are many
and include lack of time and instrumental resources and the need to maintain accreditation standards on instruments
used operationally with the consequence that they cannot be used for research purposes. Many of the criticisms levelled
at Ph.D. programs in the UK will be equally applicable in the U.S.
The solution to these difficulties may lie with the Professional Doctorate. A Professional Doctorate “is a program
of advanced study which, whilst satisfying the criteria for the award of a doctorate, is designed to meet the specific needs
of a professional group external to the university” (UKCGE, 2002: 62). It is a part-time route to a doctorate specifi-
cally designed for busy senior practitioners who have already accrued considerable professional experience during their
working lives. The focus of the professional doctorate is on the needs of the candidates, their host organization, and the
wider professional community.
However, a problem at work may not always be a research-worthy one. A doctoral research-worth problem will
need a “yes” answer to one of the following questions:
1. Will a known gap in the body of knowledge be filled?
2. Will previous research be replicated and expanded by looking at a different category of participants, environment,
and/or constructs/variables?
3. Will previous research be expanded by more thoroughly examining some identifiable aspect?
4. Are there specific, identifiable, and documented problems with the currently available solutions?
The subject of study usually relates to an area of professional practice—for example resource allocation, laboratory
design, or policy implementation rather than a detailed scientific problem. For the D.Prof. candidate, it can take con-
siderable time to develop a problem-based research focus before embarking on the research in detail. It is for this rea-
son that the doctorate at Anglia Ruskin University is divided into two parts—Stages 1 and 2. Stage 1 involves the
development of the research proposal through 7,000 word essays. The first of these is a reflective document identifying
the professional issues that will be addressed in the course of the research. The second paper addresses the “state of the
art” and comprises a comprehensive literature survey around the issue to be addressed. The final paper describes the
8 Forensic Magazine I www.forensicmag.com JUNE | JULY 2012
viewpoint of
The Case for a Professional
Doctorate in Forensic Science
Michael Cole
Establish IDENTITY
in the morgue
or in the field
The technology and performance trusted by FBI NGI for 10-print, latent, and RISC fast-ID matching and over 50% of State
and Local Law Enforcement, is at the heart every MorphoIDent Mobile ID device. The proven, reliable provider of biometric
identification solutions: MorphoTrak - Trusted by the best for over 35 years
(800) 601-6790 Visit booth 405 at IAI 2012 info@morphotrak.com www.morphotrak.com
More than just another Mobile ID device
viewresearch methodology that will be adopted and applied and
discusses how the data will be treated to arrive at appropriate
conclusions.
Candidates prepare a research proposal after they have
passed the three formal research papers in Stage 1. This delay
in the development of the research proposal is deliberate and
recognizes the characteristics of doctoral candidates. One of
the main purposes of the formal papers in Stage 1 is to give
them this time to understand the nature of doctoral level re-
search and (re)formulate their ideas. Stage 1 also gives them
the time to develop the required research skills they will need
and to develop written material which can be used as a re-
source in Stage 2.
During the second stage candidates complete their re-
searchatwork.Mid-waythroughthesecondstage,candidates
undertake the “confirmation of candidature” exactly as a tra-
ditional candidate would. This en-
ables the candidate, their team, and
theuniversitytodeterminethatprogress
is satisfactory and that the candidate
is moving toward doctoral qualifica-
tions. Once this component is satis-
fied, the candidate continues with
hisorherresearchandsubmitsathe-
sisoncetheresearchiscompleteand
written up. A viva voce examination
is then organized. The outcomes of
theexaminationarethesameasthose
ofatraditionalPh.D. vivavoceexam-
ination.
Will such degrees work for the
forensic science community? Only
time will tell. Certainly they provide
the opportunity to engage in prac-
tice-based research that will benefit
theorganizationinwhichthecandi-
date is working and the wider foren-
sic science community. The model
described is one possibility for a pro-
fessional doctorate. Another model
is the taught model, a third is mixed
delivery.However,theAngliamodel
isentirelyresearchbasedandmirrors
most closely the traditional research
degree process. What is required is
that individual laboratories and lab-
oratory systems have the courage to
engageinsuchpractice-basedresearch
aswellastraditionalresearchdegrees.
Professor Mike Cole has been
Professor of Forensic Science at Anglia
Ruskin University in Cambridge, Eng-
land, since 2001. Mike led the reshap-
ing of the B.Sc. (Hons.) program, the
developmentofanumberoftaughtMas-
tersprograms,andisnowleadingonthe
developmentofresearchdegreesinForen-
sic Science at Anglia Ruskin.
10 Forensic Magazine I www.forensicmag.com JUNE | JULY 2012
FMA0612 © Safariland
Available in standard Green or Buff color, Traxtone is a diestone dental stone material
that produces highly-detailed impressions with minimum setting time. Special pigment
flakes embedded inside the casting material indicate when the Traxtone is sufficiently
mixed. Traxtone provides superior detail reproduction and durability and has a higher
compression strength than most casting materials at 18,000 psi. Kit includes 5- 2 lb. bags
of Traxtone, measuring cup for water, small bottle of hair spray and a 12” wooden ruler.
TRAXTONE®
CASTING KIT
DETAILEDIMPRESSIONS,
EVERY TIME.
www.ForensicsSource.com • 800.347.1200
Buy a Traxtone Kit, Get a FREE Scale!
Purchase a Green Kit (#1008075) or a Buff Kit (#1008081) and get a
FREE “Bureau” Reference Scale Set (# 1005953) valued at $12.56.
Must use Promo Code 20124214 when placing order.
Offer valid June 1, 2012 thru July 31, 2012. Cannot be combined with any other offer. No substitutions.
point of
continued
www.promega.com/powerplexY23
PowerPlex®
Y23 System
12 Forensic Magazine I www.forensicmag.com JUNE I JULY 2011
Chris Asplen
AdynamicfairlyuniquetotheU.S.systemofjusticeistheexten-
sive impact that victim advocacy has on policy, legislation, and
funding. Having lived and worked abroad for more than a few
years,I’vebeenstruckbytheextenttowhichvictim’svoiceselse-
where fail to resonate with decision makers the way they do in
theUnitedStates.It’snotthatvictimadvocacyisnonexistentin
other parts of the world but the impact victims have in the U.S.
for the cause of justice can be extraordinary.
NatashaAlexankoisoneofthosevoicesfightingforjustice.
WhilethecommunityofDNAactivistsisalreadywellrepresent-
ed by tireless advocates like Debbie Smith who has battled for
years to ensure sufficient DNA funding and Jayann Sepich who
criss-crossesthecountrytopromotearresteetesting,Natashahas
madethecommitmenttodedicatehertime,effort,andherstory
specifically to the elimination of backlogged rape kits. A victim
whose rape kit sat untested for nine years, Natasha has started
Natasha’s Justice Project, dedicated to eliminating the estimated
200,000 kit backlog of rape kits through education, advocacy,
and public awareness.
Natasha’sstoryissorelevantandrepresentativeoftheinjus-
ticeofuntestedrapekitsthatitwasusedrecentlytopunctuatean
HBOfilmproducedontheworkoftheManhattanDA’sOffice’s
Sex Crime Unit. Simply titled, Sex Crimes Unit, the film docu-
ments the daily work of prosecutors and investigators navigating
theveryrealisticwatersofbringingamassivenumberofrapiststo
justice.Natasha’sstoryisthreadedthroughoutthefilm,highlight-
ing a particularly difficult aspect of sex crime investigation and
prosecution—the cold case. A stranger rape, with little evidence
other than DNA, but DNA evidence rendered useless by the
failure to have it submitted, analyzed, and entered into CODIS.
What her story highlights, and what she now brings to the
advocacy community, is the story behind the headlines or the
CODIS statistics. It is the value in all victim advocacy. It is the
meaningofsolvingacasetoavictim’ssenseofself,ofsafety,relief
ofguiltthattheycouldhave,shouldhavedonesomethingdiffer-
ently. It is the opportunity to have what Natasha called that
“transcendent”momentofclarity,andmostofallpower,fromthe
witness stand. Clarity and power that is denied as long as a case
remains unsolved.
In 1993, Natasha was a twenty-year old college student liv-
inginNewYorkCity,adreamshehadmaintainedherentirelife.
She was violently raped, sodomized, and robbed at gunpoint by
an unknown assailant while walking back to her apartment.
Natasha resisted the temptation to shower the evidence away
from her violated body and went to the hospital where hospital
staff collected evidence for her rape kit. Following her assault, all
leads were exhausted by the New York City Police Department
andherattackercouldnotbeidentified.Natasha’srapekitsaton
a shelf at the New York City Police Department property clerk’s
office for the next nine years.
To be clear, Natasha’s case was not the result of a systemic
failuretoactbypolice,prosecutors,orthelaboratory.(Ifyouread
thiscommentaryevenoccasionally,youknowIhavenoproblem
pointingoutsuchfailurewhereIthinkitexists!)Thesewerestill
the early days of DNA databasing. The New York City Medical
Examiner’s Office was not even a part of CODIS yet. Not sub-
mittingarapekitforDNAanalysiswasanunderstandable,albeit
frustrating, decision for police at that time. If no suspect existed,
fundsspentonDNAanalysiscouldfairlybeconsideredwastedif
no suspect was ever developed through other, more traditional
evidence. But again, this was pre-CODIS.
Then, in 2003, Mayor Michael R. Bloomberg announced
the “John Doe Indictment Project,” a coordinated city-wide ini-
tiative designed to prevent rapists from using the statute of
limitationstoescapeprosecution.Of17,000untestedrapekits,it
was estimated that an excess of 600 cases related to those kits
were soon to expire, including Natasha’s case. As a result, nearly
a decade after her attack, Natasha received a call from the New
York City District Attorney’s Office as prosecutors looked to use
the DNA from her rape kit to create a “John Doe” indictment.
That same year, summoning more than just a little courage, she
testified before a grand jury and the DNA profile from her rape
kitwasindicted,allowingprosecutorstobringchargesagainsther
attacker whenever captured.
In 2007, the New York City Police Department found
Natasha’s attacker through a match to his DNA profile in
CODIS.VictorRondonhadbeenarrestedinLasVegas,Nevada,
onaminorcharge.WhenextraditedtoNewYork,hisDNApro-
file was entered into CODIS pursuant to a parole violation.
Rondon’s profile matched the DNA profile developed from
Natasha’s rape kit. A year later, Rondon was tried before a jury
and found guilty of eight counts of violent assault, including bur-
glary in the first degree, robbery in the first degree, two counts of
rape in the first degree, sodomy in the first degree, and sexual
abuse in the first degree. Rondon was sentenced to 44 to 107
years in prison.
DNA Activism
dnaconnection
the
That’s not to say her trial was anything less than traumatic.
The first question on cross-examination was, “Were you a virgin?”
Seriously. In today’s world, with a Rape Shield law firmly in place
inNewYork,thatwasthefirstquestionoutofthedefenseattorney’s
mouth. (A woman described by the prosecutor as an experienced
defenseattorneywithaclearknowledgeoftheobjectionablenature
of the question.) The cross-examination didn’t get better from
there.Thedefenseprofferedbythedefendantwasbasedonthethe-
ory that, since Natasha didn’t scream while
shewasshovedupthestairsofherapartment
building into the bike storage area, thrust
over a railing, and repeatedly raped and
sodomized WITH A GUN TO HER
HEAD, well then clearly she must have
enjoyed the experience and that constituted
evidence of consent.
Getting back to the film. There was
another poignant observation to be made
about the film. As Natasha’s story unfolds
and it becomes clear that it was nine and a
half years that her rape kit sat untested, the
director uses flashes of newspaper articles
withheadlinesaboutsexcrimesandrapekits
and backlogs. But while the headline was
clearly visible, you could also see a bit of the
text from the article. And in those flashes of
textyoucouldseeanamerecurringtimeand
time again—Debbie Smith. Debbie Smith
for whom the Debbie Smith Act is named
and who is responsible for literally hundreds
of thousands of dollars allocated to various
aspects of DNA testing. Coming full circle,
the film reminds us, although I think unin-
tentionally, that it was victim advocacy that
first forced decision makers to pay attention
to the issue of backlogged rape kits and the
tragedy of solvable yet unsolved cases. It was
Debbie’s victim advocacy that drove the
decision makers to test Natasha’s kit in the
first place.
Natasha was raped when there were
legitimate reasons that made the decision
not to test a rape kit rational. Lack of a fully
implemented CODIS system made those
decisions understandable. In 2012 however,
there are no understandable or rational rea-
sons why 200,000 kits remain untested.
There is no cost benefit analysis that comes
outonthesideofrefusingtosubmitacaseto
the laboratory. Fortunately, there is now yet
another loud and convincing voice willing
toshareherstoryandtestifytotheunaccept-
able fact of backlogged rape kits.
Thank you, Natasha.
Chris Asplen is President of Asplen and Associates, LLC. He
consults with local, state, federal, and international governments on the
use of forensic DNA technology. He can be reached at
ChrisAsplen@Gmail.com.
continueddnaconnection
the
Enhances the detection, inspection
and photography of:
Blood and other bodily fluids
Biological stains and latent fingerprints
Bruises, bite marks, pattern wounds,
hair and fibers
Grease, oil and other petroleum-based
stains
Questionable documents
Also available: OFK-300 Field Kit.
Features flashlight body; UV, blue and
white light LED lamp heads; UV-absorbing
and orange-contrasting spectacles;
detachable diffusing filter, AC and DC
chargers, and padded carrying case.
To learn more,
scan QR Code,
call 1-800-274-8888
or visit www.spectroline.comISO 9001:2008 CERTIFIED COMPANY
(Patent Pending)
OPTIMAX™
Multi-Lite™
LED Forensic Inspection Kit
The OFK-8000 Multi-Lite™ Kit
features a cordless, rugged LED flashlight
body and eight interchangeable, Qwik-Connect™
heads that provide illumination in UV-A,
violet, blue, cyan, green, amber, red
and white light. It’s ideal for crime scene
investigation, gathering potential evidence
and laboratory work!
So Good,
It’s Simply Criminal!
Fibers
Fingerprints
Bodily fluids
OFK-8000 Kit also includes:
Yellow, orange and red-contrasting filters;
UV-absorbing, yellow, orange and red-
contrasting spectacles;
detachable diffusing
filter, AC and DC battery
chargers, and padded
carrying case.
JUNE I JULY 2012 Forensic Magazine I www.forensicmag.com 13
The e-Core™ punch is the only handheld electronic coring and dispensing instrument validated for the forensic
market*. Its razor-sharp tip cleanly and precisely punches discs from Whatman™ FTA™ cards. e-Core instrument’s
ergonomic design enables you to punch hundreds of samples per day without discomfort.
To sign up for a test punch visit www.gelifesciences.com/forecore
GE Healthcare
Life Sciences
*Based on Intellectual Property and developmental validation search.
GE, imagination at work and GE monogram are trademarks of General Electric Company.
FTA, e-Core and Whatman are trademarks of GE Healthcare companies.
© 2012 General Electric Company – All rights reserved.
GE Healthcare Bio-Sciences Corp., 800 Centennial Ave., Piscataway, NJ 08855, USA
04/2012
Punch, retrieve, dispense,
all in less than 1.5 seconds.
Blink and you’ll miss it.
Suppose, just after the Fourth of July fireworks begin on the Charles River, a team of terrorists located 100 meters apart
along Boston’s Esplanade simultaneously empty several canisters of the odorless nerve agent sarin on the ground
amongst the holiday crowd. The liquid agent quickly evaporates into a deadly, invisible vapor, spreading through the
crowd. Within seconds symptoms appear in the hundreds of people exposed—blurred vision, drooling, sweating,
coughing, chest tightness, breathing difficulty, nausea, and diarrhea. Those exposed to more concentrated amounts
experience loss of consciousness, convulsions, paralysis, and respiratory failure.
In the growing confusion and panic, the terrorists slip away into the night, undetected. Apprehension, prosecu-
tion, and imprisonment are not likely. No one noticed them. Everyone was watching the fireworks. Police have no
leads.
Or do they? The developing field of chemical forensics may offer clues.
Government scientists, led by chemist Carlos Fraga at the Pacific Northwest National Laboratory, are reporting the
development of a unique chemical forensic tracking technology that could help law enforcement trace the residues from
terror attacks involving nerve gas and other chemical agents back to the companies or other sources where the perpetra-
tors obtained ingredients for the agent.
Nerve substances, such as sarin, are among the most toxic and fast-acting chemical warfare agents in existence.
Sarin is lethal in amounts as small as 36 ppm. A single drop of sarin the size of a pinhead can kill an adult, as the
Japanese learned in 1995 when the Aum Shinrikyo religious sect released sarin in the Tokyo subway, killing 13 and
injuring over 5,500.
Although traces of nerve agents remain after such attacks, prior to Fraga’s work there has been no practical way of
tracing the agent back to its source ingredients. Fraga’s team found a way to do that using a technique called “impurity
profiling”—a way of identifying impurities in chemicals or illegal drugs that allows the chemical to be matched to the
impurities in the precursor chemicals, pinpointing the likely source. Impurity profiling has been used for several years to
track seized drugs, helping law enforcement determine dealer-user relationships, drug sources, distribution networks,
and smuggling routes by connecting seized drugs to precursors.
Impurity profiling also has the potential to trace counterfeit pharmaceuticals and herbal medicines, banned pesti-
cides, and homemade explosives.
Fraga adopted the technique to track nerve agents like sarin because of the high threat of a terrorist chemical
attack. The researchers found that up to 88% of the impurities in source chemicals used to make sarin appear also in
the finished product, and that these impurities are unique, much like fingerprints.
“This means potentially tracing a chemical threat agent like sarin to the specific lot number and commercial man-
ufacturer that produced the precursor used to make the sarin collected from a crime scene,” Fraga said. Once the manu-
facturer of the precursor is known, then purchasing and shipping records may point to the buyer.
Fraga said that to his knowledge, this is the first time impurities have been demonstrated for matching a synthetic
chemical product to its specific precursor source.
This new piece of evidence obtained through impurity profiling could provide useful leads that complement those
obtained by traditional pieces of crime-scene evidence, like latent fingerprints, trace DNA, and camera footage.
Kevin Lothridge, CEO, National Forensic Science Technology Center, said Fraga’s technique is the same concept
as the Drug Enforcement Administration’s cocaine, heroin, and methamphetamine signature programs. “This type of
JUNE I JULY 2012 Forensic Magazine I www.forensicmag.com 15
Douglas Page
Amazing TraceNew chemical forensics test could help track down terrorists responsible
for nerve gas attacks.
forensic intelligence can be useful in a range of
investigations, from drug cases to terrorism,”
Lothridge said. “It adds another technique to the
analytical toolbox to help investigators advance
the intelligence they are able to gather.”
Nothing Special
The PNNL method requires no special equipment,
other than standard laboratory gas chromatogra-
phy/mass spectrometry instruments.
“What is most remarkable is that the chem-
ical impurity profiles can be recovered mostly
intact from sarin samples even after multiple
processing procedures, such as distillation and
two solvent extraction steps,” Fraga said.
Fraga said this development is important
for a couple of reasons. First, he said he hopes
that this and similar work will deter future
chemical attacks by letting terrorists know
there are now ways to track them.
“Second, by developing a forensic capability,
we have a greater chance of finding perpetrators of
chemical attacks or their sources of materials before
they can strike again,” he said. “And third, our work
can potentially be applied to other threats, such as
illicit drugs and homemade explosives.”
Lawrence Kobilinsky, chair of the Department of
Sciences at John Jay College of Criminal Justice, believes
Fraga may be on to something valuable in the fight against
terrorism.
“This work promises to provide a new approach to
fighting chemical terrorists and chemistry-oriented crimi-
nals,” Kobilinsky said.
While sarin attacks have not yet occurred in the
U.S., they could at any time. Kobilinsky said terrorists
would not think twice about using biological, chemi-
cal, or radiological weapons to cause mass destruc-
tion of populations in Western nations. “The
anthrax attacks were a wake-up call for law enforce-
ment and homeland security,” he said.
In the event of a nerve agent attack,
Kobilinsky said authorities must neutralize the
effects of such attacks and ultimately trace the
source of the weapon. Sometimes, different groups
claim credit for a terrorist attack when it is clear
that only one group was responsible. “This tech-
nique can help assign blame on those who are truly
responsible for a chemical attack,” Kobilinsky said.
Origin of Impurities
Rashid Chotani, MD, director, Chemical and Biological
Defense Programs at TASC (Chantilly, VA), said in order
to validate impurity profiling in the context of chemical
warfare, the researchers may need to explore the origins of
the impurities to increase the confidence of their results.
“Given the number of sources for agents and precur-
sors—in the U.S. alone about 100 facilities deal with chem-
icals that are ‘scheduled’ under the Chemical Weapons
Convention—this new technique would work best when
traditional forms of investigation have narrowed the sample
size to a few possible locations,” he said.
Chotani said this technique could potentially enable
investigators to link the agent back to a specific laboratory,
assuming that sufficient precursor materials remain in the
laboratory to identify any impurities.
Fraga concedes his work is in the preliminary, proof-of-
concept stage of development, that there is a great deal of
work required to determine what can and cannot be done
with impurity profiling. He said one of the first tasks is to try
to understand the sources and causes of variability for the
impurity profiles obtained from chemical agents and their
precursors, a step necessary to quantitatively determine if
the impurity profiles from different samples match and what
the error rates are if the profiles match.
In the near term, Fraga proposes to combine the impu-
rity profiles obtained for sarin and precursors with other
impurity profiles and chemical characteristics that are not
being captured by current analytical approaches.
“We anticipate that these new measurements will
independently make the same connection we made
between sarin and its specific precursor stocks, thereby
increasing the level of confidence in a match,” he said.
Fraga does not wish to over-sell his technique nor see
its value reduced, like that of compositional analysis of bul-
let lead (CABL). CABL is similar to impurity profiling in
that the chemical components present in bullet lead can
provide forensic information.
However, according to a 2004 report (Weighing Bullet
Lead Evidence, The National Academies Press) CABL has
been over-sold in court and therefore its usefulness and
credibility has diminished, Fraga said. “We are therefore try-
ing hard to understand the limitations of impurity profiling
to avoid over-selling it.”
Douglas Page writes about forensic science and medi-
cine from Pine Mountain, California. He can be reached at
douglaspage@earthlink.net.
16 Forensic Magazine I www.forensicmag.com JUNE I JULY 2012
iS50 NIR Module
Develop QC methods for bulk samples
iS50 ATR Module
Leaves main sample compartment
free for other analyses
iS50 Raman Module
Mapping and well-plate screening in
sample compartment mounted module
Never before has a research grade FT-IR provided more information, in less
time and more easily. The revolutionary design of the Thermo Scientific
Nicolet iS50 FT-IR Spectrometer allows any user to move from one
experiment to another with the push of a single button—integrating ATR,
Raman and NIR. Hyphenated techniques are part of its versatility. TGA-IR
and GC-IR functionality are coupled with powerful automated data analysis
tools to extract information quickly and consistently, eliminating literally hours
of data analysis. Smarter spectroscopy, exemplified.
• discover easy versatility • thermoscientific.com/iS50
smarter FT-IR
easily do more
©2012ThermoFisherScientificInc.Allrightsreserved.
Fingerprints are considered one of the most reliable ways to identify individuals associated with criminal cases.
However, sometimes they cannot be recovered due to various environmental factors. One of these factors is tem-
perature, specifically high temperatures. At high temperatures the water left by fingerprints evaporates and the
amino acids denature. In this experiment, the optimal temperature ranges for a sheet of computer paper and plastic
bottle was found to be from -20°C to 185°C for a 15 minute exposure to heat and from -20°C to 150°C for an hour
exposure to heat.
Background
Fingerprints are widely accepted as being a unique characteristic of a person. Kaushal states, “No two people, not
even identical twins, have ever been shown to have exactly the same pattern of raised, curved lines on their finger-
tips.”1 These patterns on the fingertips, called minutiae, are special to each individual person. When a person
touches a surface, a chemical mixture of their fingerprint is left behind called an impression, which refers to the fric-
tion ridge detail deposited on the surface. If this action is unintentional, it is called a latent print. In most cases, fin-
gerprint examiners deal with latent prints. The mixture that makes up these impressions include water, amino acids,
cholesterols, fatty acids, small-molecule oils, DNA, and ionic salts.2 Forensic scientists use numerous techniques to
react with these chemicals and make the latent print visible to the naked eye.
Several factors can alter or disrupt these chemicals and therefore make the latent print unidentifiable to an examiner. The
temperature of the surface on which a latent print is left is one such factor.3 A higher temperature would cause the water to evapo-
rate and cause the amino acids to denature. This can make the latent print hard to visualize and extremely difficult to identify. A
study done by William and Karen Sampson4 suggests that the optimal temperature ranges for identifications are from 68°F to 95°F
(20°C to 35°C). The study suggested that if a latent print was exposed to heat or dryness for hours to days, it would be hard to
retrieve the print.
The purpose of the present study is to deter-
mine the optimal temperatures in which a latent
print can be recovered from a piece of computer
paper and a plastic bottle. Paper and plastic were
chosen because they are commonly handled by
individuals on a daily basis. Also paper and plastic
are commonly found at crime scenes. Once the
range is determined, the time period in which the
latent print endures those temperatures will be
extended to see if the range shortens.
Materials and Methods
The experiment was conducted using two of the
Hamline University Chemistry Department’s
ovens, Furnatrol I Type 18200 Automatic
Controller Model FA1730 and Fisher Scientific
Isotemp Oven Model 630F. The temperature was
set to 33°C on the oven and then allowed to pre-
heat. Once the temperature was reached, latent
prints were placed all over the sheet of computer
JUNE I JULY 2012 Forensic Magazine I www.forensicmag.com 19
Anthony Iten
OptimalTemperaturesfor
LatentPrintRecoveryA study on the effects of time and temperature on the recovery of
latent prints from computer paper and plastic bottles.
Figure 1: Dusting results of paper and plastic bottle at 90°C for
15 minutes (positive). View a slideshow of the full results above
or at www.forensicmag.com/article/optimal-temperatures-
latent-print-recovery.
paper and the top of the plastic bottle. To ensure a good print, the fin-
gertips were rubbed along the forehead and sides of the nose. This
allowed the fingertips to collect more water, amino acids, and oils. Once
the latent prints were placed on the computer paper and plastic bottle,
the computer paper and plastic bottle were placed inside the oven for
approximately 15 minutes. After that, they were transferred to a large
plastic container and sealed inside. This helped keep the computer
paper and plastic bottle at the same temperature as the oven. The con-
tainer was then transferred to another building where the super glue
fuming chamber was located, as shown in Figure 2.
Four drops of liquid super glue were placed on the aluminum foil
cup, which was then placed on top of a heating pad inside the chamber.
A hot cup of water was also in the back corner of the chamber. The
piece of computer paper was then clipped to the top of the chamber and
the plastic bottle was placed in the other back corner. Next the heating
pad and light were turned on and the chamber was closed. The paper
and plastic bottle were exposed to super glue fumes for 15 minutes.5
After that the chamber was opened and the heating pad was turned off
to allow the fumes to evaporate. This causes the chemicals left behind by
the latent print to condense and become hard. It allows the latent print
to be dusted without smudging the print. Then the piece of computer
paper and plastic bottle were dusted using Black Magna Fingerprint
Powder to reveal an impression if there was any. A picture was then
taken of the result of the dusting. The same test was performed at the
temperatures of -20°C (obtained by using a freezer), 20°C, 40°C, 60°C,
90°C, 110°C, 160°C, 185°C, and 220°C. Then the temperatures of -
20°C, 120°C, 150°C, and 170°C were tested again, but left inside the
oven for one hour.
Results
Pictures were taken after each dusting was completed on the sheets of
computer paper and plastic bottles. The temperatures for the 15 minutes
intheovenareshowninFigure1(printswithvisibleminutiaearelabeled
positive and non-visible prints are negative).
The temperatures for the one hour in the oven are shown in
Figure 3 (prints with visible minutiae are labeled positive and non-visi-
ble prints are negative).
Althoughthepicturesmaynotshowitattimes,theoptimaltem-
peraturerangefor15minutesintheovenwas-20°Cto185°C.
Temperatureshigherthan185°Cturnedthecomputerpaperbrittleand
brownmakingitimpossibletorecoverimpressionsbydustingthem.It
wasalsoimpossibletorecoverimpressionsfromtheplasticbottleatthose
hightemperaturesbecausethebottlemeltedcompletely,whichwassur-
prisingbecauseittookonlyashorttimeforthemtomeltcompletely.
Furtherresearchaboutthetemperature at which plastic melts would have
helped determine when the plastic bottle would have melted. When
testing the latent prints for an hour inside the oven, the -20°C test
showed that impressions could still be recovered. However, when the
latent prints were tested at 170°C, the computer paper became brittle
again and the plastic bottle was partially melted. There were some minu-
tiae on the plastic bottle but most of the impression was blurred together.
The computer paper impression was blurred completely. When the com-
puter paper and plastic bottle sat inside the oven for an hour at 150°C,
the super glue fuming and dusting process was able to reveal impressions
on both.
Discussion
This research had many possible sources of error. To begin with,
the oven would sometimes change temperature throughout the
time the computer paper and plastic bottle were inside. It seemed
that once the items were placed inside the oven, the temperature
increased periodically. For some of the tests, the temperature
would increase only a few degrees but in other tests it increased as
much as 15 degrees. This increase in temperature may be due to the
make and model of the oven. More tests could be conducted to
solve this problem by using a better, stable oven. The increase in
temperature could have affected the true temperature at which
the items were tested and therefore affected the optimal temper-
ature range. Another source of error was the time the computer
paper and plastic bottle were super glued. It is possible that the
items were not super glued long enough, making the impressions
more prone to be smudged when dusting. This again would pro-
vide negative feedback on the optimal temperature range. The
amount of time items are super glued depends on the number of
items present in the chamber.6 With many items, super glue
fuming can take up to 45 minutes.
This research can be applied when dealing with crime scenes
that have been exposed to extreme temperatures. When examiners
know the crime scene exceed a certain extreme temperature, then
they know that an impression cannot be recovered from an object.
However this research only pertains to computer paper and plastic
bottles. To make this study more applicable, other surfaces must be
considered and tested. For example, different kinds of paper and
plastic, metals, rubber, wood, and glass would be suitable items to
test. Another area worth exploring is if it is possible to recover
impressions from fired bullets and casings along with explosives.
ATF conducted a study on Molotov cocktails and were able to
20 Forensic Magazine I www.forensicmag.com JUNE I JULY 2012
Figure 2: Super glue chamber in Drew
Science Center Room 205.
JUNE I JULY 2012 www.forensicmag.com I Forensic Magazine 21
recover some impressions on the glass fragments.6 A future
direction in this area would be to study plastic explosives.
Conclusions
Forsomesurfaces,therearetemperaturesbeyondwhichlatentprints
canberecoveredthusmakingitimpossibletogetanimpression.The
longerthelatentprintisexposedtoheat,themaximumtemperature
tovisualizethatimpressiondecreases.Thesemaximumtemperatures
may vary depending on the surface they are tested on, but were the
sameinthisstudy.At15minutesofexposuretoheat,computerpaper
and a plastic bottle had a maximum temperature of 185°C. For an
hour of exposure to heat, paper and plastic had a maximum temper-
atureof150°C.Thereforeitisreasonabletoconcludethatasthedura-
tion of time spent at temperature increases, the shorter the tempera-
ture range is to obtain an identifiable latent print. Further research
would be needed to solidify the exact temperature ranges.
References can be found online at www.forensicmag.com/
article/optimal-temperatures-latent-print-recovery.
Anthony Iten is recent graduate of Hamline University
with a B.A. in Chemistry and a Forensic Science Certificate. 624
Community Dr., Morgantown, WV, 26505; (612-790-0974);
aiten01@hamlineuniversity.edu.
Figure 3: Dusting results of paper and plastic bottle at 120°C for
one hour (positive). View a slideshow of the full results above or
at www.forensicmag.com/article/optimal-temperatures-
latent-print-recovery.
Contact your Streck Representative to request an in-lab evaluation.
Traditional definitions of “evidence” include the
ideas, “to make evident, something that makes
plain or clear, data presented in court in proof of
the facts.” (Dictionary.com) If a picture is “worth
a thousand words,” and if the definitions above
are some of the ways that we define the term
“evidence,” then I would like to suggest some
perhaps new ways that we can use this vital
unappreciated tool.
The idea that the only time that one takes
pictures is when there is a need to document a
broken window, skid marks, vehicle damage,
wounds, or injuries needs to be revisited, especial-
ly at the “patrol level.” Photography or digital
imaging can certainly be an effective tool to doc-
ument “evidence” that can save you time and
effort down the road.
Traffic Enforcement
Those of you who stop vehicles for equipment and safety violations probably spend a great deal of time writing out a three
paragraph description of the violations that initially caused you to stop the vehicle, and the subsequent violations that you
discovered (Figure 1). If, down the road you need to defend your stop and the reasons you took an enforcement action
doesn’t it make sense to have a photo or at least three to back up your observations and narrative report.
Instead of trying to create a word picture on the witness stand to help the judge or jury to “see” what you saw, why
not let them do just that—see what you saw; because after all, seeing is believing right? Having photographs to supple-
ment testimony regardless of the case is like conveying the message to the judge or jury that “you don’t need my testimo-
ny, have a look for yourselves.” And if you stop and think about it, the
proverbial “picture is worth a thousand words,” is also worth at least 45
minutes of direct, cross examination, and re-direct testimony in court
when you could be enjoying your day off.
If the tires were “as bald as a baby’s behind” then you would most cer-
tainly benefit from having a photo to back up that contention (Figure 2).
Isn’t this a better way to work? Can you see where a few images can save
you from even going to court at all, much less invariably in the middle of
your days off?
Eyewitness Perspective Documentation
We have all had cases where that one witness seems to make the case. So
suppose for a minute that our case is one where a witness saw a suspicious
person behind a business who appears to be ready to rob the business. The
JUNE I JULY 2012 Forensic Magazine I www.forensicmag.com 23
Mike Voelker
Evidence Photography:
Thinking Outside the Box
Photography illustrating your case report can strengthen your case and
corroborate your narrative.
Figure 1: A photo can illustrate vehicle safety violations.
Figure 2: Show don’t tell.
IECONFERENCE
THE
EVIDENCE
AT THE SCENE.
IN THE LAB.
Get aHandle
WWW.THEEVIDENCECONFERENCE.COM
Early Bird Discount
Sign-Up Today - Save $100
Presented by Forensic Magazine® and DFI News®
October 1-2, 2012
Washington, DC
DIGITAL and
MOBILE DEVICE
EVIDENCE
you collect
onthe
TRACKS ON CRIME SCENE,
FORENSIC LABS, AND
DIGITAL AND MOBILE
DEVICE FORENSICS.
WWW.THE EVIDENCECONFERENCE.COM
Platinum Sponsor: Silver Sponsor:
caller reports that the person appears to have a shiny object that
looks like a firearm of some sort. Suppose that officers who are sent
to investigate the subject end up shooting the subject who was
“armed” with something other than a weapon.
Having initial responding officers document where and how the
witness saw what they reported is obviously vital to any case. Instead
of simply having the witness testify that they were looking out their
window through the slats in their window blinds, again take the jury
to the scene (Figure 3). Supplement the witness’s testimony with an
image for the jury to take to the deliberation room.
Just to make sure that we are being as thorough as possible
when we are locating where the suspect was at certain times in the
event, suppose we use a traffic cone from our squad car or partner
officer positioned by the witness from their perspective to further
solidify and document that they had the ability to make their obser-
vations. Taking the picture to show where the witness was making
observations can also aid their recall at the time of trial some years
down the road.
Now let’s think about what effect the photos will have if we
take it a step further and allow the witness to use our patrol point-
and-shoot camera to take a picture framing it with the perspective
that they saw. As noted speaker and forensic innovator Dick
Warrington says, “Who says you can’t do that?” While this is certain-
ly unconventional, I think your prosecutor has an even firmer foun-
dation to introduce the images of the witnesses view to show that
they had the perspective to see what they are testifying to.
Use of Force Documentation
At times people will make frivolous claims of excessive force and
injuries resulting from arrests and uses of force in an attempt to solve
their financial problems. Have you thought about how photography
can back up your narrative report and how little appreciated and
understood aspects of digital photography can save you, your co-
workers, and your department time, effort, and perhaps money?
Let’s use an example of a use of force event where you or your
co-worker’s suspect ends up with injuries that need to be treated at a
hospital or otherwise have the person medically cleared before taking
them to jail. I think most of us would think to take pictures of the
wounds, but let’s look past the obvious and document the snugness of
the handcuffs to cover that base as well. If the suspect is going to con-
tend in a civil suit that you or your co-worker were vicious and out of
control, would an officer who is busy snapping a series of pictures seem
out of control to a jury?
Now let’s factor in the often overlooked aspect of the date and
time stamp which is part of the digital image file metadata. If your
camera has been adjusted to the correct date and time prior to taking
the images, then your images can essentially take the jury to the scene.
On this date and time this image was created and was saved to the SD
card in this camera.
Absent in-squad video to back up your report that the suspect was
spitting what they claim was contaminated blood at you while being
transported; use a few photographs to document that the suspect had
indeed done just that (Figure 4). Correctional staff documentation of
claimed wounds or injuries on intake to the facility can help refute friv-
olous claims. The photographs document what the subject and their
injuries looked like on this date and at this time.
A good personal, if not departmental practice would be to take a
series of pictures the minute the suspect makes a comment about the
handcuffs being too tight. After arrest and booking into the jail at least
a second set should be taken.
Evidence Packaging
If there were questions about how you packaged your evidence, you
can certainly answer nearly all questions without having to check the
evidence out of property, remove the items for photography, and
then add another seal when you re-package the evidence—if you
took images of how you packaged and sealed your evidence. While
this certainly adds a bit more time at the forefront of the investiga-
tion, I would argue that this will save you time and effort later on as
you won’t need to explain the multiple layers of evidence seals on a
particular package on the stand.
Here again I feel that your friend and mine, the date and time
stamp on digital images, can bolster our position that we are not
26 Forensic Magazine I www.forensicmag.com JUNE I JULY 2012
Figure 3: Photographing the eyewitness’ perpective takes
the jury to the scene.
Figure 4: Images can help combat frivolous use of force
claims.
making it up. With a series of images you can lay out in order, on this
date and time here is the seal that I put on the package, then on this
date and time this seal was put on, followed by this one. I don’t mean
to belabor the point, but as our society becomes more visually orient-
ed, I think we do our cases a disservice if our only testimony to the
truth of the matter is “well, I’m telling you it was this and I am sworn
to tell the truth.”
Drug Evidence
Photographs could probably save you from testifying in court by tak-
ing a few pictures of the material at the time of discovery, the subse-
quent field test results, and the packaging of evidence.
With a few pictures and some basic subject and case informa-
tion a prosecutor could literally dictate a criminal complaint just
from your images. For example in these next two images you visually
depict what the subject was possessing, the officer notes the total
amount of currency by (Figure 5) writing it next to each denomina-
tion stack. Next the officer has tallied up the total currency amount,
and then written the weight of each of the individual baggies by each
baggie, followed by the weight of the larger container baggie (Figure
6) to provide even more detailed documentation. In most jurisdic-
tions juries are not allowed to review police reports during delibera-
tion, but they certainly could be allowed to have your evidentiary
photographs to review.
Taking our “evidence photography” thought process to
another level, how about documenting the weight of our contra-
band with a photograph in a new way. Again the side benefit to
digital photography is that bleary eyed investigators can readily
determine when during that 36–48 hour work day they were pack-
aging that particular evidence by reviewing the date and time
information which is part of the digital image data (Figure 7).
After presenting this at my department I heard that an offi-
cer took this to the next level by taking a picture of the scale face
before weighing the material. The image showed a .00 gram
weight followed by a picture of the evidence and the weight of
that evidence. While this seems a bit odd, it can help refute any
defense contention that the scale
was not working properly and was
not zeroed out before you weighed
the item. The date and time infor-
mation, along with the image
number, will back up when the
image was taken.
The images don’t have to be
the greatest thing since sliced
bread, they just need to back up
your observations and narrative
report.
Vehicle Searches
Juries know from media sources that
we tend to find a treasure trove of
contraband in the center console of
vehicles. Squad video footage can
back up the fact that we were in the car empty handed then pulled
out something and placed it in an evidence bag. But now with our
new or renewed method of taking the jury to the scene let’s take a
few pictures before, during, and then after the vehicle search (Figure
8). Having a picture of what we found, how we found it, with the
correct date and time stamp as to when we found it—followed by
post search photos showing that the K-9 did not claw up the interior
of the car during the search—I think closes the door on a great num-
ber of issues that arise and confront us regularly. At the next level, if
your camera supports and captures geopositioning data you can now
“show” the jury nearly exactly where that traffic stop took place or
where the images were taken. Officers who work in rural areas can
certainly see the tremendous benefit to this.
JUNE I JULY 2012 Forensic Magazine I www.forensicmag.com 27
Figure 5: The officer notes the total amount of currency
confiscated.
Figure 6: Documenting the weight of each individual baggie.
Figure 7: Give the jury a
failsafe visual: showing just
how much the drugs
weighed.
Figure 8: Take a few pictures before, during, and after a
vehicle search.
28 Forensic Magazine I www.forensicmag.com JUNE I JULY 2012
Electronic Evidence Documentation
Amongst the problems confounding our best efforts to gather this
data is the cost of the extraction devices, and sometimes the distance
between the extraction device and the subject device.
Whether it is the temporary threat posted on Facebook, the
threat, or the no-contact violation sent via a text message, low cost
point-and-shoot style digital photography can be an effective tool for
officers or investigators in the field to capture and document evi-
dence. A background of a brown paper evidence bag, coupled with
the business card with the case number and investigator’s name in at
least one of the images will demonstrate a level of professionalism.
First Responder Photography
Finally it probably goes without saying that it is extremely vital for
initial responding officers to take at least a few photographs of scenes
before they get contaminated by personnel conducting a walk-
through. The few minutes of time to take a set of overall and mid
range views of a scene can not only provide images to brief respond-
ing investigators, they can steer an investiga-
tion on a logical course from the start.
I know of a department where a number
of years ago a full complement of personnel
were called in to investigate a body found in
the basement storage area of an apartment
building. The limited information available was
that the area by the body was extremely bloody.
Once the documentation of the scene
leading to the body was complete, a more thor-
ough exam of the specific scene clearly showed
that instead of a homicide the department was
dealing with a very determined and indeed very
bloody self-mutilation suicide event. The inves-
tigation showed that the subject clearly lost
consciousness after cutting himself, laid down
several times, and then would get up again and
run around the same area in a circle trying to
pump his blood.
Clearly, a few scene photographs to brief
the investigative team could have focused the
investigation from the onset and likely could
have saved time, pages of reports, and the cost
of personnel for that department.
It is my hope that you can see the benefits
of having still images to supplement your work
and reports, and I have no doubt that in addi-
tion to what I have suggested here, you have
already thought of additional ways a series of
pictures could have improved an investigation.
Take a few minutes and share that information
with your co-workers and contacts.
Mike Voelker is a Detective with the Eau
Claire, Wisconsin, Police Department. Det.
Voelker has over 23 years of law enforcement expe-
rience. Eau Claire Police Department, 740 Second
Avenue, P.O. Box 496, Eau Claire, WI 54702-
0496; (715) 839-6165;
mvoelker@eauclairewi.gov;
www.eauclairewi.gov/police-home.
Visit www.labconco.com or call
1-800-732-0031 for more information.
Freedom for the good guys—conviction for the bad guys.
The Protector® Downdraft Powder Station keeps users
safe by containing powders during fingerprinting processing.
www.labconco.com
Protector® Downdraft
Powder Station
With modern technology, the simple act of picking up an object or touching a surface can lead to the identification and apprehen-
sion of a criminal. In the past few years, not only have the number of touch DNA evidence items being submitted to the lab for
analysis skyrocketed, but the number of journal articles regarding touch DNA and DNA transfer (both primary and secondary) has
also increased greatly. This article is intended to update the reader on the latest touch and transfer DNA research and attempts to
answer some of the most common questions that are asked regarding the topic.
What is “touch” DNA?
First, a review of what touch DNA is and how it arrives on an object. Touch DNA is simply DNA that is transferred via skin cells
when an object is handled or touched. The average human sheds roughly 400,000 skin cells per day;1 however, since it is known that
the top-most layers of skin are basically “dead”, being keratinized and having lost their nuclei,2 where does the touch DNA come
from? Kita, et al,2 performed experiments which showed that small amounts of fragmented DNA are present on the surface of the
skin and they theorized that these fragments of DNA may be constantly sloughed off the keratinized cornified layer of skin and that
sweat may also contain fragmented DNA. Later research verified that the presence of sweat helps to contribute to the DNA profile
obtained from touch DNA samples.3 This research also showed that cell free nucleic acids, or CNAs, (basically free-floating DNA
fragments not encapsulated in the cell nucleus) contribute greatly to the total amount of DNA present in a sample with CNAs being
detected in the sweat of 80% of healthy individuals tested. It was also found that, along with CNAs, nucleated cells were present in
sweat samples taken from volunteers. Interestingly, most DNA extraction methods do not utilize the portion of the sample where
CNAs are found—the aqueous portion of the extract—and after centrifugation to collect the cellular material, the supernatant (con-
taining the CNAs) is generally discarded.3
How much DNA is left behind when an object is touched?
One of the most common questions asked regarding touch DNA is, “how much DNA is expected to be transferred” given a certain
set of circumstances. Unfortunately, this is a difficult question to answer as there are so many variables involved. However, we can use
the information from various studies to provide an idea of how much DNA might be recovered from touched objects (Table 1).
Suzanna R. Ryan
Touch DNA Analysis:
UsingtheLiteratureto
HelpAnswerSome
CommonQuestions
Table 1: Summary of amount of DNA detected via contact.
Amount of DNA Mean Contact type/substrate Source
0 - 5.2ng 0.52ng glass held for 60s Daly, et al4
0 - 14.8ng 1.23ng fabric held for 60s Daly, et al4
0 - 169ng 5.85ng wood held for 60s Daly, et al4
0.16 - 6.4ng [blank] swab of hands Bright & Petricevic5
0-0.4ng [blank] fingers pressed on various substrates for 30s Alessandrini, et al6
0 - 50.8ng 1.7ng various volume crime evidence items Raymond, et al7
[blank] 4.3ng wallets held for 60s Raymond, et al7
3.1 - 33ng 11.7ng wallets held for various times Raymond, et al7
[blank] 17.8ng plastic knife held for 15 min. van Oorschot and Jones8
6.8ng [blank] mug held for 15 min. van Oorschot and Jones8
34ng [blank] glass held for 15 min. van Oorschot and Jones8
[blank] 51ng vinyl gloves worn for 20-90 min. van Oorschot and Jones8
[blank] 11.68ng cotton rubbed with palm, finger, and side of hand for 15s Goray, et al9
[blank] 0.396ng plastic rubbed with palm, finger, and side of hand for 15s Goray, et al9
JUNE I JULY 2012 Forensic Magazine I www.forensicmag.com 31
Is DNA always left on an object via touch?
It is important to note that not every contact leaves enough DNA
behind to yield a DNA profile. Often the question is asked, “If a person
touched this item, would they necessarily have left DNA behind?” The
short answer is no, not always. Journal articles regarding the transfer of
DNA have shown that DNA is not always transferred through contact
alone. Lowe, et al10 found that 12 of 30 subjects transferred little to no
DNA to a sterile tube after handling it for 10 seconds. A research arti-
cle by Rutty11 showed that of 29 simulated strangulation samples, only
19 yielded DNA results. Of these, only 7 showed signs of any DNA not
belonging to the victim. Phipps and Petricevic12 discovered that
51%–70% of individuals (depending on which hand was tested) failed
to leave behind their DNA on a sterile tube that was held for 10 sec-
onds. In addition, a study by Raymond, et al7 on trace DNA success
rates noted that of 252 trace casework samples (all from surfaces
touched by hands), 111 (44%) did not produce a profile.
It is important to take into account, however, the date the study
was published and what methodologies were used at that time, as
improvements in the technology and methodology of DNA analysis
have arisen. For example, many of the earlier touch and transfer DNA
articles report results from samples amplified with Profiler Plus and/or
COfiler which are older amplification kits that often used a larger
amplification volume (50 µl, as compared to the standard 25 µl reac-
tion volume of today’s kits) and required a split of the sample extract
into two amplification reactions. In addition, the majority of the earlier
papers list extraction volumes of anywhere from 50 µl to 200 µl. It was
not as common for the DNA extract to be concentrated to a smaller
volume (as little as 10 to 12 µl) as it is today, so it may be that addition-
al DNA profiles would have been developed in these earlier studies if
this concentration step had been performed. In addition, many labs
today have the option of using specialized techniques designed to maxi-
mize their DNA results. For example, in addition to concentrating
one’s DNA extract, the analyst may also have the option to increase
the injection time on the capillary electrophoresis instrument thus
increasing the amount of DNA entering the capillary for detection.
Additional Taq enzyme and the protein BSA (which helps overcome
PCR inhibition) can be added to the amplification reaction. Some labs
have the option to reduce the amplification volume even further (from
25 µl to 12.5 µl, for example), which has been shown to increase the
sensitivity of the reaction. In addition, the amplified DNA can be sub-
jected to post-amplification clean-up steps and additional amplified
product can be added to the sample tube for injection. Each of these
steps have the possibility of increasing the amount of DNA observed
on the resultant electropherogram, but it is important to be aware of
possible interpretational difficulties and stochastic effects that may arise
from using these techniques.
What factors tend to increase the amount of DNA
available for transfer?
Researchers aren’t exactly sure why sometimes DNA is transferred to
an object via touch and sometimes it is not. However, some known fac-
tors that can affect the amount of DNA available for transfer include:
• Shedder status. Several studies have indicated that some indi-
viduals may be considered “good shedders,” someone who tends to
slough or shed skin cells at a greater rate than others.10 However it
should be noted that the use of the terms “good” and “bad” shedders
has been debated as other studies have found that it is nearly impossible
to determine someone’s shedder status as repeat tests on the same per-
son on different days can give very different results.12
• Hand washing. Hand washing will remove many of the shed
cells leaving little DNA available for transfer.
• Personal Habits. Some individuals touch their face, eyes, nose,
hair, etc. more often than others, thus picking up DNA from those
areas to be transferred onto the next thing that is touched.
Wickenheiser1 described this as “loading” the fingers with DNA.
• Type of Contact. Factors such as pressure and friction can also
relate to how much DNA is transferred onto a touched object. An
increase in the amount of pressure applied tends to lead to an increase
in the amount of DNA transferred and the application of friction to
the contact increases the amount of DNA transferred even further.9
• Substrate. Rough surfaces (wood, concrete, grooved surfaces)
tend to collect and retain skin cell DNA better than smooth surfaces.
• Perspiration. It is thought that sweat can increase the amount of
DNA transfered for two reasons. First, as the sweat passes through the
pores and makes its way to the skin surface, it can collect cells along the
way and wash them to the surface.1 Second, it has been shown that
sweat also contains both epithelial cells and cell-free nucleic acids.3
Once the DNA gets there, how long will it stay?
Another common question when dealing with touch DNA is, “how
long does it last?” As with most questions relating to touch DNA, there
is no easy answer. Very little study has been done to assess the persist-
ence of touch DNA, but this is becoming an increasingly important
area of research, particularly as defense attorneys begin presenting argu-
ments to suggest that touch DNA found at a crime scene can be
explained by the defendant’s presence at the scene at an earlier time
that is unrelated to the crime at hand.
Consider the following scenario: A DNA profile matching a male
suspect is located on a brick wall outside the home of a murder victim.
The DNA appears to be from skin cells as it is negative for blood,
semen, and saliva. How did the DNA get there? The prosecution’s the-
ory is that the suspect fled the crime scene by climbing over the brick
wall. Considering that blood evidence matching the victim is found
nearby on the wall, this is a viable possibility. However, upon investiga-
tion, it is revealed that the suspect previously lived at the home in ques-
tion and is, in fact, a relative of the murder victim. Could it then be
possible that the suspect left his skin cell DNA at an earlier date when
he either lived at the home or visited his relative? How can we deter-
mine which of the scenarios are accurate?
Only one study this author is aware of directly addresses the per-
sistence of touch DNA. Raymond, et al,13 conducted an investigation
into the persistence of DNA at crime scenes. They applied known
quantities of “buffy coat” DNA (the white blood cell and platelet layer
of whole blood) to gloss-painted wooden window frames, pieces of
32 Forensic Magazine I www.forensicmag.com JUNE I JULY 2012
vinyl, and control samples. Not surprisingly, they found that the chance
of recovering DNA from an outdoor crime scene decreases significantly
over time with two weeks showing a significant drop in alleles detected
for most of the samples. The control samples fared much better, with full
profiles able to be developed even after six weeks (the longest time peri-
od tested). This study also provided a table of results obtained from actu-
al touch DNA casework samples and included the time between the
offense and the collection of the evidence. Great variability existed;
however, it is interesting to note that two of the three evidence items
with greater than 50 days between offense and collection yielded DNA
profiles. One additional study dealing with direct amplification of touch
DNA samples briefly discusses the stability of touch DNA on fabrics.
Volunteers rubbed their thumb and forefinger between a sample of fabric
for 5 seconds. The fabric samples were left exposed to light on a window
ledge and then subjected to direct amplification. Nearly complete
PowerPlex 16 profiles were able to be generated from touch DNA on
acrylic, nylon, and polyester for up to 36 days after transfer.14
To assess whether it is possible that a touch DNA profile could
have been left behind at a time prior to the alleged incident, it is impor-
tant to gather as much information as possible. What is the item of evi-
dence? Rough objects would be expected to collect more skin cell DNA
as compared to smooth items. Does the item have cracks, crevices, or
grooves where skin cell DNA might collect and be somewhat protected?
An example might be a gun grip, buttons on a cell phone, or a computer
keyboard. Was the item indoors (DNA expected to last longer), or was it
outside exposed to the elements (heat, humidity, water, UV light, and
bacterial growth all degrade DNA)? Was the item an object that may
have been touched by many people (bank door handles, etc.) or only by
very few (a weapon or a car steering wheel, for example)? It is impossible,
however, to put an exact timeline on how long touch DNA evidence, or
any biological evidence for that matter, might last. It is clear that addi-
tional studies are needed in order to help answer the questions regarding
the persistence of touch DNA evidence that are often asked by investi-
gators and attorneys alike.
Is it possible to tell who handled an item last or most?
Due to the variable nature of DNA transfer, it is generally not possible to
determine who might have handled an item last or most. For example,
just because one person’s DNA profile is more prevalent on an item like
a cell phone, does not necessarily mean that they must have handled the
phone last. In addition, it does not mean that the phone must be theirs
because more of their DNA is present. It could simply mean that one of
the factors that tend to increase the amount of DNA transferred (as dis-
cussed above) is in play. In fact, three studies have discussed instances
wherein the person who touched an object transferred someone else’s
DNA to the object.4,10,16
What sort of items might possibly contain touch DNA?
The sky is the limit as almost any item might conceivably contain touch
DNA evidence. The key is to focus on those items that were most likely
to be touched given a particular crime event. In addition, it is important
to select items that have not been handled by multiple individuals as the
DNA results may be uninterpretable due to the complex mixtures of
DNA likely to be obtained. Investigators and analysts must use their
experience and their common sense in order to choose the most useful
and probative items to test for touch DNA.
References can be found online at www.forensicmag.com/
article/touch-dna-analysis-using-literature-help-answer-some-
common-questions.
Suzanna R. Ryan, MS, D-ABC is an owner/consultant with Ryan
Forensic DNA Consulting in Carlsbad, CA. Ms. Ryan is a former DNA
analyst and technical leader with over 13 years of experience in both public and
private DNA laboratories. sryan@ryanforensicdna.com
JUNE I JULY 2012 Forensic Magazine I www.forensicmag.com 33
Item of Evidence Type of case
Firearms, knife handles, weapon handles Any
Fired casing Any
Steering wheel and other vehicle swabs Carjacking, etc.
Fingerprints on victim Any
Ligatures, hand cuffs, shoestrings Strangulation, kidnapping, rape, etc.
Hand swabs from suspects Strangulation, rape
Face swabs from child victims (slapping, hitting) Child abuse
Swabs from limbs removed from animal carcasses Poaching
Cell phone swabs Robbery, etc.
Victim neck swabs Strangulation
Swabs from torn or forcibly removed clothing Rape, assault
Airbag DUI cases and others
Tools Burglary
Baggies Drug possession
Paper demand notes Bank robberies
Clothing items, hats, masks, gloves, glasses Any
Table 2: This is a short list, by no means comprehensive, of some items that may be swabbed and
submitted to the crime lab for touch DNA analysis:
To register, learn more
or submit an abstract visit:
ishinews.com
Join more than 800 forensic scientists from around
the globe to explore and discuss the latest research,
technologies and ethical issues in forensic DNA today.
Submit your abstract now!
Oral abstract deadline is June 11th
NUCLEIC ACID EXTRACTION
The Maxwell® 16 Forensic System is a compact, plug and play instrument that
extracts high quality DNA from up to 16 samples in about 30 minutes. Optimized
reagents and protocols are backed by service and support, giving you the confidence
to focus on performing and analyzing STR assays.
Promega Corporation
www.promega.com
PCR STRIPS
Each tube of the 8-strip PCR Multiply®-μStrip PCR tubes now features a
molded number for easy identification and tracking, and the connecting
bridges between tubes have been reinforced. The corresponding lid strip
is an optically clear, flat version appropriate for real-time and standard
PCR applications. When used together, the tube and cap strips provide a
leak-resistant seal to minimize sample loss.
Sarstedt, Inc.
www.sarstedt.com
AUTOMATED FT-IR MICROSCOPE
LUMOSisastand-aloneFT-IRmicroscopewithfullautomation.Itisdesignedtocombineperform-
anceforvisibleinspectionandinfraredspectralanalysiswithusercomfort.Duetothemotorization
ofallmoveablecomponentsinsidetheLUMOS,thesystemprovidesahighdegreeofautomation.
Theintuitivesoftwareguidestheoperatorstepbystepthroughtheprocessofdataacquisition.
Bruker Optics
www.brukeroptics.com
AUTOMATED LIQUID HANDLING
The new VERSA™ 10 Automated Liquid Handling Workstation has been developed to
simplifylaboriousroutineprotocolsbycombiningautomatedmulti-channeldispensing(4
or 8 channels), with single-channel, cherry-picking functionality. The customizable sys-
tem set-up, and optional deck modules allow users to automate a range of applications
such as PCR/qPCR plate formatting, sequence reaction set-up, enzymatic modifications,
and general liquid handling.
Aurora Instruments Ltd.
www.aurora-instr.com
JUNE I JULY 2012 www.forensicmag.com I Forensic Magazine 35
DUCTLESS FUME HOOD
The Aura® ductless chemical fume hoods provide advanced safety monitoring and controls.
EverSafe II™ microprocessor safety controller monitors and adjusts fume hood face velocity to
theuserpresetvalue.AurahasbeenASHRAE110testedandprovidescontainmentfromtoxic
fumes and vapors. Aura ductless fume hoods are available in 30, 42, and 54 inch widths.
Mystaire Inc.
www.mystaire.com
FINGERPRINT PATTERNSTo comprehend why friction skin is unique, one must look at biological uniqueness
3 MAIN CATEGORIES
ARCHES
Arches are the least
common of the three
general patterns and are
subdivided into two
distinctive groups.
LOOPS
WHORLS
The second most common
of the three general
patterns are Whorls. Whorls
are subdivided into 4 distinct
groups.
Occurs in only 5%
of the population
Occurs in 60-65%
of the population
Occurs in 30-35%
of the population
FREQUENCY OF EACH PRINT TYPE
LOOP TYPE
ULNAR 94% RADIAL 6%
ARCH TYPE
PLAIN 60% TENTED 40%
WHORL TYPE
PLAIN 71% DOUBLE LOOP 13% ACCIDENTAL 3%
CENTRAL POCKET LOOP 13%
PRINT TYPE
ARCHES 5% LOOPS 60-65% WHORLS 30-35%
A L W
TP
U R
ACPLDLP
The most common of the
three general patterns are
Loops. You will see both
right and left loops.
FRICTION RIDGE DEFINED
TTERAATPATTERNSe must look at biolog
of the population
Occurs in only 5%
o comprehend why friction skin is unique, one must look at biological uniqueness
of the population
Occurs in only 5%
of the population
Occurs in 60-65%
of the population
of the population
Occurs in 60-65%
of the population
groups.
are subdiv
s a
are subdivided into 4 distinct
are Whorls. Whorls
of the population
Occurs in 30-35%
of the population
Occurs in 30-35%
FREQUENCY
groups.
OF EACH PRINTFREQUENCY
A
ARCHES 5%
TYPEPRINT
TYPEOF EACH PRINT
L
LOOPS 60-65%
W
WHORLS 30-35%LOOPS 60-65%
WHORL
ULNAR 94%
TYPELOOP
PLAIN 60%
TYPEARCH
PLAIN 71%
TYPEWHORL
U
P
TENTED 40%
P
POCENTRALL
DOUBLE LOOP
6%RADIAL
T
TENTED 40%
CPLDL
13%LOOPOCKETT
3%ALLACCIDENTTA13%DOUBLE LOOP
A
R
FRICTION RIDGE DEFINEDFRICTION RIDGE DEFINEDFRICTION RIDGE DEFINED
WHORL TYPES
Plain Whorl
One or more ridges form a
complete circle-like pattern
around the center
*These often look like a
Double Loop Whorl
Two separate loops are present
in one impression
*These often look like the
Central Pocket Loop Whorl
Ridges form a loop pattern which
go around the circle-like pattern
in the center
*These often look like a
Accidental Whorl
A mixture of two different types
of patters
*
LOOP TYPES
Ulnar Loop
side, loop around and exit toward
*These often look like a lake
Radial Loop
Ridges enter from the thumb
side, loop around and exit toward
the thumb
*These often look like a lake
ARCH TYPES
Plain Arch
Ridges enter the impression, rise
in the center, and exit the oppo-
site side of the impression
*
Tented Arch
Ridges enter the impression,
spike upwards in the center,
and exit the opposite side of the
impression
*
SUB CATEGORIES
WHICH PATTERN DO YOU HAVE?
TYPESARCH
TEGSUB CAATTEGORIES
TYPESLOOP TYPES
ArchentedTTe
*
site side of the impression
, and exit the oppoin the center
Ridges enter the impression, rise
ArchPlain
TYPESARCH
site side of the impression
-, and exit the oppo
Ridges enter the impression, rise
Radial Loop
These often look like a lake*
side, loop around and exit toward
Ulnar Loop
TYPESLOOP
Radial Loop
These often look like a lake
side, loop around and exit toward
TYPES
*
impression
and exit the opposite side of the
spike upwards in the center
Ridges enter the impression,
ArchentedTTe
and exit the opposite side of the
,spike upwards in the center
Ridges enter the impression,
These often look like a lake*
the thumb
side, loop around and exit toward
Ridges enter from the thumb
Radial Loop
These often look like a lake
side, loop around and exit toward
Ridges enter from the thumb
Radial Loop
around the center
complete circle-like pattern
One or more ridges form a
Plain Whorl
TYPESWHORL
complete circle-like pattern
One or more ridges form a
TYPES
These often look like the*
in one impression
wo separate loops are presentT
Double Loop Whorl
These often look like a*
around the center
These often look like the
wo separate loops are present
Double Loop Whorl
These often look like a
WHICH TAPPAHICH
Get Ready for Rapid DNA
Booth 500
Bruce Jamieson
RapidHIT Senior Director of Sales
Get ReadyGet Ready Rapid DNAforyy Rapid DNARapid DNAGet ReadyGet Ready Rapid DNAforyy Rapid DNARapid DNA
oduct specifications may change.Pr
trademarks of IntegenX Inc. All other brands and names ar
Copyright © 2012 IntegenX Inc. All rights r
oduct specifications may change.
trademarks of IntegenX Inc. All other brands and names ar
eserved. Patents pending. IntegenX and RapidHIT arCopyright © 2012 IntegenX Inc. All rights r
espective owners.operty of their re the sole prtrademarks of IntegenX Inc. All other brands and names ar
eeserved. Patents pending. IntegenX and RapidHIT ar
espective owners.
No, we are not talking about a new state lottery. We are talking about
Lockout/Tagout, the process by which equipment is put into a safe condi-
tion so repairs or maintenance can take place. Forensic crime laboratories
are becoming more automated and complex every year. Sophisticated
equipment such as automated pipetting systems, evidence drying cabi-
nets, fuming chambers, centrifuges, and ultra-low temperature freezers are
commonplace necessities. As our facilities become more efficient and
complex, we must stay alert to the intrinsic dangers.
Although considered necessary mostly in large manufacturing and
production plants, Lockout/Tagout is needed whenever equipment needs
servicing, which is everywhere. Lockout/Tagout measures are taken to
prevent the release of unwanted or stored hazardous energy. Failure to fol-
low good Lockout/Tagout procedures often results in some of the most
gruesome and often fatal accidents encountered in the workplace. Keep
reading to learn how you can design and implement a successful
Lockout/Tagout program for your facility.
When thinking about why Lockout/Tagout is important, one televi-
sion commercial comes to mind. Remember the one where the handy-
man husband has just finished installing a new garbage disposal under the
kitchen sink but dropped something into it. As he is trying to fish it out
with his arm inserted up to the elbow his wife enters the kitchen, goes to
turn on the light and asks which switch to flip. Now, being a capable
electrician and handyman at home, would you want to bet your arm on
which switch to flip?
During the period 1982–1997 NIOSH (National Institute for
Occupational Safety and Health) found that 82% of fatal incidents
involving maintenance or repair to equipment resulted from a failure to
completely isolate or dissipate the energy source.1 In addition, a short four
years between 1992–1996 saw accidents from being caught in machinery
kill almost 750 workers while another 5,000 lost limbs from amputation.2
Sadly, every one of these could have been easily prevented. By imple-
menting a good Lockout/Tagout program you will ensure that your facili-
ty does not experience an ugly accident or worse.
What is Lockout/Tagout?
Lockout/Tagoutisaseriesofstepstakenbyemployeestoisolate,dissipate,or
otherwise prevent unexpected start up or energizing of equipment that
could cause injury. The premise is simple and straightforward; however,
detailed planning and intimate knowledge of the equipment is para-
mount for implementation. For example, say a centrifuge needs servic-
ing. Before the maintenance employee can begin work, he must make
sure the equipment can not be turned on by tripping the circuit breaker
and then placing a lock on the switch so someone else does not ener-
gize the unit while it is being serviced. It may be as simple as pulling the
plug, but many large items are hard-wired and it may not be this simple.
In addition, there may be other dangers, such as stored energy.
Different Types of Hazardous Energy
A good Lockout/Tagout program is exhaustive and meticulously
detailed. Autoclaves, centrifuges, and other automated equipment are
capable of injuring employees in numerous ways. This is because there
are several forms of hazardous energy.
• Electrical energy is most common yet still the cause of many
injuries. Often overlooked are electrical storage devices such as
batteries and capacitors.
• Thermal energy, either high temperature (e.g. steam) or low
(e.g. liquid nitrogen) is also easily recognized. Mechanical work,
chemical reactions, electrical resistance, and radiation can also
produce thermal energy.
• Potential energy is energy stored in pressure vessels (e.g. com-
pressed gas cylinders), hydraulic systems and pneumatic systems,
and mechanical devices (e.g. springs).
• Kinetic energy is associated with moving mechanical parts usu-
ally resulting from the release of potential energy.
Most automated equipment will contain more than one form of
hazardous energy. Thus, a thorough understanding of its operation and
a detailed Lockout/Tagout procedure is needed.
OSHA Requirements
TheOSHAstandardforthecontrolofhazardousenergy,29CFR1910.147,
coversservicingandmaintenanceofmachinesandequipmentwhereacci-
dentalstartuporreleaseofstoredenergycanharmworkers.Itrequires
employerstoestablishaprogramanduseprocedurestolockoutortagout
energysources,andtootherwisedisablemachinesorequipmenttoprevent
injurytoemployees.Thefirststepis to develop a written program docu-
menting the techniques and devices to be used, authorizing personnel,
describing the training, and providing for program evaluation and com-
pliance. Next, identify equipment in your facility that must follow LOTO
and designate them with proper warning signs. Keep in mind that
employers must provide needed Lockout/Tagout devices to trained and
authorized personnel.
Lockout is the placing of a lock to hold an energy isolating device in
JUNE I JULY 2012 Forensic Magazine I www.forensicmag.com 39
Vince McLeod, CIH
Safetyguys
the
Winning with LOTO
40 Forensic Magazine I www.forensicmag.com JUNE I JULY 2012
the safe position. Tagout is the use of a prominent warning device, such as a
tag and a means of attachment, which can be securely fastened to an ener-
gy isolating device. OSHA mandates that lockout take precedence over
tagout. Tagout is only allowed where equipment is not capable of being
locked out. Tags may evoke a false sense of security, and employees must
understand their meaning. Tags are essentially warning devices affixed to
energy isolating devices, and do not provide the physical restraint that is
provided by a lock.
The cardinal rule is “one lock, one key” to prevent inadvertent
removal by another employee. Clearly label each lock with durable tags to
identify the worker assigned to the lock. In general, the worker who installs
a lock is the one who removes it after all work has been completed. The
written program should have procedures on how to deal with maintenance
or service that spans shift changes, special situations, and other absences.
The final check before beginning work is to verify that all energy
sources for the equipment are de-energized. For instance, the employee
should try to start up the equipment and test that all forms of hazardous
energy have been bled down, relieved, disconnected, restrained, and other-
wise rendered safe.
After the maintenance or repair is complete, a reversal of the
Lockout/Tagout procedures will ensure a safe start up. Perform a final
inspection to confirm that all tools and nonessential items have been
removed and that the equipment components are properly installed. Make
sure all affected employees are safely positioned and clear of potential dan-
ger zones. Finally, remove the Lockout/Tagout devices and notify affected
employees of the removal and that start up will commence.
A successful Lockout/Tagout programreliesongoodtraining.Regularly
evaluatetheprogramandcheckthatproperproceduresarebeingfollowed.
Retrainemployeeswhenevertherearechangestojobassignmentsornew
equipmentorenergycontroldevicesareinstalled.Inaddition,ifyouobserve
inadequaciesintheemployees’knowledgeoruseoftheenergycontrolproce-
duresthenretrainingisnecessary.
TheSafetyGuyswelcomeyourcommentsandquestions.Youcane-
mailthemtothesafetyguys@forensicmag.com.Untilnexttime“StayAlert”
andremember“SafetyFirst!”
References
1. “Preventing Worker Deaths from Uncontrolled Release of Electrical,
Mechanical, and Other Types of Hazardous Energy,” National
Institute for Occupational Safety and Health, Center of Disease
Control. Atlanta, GA. NIOSH publication 99-110, August 1999.
http://www.cdc.gov/niosh/docs/99-110/
2. “Worker Fatalities from being Caught in Machinery,” Windau, Janice
A. Compensation and Working Conditions, Winter 1998: 35-38.
3. “The control of hazardous energy,” Occupational Safety and Health
Administration, US Department of Labor. Washington D.C.
29CFR1910.147. May 2011 (http://www.osha.gov/pls/oshaweb/
owadisp.show_document?p_table=STANDARDS&p_id=9804)
Vince McLeodisanAmericanBoardofIndustrialHygieneCertified
IndustrialHygienistandtheseniorIHwiththeUniversityofFlorida’s
EnvironmentalHealthandSafetyDivision.Hehas24yearsofexperienceinall
facetsofoccupationalhealthandsafetyandspecializesinconductingexposure
assessmentsandhealthhazardevaluations.
Increasingly more evidence is being collected from
crime scenes. Often by legal mandate, forensic laborato-
ries are required to store more evidence for longer peri-
ods of time, sometimes indefinitely. Other items of
reference, be it weapons or slides, require more and
more room. Space constraints, always one of the major
issues in labs, continue to worsen. What options exist to
better store items that not only provide more storage but
also provide an economy of space? Depending on what
is being stored there are a number of products to help
facilitate that need.
High density storage is one such product that allows
for the more efficient use of space than standard shelv-
ing. Fixed shelving requires a large amount of circula-
tion space to access items. High density storage captures
this lost space by compressing shelving units together.
The shelves are mounted on a rail system with one cir-
culation space. Either manually or with electronic con-
trols, the shelves are moved along the rails to reposition
this circulation space allowing access to the shelf you
need.
The advantage of high density storage is clear; you
can fit far more high density shelves in the same area as
standard fixed shelves. Individual high density shelving
units can be customized for specific needs. Common
forensic examples would be weapons rests or barrel pegs
for a weapons reference collec-
tion or small shelving specifi-
cally sized to store histology
slides.
There are some disadvan-
tages to high density storage.
High density systems are more
expensive than standard
shelves. Because of the com-
pressed nature of the shelves,
only one shelf can be accessed
at a time. This requires coordi-
nation if multiple people want
to access evidence at the same
time in different areas of the
system. There are also special considerations for accom-
modating the rails on which the high density storage
system travels. Because these rails are a few inches high,
adding high density storage to an existing room may
require ramps to access the system. If high density stor-
age is incorporated during new construction or renova-
tion it is important to plan for recessed areas in the
concrete for rail placement.
Another space-saving shelf alternative is vertical
carousel storage. Vertical carousel storage is a computer-
ized system which stores files, books, or anything that is
generally of a uniform size in vertical storage. The sys-
tem assigns each item in storage with an identifier
which allows it to electronically retrieve the item, rotat-
ing the storage unit until the item in question is at the
access port.
The major advantage of vertical carousel storage is
its ability to use the entire floor to ceiling space of its
footprint, greatly increasing the amount of items that
can be stored. This allows any size user to readily access
items stored in the vertical carousel without having to
either stoop or use a ladder. Also of note, because it is a
computerized system, the system can generate a record
of access to the items in storage.
The disadvantages of vertical carousel storage are
similar to that of high density storage. It is more expen-
sive than standard shelving.
It too can create a bottleneck
in accessing evidence, as
only one or two persons can
access the system at once.
Vertical carousel storage is
designed for smaller items
which are of unified size,
such as histology slide con-
tainers, but cannot house
larger items. Because each
item in the carousel has an
identifier, upfront work is
required to label each item in
order to work with the sys-
Answers to Facility Issues
JUNE I JULY 2011 Forensic Magazine I www.forensicmag.com 41
LaboratoryStorage Solutions:
EfficientSolutionstotheEverPresentIssueofStuff
Mostwanted
Susan Halla and Cy Henningsen
Figure 1: High Density Storage
tem. Specialized containers may also be necessary in order
to provide a standardized storage size for use within the
system.
Evidence lockers are focused more toward maintain-
ing chain of custody than providing efficient storage space.
However, even evidence lockers can be used more effi-
ciently by the addition of electronic controls. Evidence
storage lockers are generally provided in different sizes and
configurations, some sized for small items such as DNA
kits, some tall and narrow for items such as long arms, and
some larger units for the storage of bulky items. Tradition-
ally a certain number of lockers of each size were specifi-
cally assigned to each investigator. On any given day, an
investigator might have all bulky items from a crime scene
and not have enough lockers of an appropriate size, while
another investigator might not need all of his or her lock-
ers, but there has been no effective way to share space
while providing running proof of chain-of-custody.
Computerized sys-
tems can track which
lockers are in use and
which are open. An
authorized user can
access the computer
system, identify which
locker size they need,
check out an available
locker, and then place
evidence in the avail-
able locker. That lock-
er is then locked and
can only be opened by
that investigator or an
evidence system
administrator. The
system logs all access
to the lockers so that
chain-of-custody can be proven.
Because the computer system controlling the lockers
indicates which lockers are available, there are fewer rea-
sons to permanently assign a certain block of lockers to an
investigator. This can allow a department to get by with
fewer lockers; or support additional staff with the same
number of manually controlled lockers. Additionally, lock-
ers can often be controlled with proximity cards in lieu of
keys, allowing for key cards to be decommissioned easily or
reassigned as staff changes and relieves the issue of losing
valuable keys.
As with the other options presented, additional cost is
one thing to consider when evaluating the introduction of
computer controlled evidence lockers. While electronic
control systems may be
added to existing lock-
ers, power and storage
for the control system
components is required
for installation and
would be an additional
cost either as a retrofit
or in new construction.
As Benjamin
Franklin noted, “…in
this world nothing can
be said to be certain,
except death and taxes.”
Appending this quote to
add “storage” seems
appropriate to the way
in which forensic facili-
ties must operate. It is
assured that storage
requirements will con-
tinue to grow and finding smart ways to manage storage by
more efficiently and effectively using the space available is
a necessity.
Susan Halla (susanh@crimelabdesign.com) is a
Project Leader and Senior Forensic Planner with Crime
Lab Design which provides full architectural and
engineering services for forensic and medical examiner
facilities worldwide.
Cy Henningsen (cyh@crimelabdesign.com) is
an Equipment Coordinator with Crime Lab Design.
www.crimelabdesign.com
42 Forensic Magazine I www.forensicmag.com JUNE I JULY 2011
Figure 2: Inside an evidence locker
Figure 3: Run of evidence lockers
Figure 4: Vertical Carousel Storage
FNS20120601
FNS20120601
FNS20120601
FNS20120601
FNS20120601
FNS20120601

More Related Content

Similar to FNS20120601

Title of Your Research Proposal Student Name Walde
Title of Your Research Proposal Student Name WaldeTitle of Your Research Proposal Student Name Walde
Title of Your Research Proposal Student Name WaldeTakishaPeck109
 
The Innovation Commercialization Process: A Case Study
The Innovation Commercialization Process:A Case StudyThe Innovation Commercialization Process:A Case Study
The Innovation Commercialization Process: A Case StudyCheryl Tulkoff
 
Science to Data Science: PhDs and postdocs moving to startups and industry (2...
Science to Data Science: PhDs and postdocs moving to startups and industry (2...Science to Data Science: PhDs and postdocs moving to startups and industry (2...
Science to Data Science: PhDs and postdocs moving to startups and industry (2...AI Guild
 
An Introduction To Clear-Cut Products In Examples Of
An Introduction To Clear-Cut Products In Examples OfAn Introduction To Clear-Cut Products In Examples Of
An Introduction To Clear-Cut Products In Examples OfSandra Ahn
 
An Introduction To Clear-Cut Products In Examples Of
An Introduction To Clear-Cut Products In Examples OfAn Introduction To Clear-Cut Products In Examples Of
An Introduction To Clear-Cut Products In Examples OfRobin Morales
 
Caveon Webinar Series: Lessons Learned from EATP and CSDPTF November 2013
Caveon Webinar Series:  Lessons Learned  from EATP and CSDPTF November 2013Caveon Webinar Series:  Lessons Learned  from EATP and CSDPTF November 2013
Caveon Webinar Series: Lessons Learned from EATP and CSDPTF November 2013Caveon Test Security
 
Cancer and Work Design v1.01
Cancer and Work Design v1.01Cancer and Work Design v1.01
Cancer and Work Design v1.01James Repenning
 
Academic careers in Novo Nordisk, Lund, May 7 2014
Academic careers in Novo Nordisk, Lund, May 7 2014Academic careers in Novo Nordisk, Lund, May 7 2014
Academic careers in Novo Nordisk, Lund, May 7 2014MentLife
 
Crisis management keyhaven john deverell_nick woods_2012-11-29
Crisis management keyhaven john deverell_nick woods_2012-11-29Crisis management keyhaven john deverell_nick woods_2012-11-29
Crisis management keyhaven john deverell_nick woods_2012-11-29Comprend
 
neutralresumemergui17
neutralresumemergui17neutralresumemergui17
neutralresumemergui17Sylvia Mergui
 
Crowdsourcing à la sbv IMPROVER: the challenge of being your own client
Crowdsourcing à la sbv IMPROVER: the challenge of being your own clientCrowdsourcing à la sbv IMPROVER: the challenge of being your own client
Crowdsourcing à la sbv IMPROVER: the challenge of being your own clientCrowdsourcing Week
 
How To Write An Analysis Essay 101 Step-By-Step Guide Blog
How To Write An Analysis Essay 101 Step-By-Step Guide BlogHow To Write An Analysis Essay 101 Step-By-Step Guide Blog
How To Write An Analysis Essay 101 Step-By-Step Guide BlogKris Cundiff
 
02 young vpi lecture 2014
02 young vpi lecture 201402 young vpi lecture 2014
02 young vpi lecture 2014jemille6
 
Insight white paper_2014
Insight white paper_2014Insight white paper_2014
Insight white paper_2014Lin Todd
 
What's In An Idea-Chanda-UofT Life Science Coach
What's In An Idea-Chanda-UofT Life Science CoachWhat's In An Idea-Chanda-UofT Life Science Coach
What's In An Idea-Chanda-UofT Life Science CoachDebra A. Chanda
 
An Exploration of Contract Cheating and Academic Misconduct Within Health Edu...
An Exploration of Contract Cheating and Academic Misconduct Within Health Edu...An Exploration of Contract Cheating and Academic Misconduct Within Health Edu...
An Exploration of Contract Cheating and Academic Misconduct Within Health Edu...Thomas Lancaster
 
Unit VIII Course ProjectUniversity Case StudyCongratulatio.docx
Unit VIII Course ProjectUniversity Case StudyCongratulatio.docxUnit VIII Course ProjectUniversity Case StudyCongratulatio.docx
Unit VIII Course ProjectUniversity Case StudyCongratulatio.docxdickonsondorris
 

Similar to FNS20120601 (20)

Title of Your Research Proposal Student Name Walde
Title of Your Research Proposal Student Name WaldeTitle of Your Research Proposal Student Name Walde
Title of Your Research Proposal Student Name Walde
 
The Innovation Commercialization Process: A Case Study
The Innovation Commercialization Process:A Case StudyThe Innovation Commercialization Process:A Case Study
The Innovation Commercialization Process: A Case Study
 
Science to Data Science: PhDs and postdocs moving to startups and industry (2...
Science to Data Science: PhDs and postdocs moving to startups and industry (2...Science to Data Science: PhDs and postdocs moving to startups and industry (2...
Science to Data Science: PhDs and postdocs moving to startups and industry (2...
 
An Introduction To Clear-Cut Products In Examples Of
An Introduction To Clear-Cut Products In Examples OfAn Introduction To Clear-Cut Products In Examples Of
An Introduction To Clear-Cut Products In Examples Of
 
An Introduction To Clear-Cut Products In Examples Of
An Introduction To Clear-Cut Products In Examples OfAn Introduction To Clear-Cut Products In Examples Of
An Introduction To Clear-Cut Products In Examples Of
 
Caveon Webinar Series: Lessons Learned from EATP and CSDPTF November 2013
Caveon Webinar Series:  Lessons Learned  from EATP and CSDPTF November 2013Caveon Webinar Series:  Lessons Learned  from EATP and CSDPTF November 2013
Caveon Webinar Series: Lessons Learned from EATP and CSDPTF November 2013
 
Cancer and Work Design v1.01
Cancer and Work Design v1.01Cancer and Work Design v1.01
Cancer and Work Design v1.01
 
Academic careers in Novo Nordisk, Lund, May 7 2014
Academic careers in Novo Nordisk, Lund, May 7 2014Academic careers in Novo Nordisk, Lund, May 7 2014
Academic careers in Novo Nordisk, Lund, May 7 2014
 
2014 'Bioscience Colorado' Magazine
2014 'Bioscience Colorado' Magazine2014 'Bioscience Colorado' Magazine
2014 'Bioscience Colorado' Magazine
 
Crisis management keyhaven john deverell_nick woods_2012-11-29
Crisis management keyhaven john deverell_nick woods_2012-11-29Crisis management keyhaven john deverell_nick woods_2012-11-29
Crisis management keyhaven john deverell_nick woods_2012-11-29
 
neutralresumemergui17
neutralresumemergui17neutralresumemergui17
neutralresumemergui17
 
Life Sciences Trends 2014
Life Sciences Trends 2014Life Sciences Trends 2014
Life Sciences Trends 2014
 
Crowdsourcing à la sbv IMPROVER: the challenge of being your own client
Crowdsourcing à la sbv IMPROVER: the challenge of being your own clientCrowdsourcing à la sbv IMPROVER: the challenge of being your own client
Crowdsourcing à la sbv IMPROVER: the challenge of being your own client
 
How To Write An Analysis Essay 101 Step-By-Step Guide Blog
How To Write An Analysis Essay 101 Step-By-Step Guide BlogHow To Write An Analysis Essay 101 Step-By-Step Guide Blog
How To Write An Analysis Essay 101 Step-By-Step Guide Blog
 
UniversityPresentation_v6_04292016
UniversityPresentation_v6_04292016UniversityPresentation_v6_04292016
UniversityPresentation_v6_04292016
 
02 young vpi lecture 2014
02 young vpi lecture 201402 young vpi lecture 2014
02 young vpi lecture 2014
 
Insight white paper_2014
Insight white paper_2014Insight white paper_2014
Insight white paper_2014
 
What's In An Idea-Chanda-UofT Life Science Coach
What's In An Idea-Chanda-UofT Life Science CoachWhat's In An Idea-Chanda-UofT Life Science Coach
What's In An Idea-Chanda-UofT Life Science Coach
 
An Exploration of Contract Cheating and Academic Misconduct Within Health Edu...
An Exploration of Contract Cheating and Academic Misconduct Within Health Edu...An Exploration of Contract Cheating and Academic Misconduct Within Health Edu...
An Exploration of Contract Cheating and Academic Misconduct Within Health Edu...
 
Unit VIII Course ProjectUniversity Case StudyCongratulatio.docx
Unit VIII Course ProjectUniversity Case StudyCongratulatio.docxUnit VIII Course ProjectUniversity Case StudyCongratulatio.docx
Unit VIII Course ProjectUniversity Case StudyCongratulatio.docx
 

FNS20120601

  • 1. F rensicM A G A Z I N E ® technology, trends, products,and solutions for forensic professionals Vol.9| No.3 JUNE | JULY 2012 Trace Evidence Optimal Temperatures for Latent Print Recovery Evidence Photography Touch DNA Analysis Fingerprint Patterns VICONA Subsidiary of Advantage Business Media, LLC. Business Media,Inc. www.forensicmag.com
  • 2.
  • 3.
  • 4. Vol.9 | No.3 JUNE I JULY 2012 35Products 44Advertiser Index 45 How it Works departments features Forensic Magazine® (ISSN 1553-6262) is published bi-monthly by Vicon Business Media, Inc. a subsidiary of Advantage Business Media, 4 Limbo Lane, Amherst, NH 03031. USPS 023-655 Periodicals Postage Paid at Amherst, NH 03031 and at additional mailing office. A requester publication, Forensic Magazine® is distributed to qualified subscribers. Non-qualified subscription rates in the U.S. and Canada: $120 per year. All other countries: $180 per year, payable in U.S. funds. Back issues may be purchased at a cost of $15 each in the U.S. and $20 elsewhere. While every attempt is made to ensure the accuracy of the information contained herein, the publisher and its employees cannot accept responsibility for the correctness of information supplied, advertisements or opinions expressed. POSTMASTER: Send address changes to Forensic Magazine,® P.O. Box 1273, Skokie, IL 60076. ©2012 Forensic Magazine® by Vicon Business Media, Inc. All rights reserved. No part of this publication may be reproduced without permission from the publisher. Permission is granted for those registered with the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923 (phone: 978-750-8400; fax: 978-750-4470) to photocopy articles for a base fee of $1 per copy of the article plus $.35 per page. Canada Agreement number: PM40063731 Return Undeliverable Canadian Addresses to: Station A, PO Box 54, Windsor, ON N9A 6J5 E-mail: returnsil@imex.pb.com 8 POINT OF VIEW The Case for a Professional Doctorate in Forensic Science Michael Cole 12 THE DNA CONNECTION DNA Activism Chris Asplen 15 AMAZING TRACE Douglas Page 19 OPTIMAL TEMPERATURES FOR LATENT PRINT RECOVERY Anthony Iten 23 EVIDENCE PHOTOGRAPHY: THINKING OUTSIDE THE BOX BUT MORE DNA TESTING Mike Voelker 31 TOUCH DNA ANALYSIS: USING THE LITERATURE TO HELP ANSWER SOME COMMON QUESTIONS Suzanna R. Ryan 36 FINGERPRINT PATTERNS Erika Di Palma and Anthony Smith 39 THE SAFETY GUYS Winning with LOTO Vince McLeod, CIH 41 MOST WANTED: ANSWERS TO FACILITY ISSUES Laboratory Storage Solutions: Efficient Solutions to the Ever Present Issue of Stuff Susan Halla and Cy Henningsen 43 DIGITAL FORENSIC INSIDER Windows 7 Registry Forensics: Part 5 John J. Barbara 46 WHO SAYS YOU CAN’T DO THAT? Impression Evidence: Building Your Case with Duplicate Evidence Dick Warrington 4 Forensic Magazine I www.forensicmag.com JUNE I JULY 2012 IETHE EVIDENCE AT THE SCENE.IN THE LAB. CONFERENCE October1-2,2012, Washington, DC THE Geta handle on the evidence you collect WWW.THEEVIDENCECONFERENCE.COMPresented by Forensic Magazine® and DFI News ®
  • 5. Bruker‘s new LUMOS is a fully automated FT-IR microscope with an integrated FT-IR spectrometer. LUMOS is designed to combine highest quality in visible inspection and highest performance in infrared spectral analysis. With motorization and networking of all moveable components, the LUMOS provides an ease of use never before seen in FT-IR microscopy. LUMOS FT-IR microscopy made easy Stand-alone FT-IR microscope with full automation Simple easy-to-use interface Motorized ATR crystal Automated measurements in transmission, reflection and ATR Comprehensive validation with 21 CFR part 11 FT-IR Innovation with Integrity Contact us for more details: www.brukeroptics.com www.lumos-ir.com Bruker Optics Inc. Billerica, MA · USA Phone +1 (978) 439-9899 Fax +1 (978) 663-9177 E-Mail: info@brukeroptics.com
  • 6. a 3M Company Advanced Biometric Identification Systems Systems to multi-biometric AFIS mobile devices that bring the functionalitySystems to multi-biometric MobileMugshot mobile devices that bring the functionality AFISMobile .cogentsystems.com | CGTwww a 3M Company info@cogentsystems.com.cogentsystems.com | CGT el. +1 (626) 325-9600 | FaxTTe 639 N. Rosemead Blvd., Pasadena, CA info@cogentsystems.com el. +1 (626) 325-9600 | Fax +1 (626) 325-9700 10791639 N. Rosemead Blvd., Pasadena, CA 3M Cogent, Inc. Liz Vickers Group Publisher 631-241-6161 liz.vickers@advantagemedia.com Tim Studt Editorial Director 973-920-7748 tim.studt@advantagemedia.com EDITORIAL Rebecca Waters Editor-in-Chief 603-672-9997 x105 rwaters@forensicmag.com Elizabeth Doughman Editor 603-672-9997 x109 edoughman@viconpublishing.com EDITORIAL ADVISORY BOARD John J. Barbara Digital Forensics Consulting, LLC Lisa M. Calandro Applied Biosystems Peter Massey Henry C. Lee Institute of Forensic Science University of New Haven Kenneth C. Mohr, Jr. Crime Lab Design Robert S. McLaren Promega Corporation Anthony J. Tambasco Mansfield Police Laboratory ART AND PRODUCTION Joan Sullivan VP, Art & Production jsullivan@viconpublishing.com Alice Scofield Ad Traffic Manager 603-672-9997 x101 ascofield@forensicmag.com ADVERTISING SALES Eric Basta Sales Manager 603-672-9997 x121 ebasta@forensicmag.com Patty Grogis Sales 603-672-9997 x114 pgrogis@forensicmag.com REPRINTS/EPRINTS Betsy White: 877-394-7350 bwhite@reprintoutsource.com CUSTOMER SERVICE forensicmag@halldata.com • 847-763-9505; New subscriptions, renewals, changes of address, back issues, and all customer service questions VICON BUSINESS MEDIA, INC. a subsidiary of Advantage Business Media 4 Limbo Lane • Amherst, NH 03031 Phone: 603-672-9997 • Fax: 603-672-3028 EXECUTIVE OFFICE ADVANTAGE BUSINESS MEDIA 100 Enterprise Drive, Suite 600 Rockaway, NJ 07866-0912 Phone: 973-920-7000 • Fax: 973-920-7541 Rich Reiff CEO George Fox President Terry Freeburg Chief Financial Officer Susanne Foulds Vice President/Human Resources F rensicM A G A Z I N E ® 6 Forensic Magazine I www.forensicmag.com
  • 7. Advanced Safety Engineering for the effective handling of hazardous particulate drugs and powders in a Class II, Type A2 Biosafety Cabinet. The CellGard™ HD (Hazardous Drug) ES (Energy Saver) Class II, Type A2 Biological Safety Cabinet offers ISO Class 5 sterility and personnel, product, and environmental protection for your valuable in process work materials. ® 2100 Fernbrook Lane | Plymouth, MN 55447 | U.S.A. | 763.553.1270 | WWW.NUAIRE.COM /nuaire @nuaire /nuaire /nuaire Learn more online www.nuaire.com Room Air Contaminated Worksurface Air Clean HEPA Filtered Air Clean Oval Canister HEPA Filtered Air Your Energy Saving Alternative
  • 8. Forensic science is at a cross- roads.TheNationalAcademy of Sciences (NAS) Report “Strengthening Forensic Science in the United States; A Path Forward” has caused the profession in the United States to question its direction. The debate, started in 2009, has yet to be resolved. The demise of the Forensic Science Service in the UK and the development of other providers has prompted heated debate in the UK and elsewhere concerning whether forensic science should be publicly and/or privately funded as a service to the criminal justice system. The growth of the European Network of Forensic Sciences in Europe highlights the dif- ferences between those well-established laboratories and those fledgling institutions setting out on the journey in sup- port of the legal process. What should be clear to all is that scientific excellence is the cornerstone of support for any justice system, and that academic and training provision is required from pre-university, through degree and on to doc- toral level and onward as continuing education. In order that research be carried out in forensic science, it is essential that there is research degree provision for the profession. However, for those who wish to develop within their practice, particularly up to and including doctoral level, there is currently little or no provision. This needs to change and one instrument to implement the change is the Pro- fessional Doctorate (D.Prof.). Why is the D.Prof. the solution? In many systems the opportunity for curiosity-driven and practice-based tradi- tional Ph.D. research in operational laboratories has been lost or is absent. In the UK the traditional Ph.D. offered by universities has been criticized for not delivering a rounded graduate. It may not be possible to access or return to labo- ratory facilities to undertake laboratory-based research in busy operational laboratories. The reasons for this are many and include lack of time and instrumental resources and the need to maintain accreditation standards on instruments used operationally with the consequence that they cannot be used for research purposes. Many of the criticisms levelled at Ph.D. programs in the UK will be equally applicable in the U.S. The solution to these difficulties may lie with the Professional Doctorate. A Professional Doctorate “is a program of advanced study which, whilst satisfying the criteria for the award of a doctorate, is designed to meet the specific needs of a professional group external to the university” (UKCGE, 2002: 62). It is a part-time route to a doctorate specifi- cally designed for busy senior practitioners who have already accrued considerable professional experience during their working lives. The focus of the professional doctorate is on the needs of the candidates, their host organization, and the wider professional community. However, a problem at work may not always be a research-worthy one. A doctoral research-worth problem will need a “yes” answer to one of the following questions: 1. Will a known gap in the body of knowledge be filled? 2. Will previous research be replicated and expanded by looking at a different category of participants, environment, and/or constructs/variables? 3. Will previous research be expanded by more thoroughly examining some identifiable aspect? 4. Are there specific, identifiable, and documented problems with the currently available solutions? The subject of study usually relates to an area of professional practice—for example resource allocation, laboratory design, or policy implementation rather than a detailed scientific problem. For the D.Prof. candidate, it can take con- siderable time to develop a problem-based research focus before embarking on the research in detail. It is for this rea- son that the doctorate at Anglia Ruskin University is divided into two parts—Stages 1 and 2. Stage 1 involves the development of the research proposal through 7,000 word essays. The first of these is a reflective document identifying the professional issues that will be addressed in the course of the research. The second paper addresses the “state of the art” and comprises a comprehensive literature survey around the issue to be addressed. The final paper describes the 8 Forensic Magazine I www.forensicmag.com JUNE | JULY 2012 viewpoint of The Case for a Professional Doctorate in Forensic Science Michael Cole
  • 9. Establish IDENTITY in the morgue or in the field The technology and performance trusted by FBI NGI for 10-print, latent, and RISC fast-ID matching and over 50% of State and Local Law Enforcement, is at the heart every MorphoIDent Mobile ID device. The proven, reliable provider of biometric identification solutions: MorphoTrak - Trusted by the best for over 35 years (800) 601-6790 Visit booth 405 at IAI 2012 info@morphotrak.com www.morphotrak.com More than just another Mobile ID device
  • 10. viewresearch methodology that will be adopted and applied and discusses how the data will be treated to arrive at appropriate conclusions. Candidates prepare a research proposal after they have passed the three formal research papers in Stage 1. This delay in the development of the research proposal is deliberate and recognizes the characteristics of doctoral candidates. One of the main purposes of the formal papers in Stage 1 is to give them this time to understand the nature of doctoral level re- search and (re)formulate their ideas. Stage 1 also gives them the time to develop the required research skills they will need and to develop written material which can be used as a re- source in Stage 2. During the second stage candidates complete their re- searchatwork.Mid-waythroughthesecondstage,candidates undertake the “confirmation of candidature” exactly as a tra- ditional candidate would. This en- ables the candidate, their team, and theuniversitytodeterminethatprogress is satisfactory and that the candidate is moving toward doctoral qualifica- tions. Once this component is satis- fied, the candidate continues with hisorherresearchandsubmitsathe- sisoncetheresearchiscompleteand written up. A viva voce examination is then organized. The outcomes of theexaminationarethesameasthose ofatraditionalPh.D. vivavoceexam- ination. Will such degrees work for the forensic science community? Only time will tell. Certainly they provide the opportunity to engage in prac- tice-based research that will benefit theorganizationinwhichthecandi- date is working and the wider foren- sic science community. The model described is one possibility for a pro- fessional doctorate. Another model is the taught model, a third is mixed delivery.However,theAngliamodel isentirelyresearchbasedandmirrors most closely the traditional research degree process. What is required is that individual laboratories and lab- oratory systems have the courage to engageinsuchpractice-basedresearch aswellastraditionalresearchdegrees. Professor Mike Cole has been Professor of Forensic Science at Anglia Ruskin University in Cambridge, Eng- land, since 2001. Mike led the reshap- ing of the B.Sc. (Hons.) program, the developmentofanumberoftaughtMas- tersprograms,andisnowleadingonthe developmentofresearchdegreesinForen- sic Science at Anglia Ruskin. 10 Forensic Magazine I www.forensicmag.com JUNE | JULY 2012 FMA0612 © Safariland Available in standard Green or Buff color, Traxtone is a diestone dental stone material that produces highly-detailed impressions with minimum setting time. Special pigment flakes embedded inside the casting material indicate when the Traxtone is sufficiently mixed. Traxtone provides superior detail reproduction and durability and has a higher compression strength than most casting materials at 18,000 psi. Kit includes 5- 2 lb. bags of Traxtone, measuring cup for water, small bottle of hair spray and a 12” wooden ruler. TRAXTONE® CASTING KIT DETAILEDIMPRESSIONS, EVERY TIME. www.ForensicsSource.com • 800.347.1200 Buy a Traxtone Kit, Get a FREE Scale! Purchase a Green Kit (#1008075) or a Buff Kit (#1008081) and get a FREE “Bureau” Reference Scale Set (# 1005953) valued at $12.56. Must use Promo Code 20124214 when placing order. Offer valid June 1, 2012 thru July 31, 2012. Cannot be combined with any other offer. No substitutions. point of continued
  • 12. 12 Forensic Magazine I www.forensicmag.com JUNE I JULY 2011 Chris Asplen AdynamicfairlyuniquetotheU.S.systemofjusticeistheexten- sive impact that victim advocacy has on policy, legislation, and funding. Having lived and worked abroad for more than a few years,I’vebeenstruckbytheextenttowhichvictim’svoiceselse- where fail to resonate with decision makers the way they do in theUnitedStates.It’snotthatvictimadvocacyisnonexistentin other parts of the world but the impact victims have in the U.S. for the cause of justice can be extraordinary. NatashaAlexankoisoneofthosevoicesfightingforjustice. WhilethecommunityofDNAactivistsisalreadywellrepresent- ed by tireless advocates like Debbie Smith who has battled for years to ensure sufficient DNA funding and Jayann Sepich who criss-crossesthecountrytopromotearresteetesting,Natashahas madethecommitmenttodedicatehertime,effort,andherstory specifically to the elimination of backlogged rape kits. A victim whose rape kit sat untested for nine years, Natasha has started Natasha’s Justice Project, dedicated to eliminating the estimated 200,000 kit backlog of rape kits through education, advocacy, and public awareness. Natasha’sstoryissorelevantandrepresentativeoftheinjus- ticeofuntestedrapekitsthatitwasusedrecentlytopunctuatean HBOfilmproducedontheworkoftheManhattanDA’sOffice’s Sex Crime Unit. Simply titled, Sex Crimes Unit, the film docu- ments the daily work of prosecutors and investigators navigating theveryrealisticwatersofbringingamassivenumberofrapiststo justice.Natasha’sstoryisthreadedthroughoutthefilm,highlight- ing a particularly difficult aspect of sex crime investigation and prosecution—the cold case. A stranger rape, with little evidence other than DNA, but DNA evidence rendered useless by the failure to have it submitted, analyzed, and entered into CODIS. What her story highlights, and what she now brings to the advocacy community, is the story behind the headlines or the CODIS statistics. It is the value in all victim advocacy. It is the meaningofsolvingacasetoavictim’ssenseofself,ofsafety,relief ofguiltthattheycouldhave,shouldhavedonesomethingdiffer- ently. It is the opportunity to have what Natasha called that “transcendent”momentofclarity,andmostofallpower,fromthe witness stand. Clarity and power that is denied as long as a case remains unsolved. In 1993, Natasha was a twenty-year old college student liv- inginNewYorkCity,adreamshehadmaintainedherentirelife. She was violently raped, sodomized, and robbed at gunpoint by an unknown assailant while walking back to her apartment. Natasha resisted the temptation to shower the evidence away from her violated body and went to the hospital where hospital staff collected evidence for her rape kit. Following her assault, all leads were exhausted by the New York City Police Department andherattackercouldnotbeidentified.Natasha’srapekitsaton a shelf at the New York City Police Department property clerk’s office for the next nine years. To be clear, Natasha’s case was not the result of a systemic failuretoactbypolice,prosecutors,orthelaboratory.(Ifyouread thiscommentaryevenoccasionally,youknowIhavenoproblem pointingoutsuchfailurewhereIthinkitexists!)Thesewerestill the early days of DNA databasing. The New York City Medical Examiner’s Office was not even a part of CODIS yet. Not sub- mittingarapekitforDNAanalysiswasanunderstandable,albeit frustrating, decision for police at that time. If no suspect existed, fundsspentonDNAanalysiscouldfairlybeconsideredwastedif no suspect was ever developed through other, more traditional evidence. But again, this was pre-CODIS. Then, in 2003, Mayor Michael R. Bloomberg announced the “John Doe Indictment Project,” a coordinated city-wide ini- tiative designed to prevent rapists from using the statute of limitationstoescapeprosecution.Of17,000untestedrapekits,it was estimated that an excess of 600 cases related to those kits were soon to expire, including Natasha’s case. As a result, nearly a decade after her attack, Natasha received a call from the New York City District Attorney’s Office as prosecutors looked to use the DNA from her rape kit to create a “John Doe” indictment. That same year, summoning more than just a little courage, she testified before a grand jury and the DNA profile from her rape kitwasindicted,allowingprosecutorstobringchargesagainsther attacker whenever captured. In 2007, the New York City Police Department found Natasha’s attacker through a match to his DNA profile in CODIS.VictorRondonhadbeenarrestedinLasVegas,Nevada, onaminorcharge.WhenextraditedtoNewYork,hisDNApro- file was entered into CODIS pursuant to a parole violation. Rondon’s profile matched the DNA profile developed from Natasha’s rape kit. A year later, Rondon was tried before a jury and found guilty of eight counts of violent assault, including bur- glary in the first degree, robbery in the first degree, two counts of rape in the first degree, sodomy in the first degree, and sexual abuse in the first degree. Rondon was sentenced to 44 to 107 years in prison. DNA Activism dnaconnection the
  • 13. That’s not to say her trial was anything less than traumatic. The first question on cross-examination was, “Were you a virgin?” Seriously. In today’s world, with a Rape Shield law firmly in place inNewYork,thatwasthefirstquestionoutofthedefenseattorney’s mouth. (A woman described by the prosecutor as an experienced defenseattorneywithaclearknowledgeoftheobjectionablenature of the question.) The cross-examination didn’t get better from there.Thedefenseprofferedbythedefendantwasbasedonthethe- ory that, since Natasha didn’t scream while shewasshovedupthestairsofherapartment building into the bike storage area, thrust over a railing, and repeatedly raped and sodomized WITH A GUN TO HER HEAD, well then clearly she must have enjoyed the experience and that constituted evidence of consent. Getting back to the film. There was another poignant observation to be made about the film. As Natasha’s story unfolds and it becomes clear that it was nine and a half years that her rape kit sat untested, the director uses flashes of newspaper articles withheadlinesaboutsexcrimesandrapekits and backlogs. But while the headline was clearly visible, you could also see a bit of the text from the article. And in those flashes of textyoucouldseeanamerecurringtimeand time again—Debbie Smith. Debbie Smith for whom the Debbie Smith Act is named and who is responsible for literally hundreds of thousands of dollars allocated to various aspects of DNA testing. Coming full circle, the film reminds us, although I think unin- tentionally, that it was victim advocacy that first forced decision makers to pay attention to the issue of backlogged rape kits and the tragedy of solvable yet unsolved cases. It was Debbie’s victim advocacy that drove the decision makers to test Natasha’s kit in the first place. Natasha was raped when there were legitimate reasons that made the decision not to test a rape kit rational. Lack of a fully implemented CODIS system made those decisions understandable. In 2012 however, there are no understandable or rational rea- sons why 200,000 kits remain untested. There is no cost benefit analysis that comes outonthesideofrefusingtosubmitacaseto the laboratory. Fortunately, there is now yet another loud and convincing voice willing toshareherstoryandtestifytotheunaccept- able fact of backlogged rape kits. Thank you, Natasha. Chris Asplen is President of Asplen and Associates, LLC. He consults with local, state, federal, and international governments on the use of forensic DNA technology. He can be reached at ChrisAsplen@Gmail.com. continueddnaconnection the Enhances the detection, inspection and photography of: Blood and other bodily fluids Biological stains and latent fingerprints Bruises, bite marks, pattern wounds, hair and fibers Grease, oil and other petroleum-based stains Questionable documents Also available: OFK-300 Field Kit. Features flashlight body; UV, blue and white light LED lamp heads; UV-absorbing and orange-contrasting spectacles; detachable diffusing filter, AC and DC chargers, and padded carrying case. To learn more, scan QR Code, call 1-800-274-8888 or visit www.spectroline.comISO 9001:2008 CERTIFIED COMPANY (Patent Pending) OPTIMAX™ Multi-Lite™ LED Forensic Inspection Kit The OFK-8000 Multi-Lite™ Kit features a cordless, rugged LED flashlight body and eight interchangeable, Qwik-Connect™ heads that provide illumination in UV-A, violet, blue, cyan, green, amber, red and white light. It’s ideal for crime scene investigation, gathering potential evidence and laboratory work! So Good, It’s Simply Criminal! Fibers Fingerprints Bodily fluids OFK-8000 Kit also includes: Yellow, orange and red-contrasting filters; UV-absorbing, yellow, orange and red- contrasting spectacles; detachable diffusing filter, AC and DC battery chargers, and padded carrying case. JUNE I JULY 2012 Forensic Magazine I www.forensicmag.com 13
  • 14. The e-Core™ punch is the only handheld electronic coring and dispensing instrument validated for the forensic market*. Its razor-sharp tip cleanly and precisely punches discs from Whatman™ FTA™ cards. e-Core instrument’s ergonomic design enables you to punch hundreds of samples per day without discomfort. To sign up for a test punch visit www.gelifesciences.com/forecore GE Healthcare Life Sciences *Based on Intellectual Property and developmental validation search. GE, imagination at work and GE monogram are trademarks of General Electric Company. FTA, e-Core and Whatman are trademarks of GE Healthcare companies. © 2012 General Electric Company – All rights reserved. GE Healthcare Bio-Sciences Corp., 800 Centennial Ave., Piscataway, NJ 08855, USA 04/2012 Punch, retrieve, dispense, all in less than 1.5 seconds. Blink and you’ll miss it.
  • 15. Suppose, just after the Fourth of July fireworks begin on the Charles River, a team of terrorists located 100 meters apart along Boston’s Esplanade simultaneously empty several canisters of the odorless nerve agent sarin on the ground amongst the holiday crowd. The liquid agent quickly evaporates into a deadly, invisible vapor, spreading through the crowd. Within seconds symptoms appear in the hundreds of people exposed—blurred vision, drooling, sweating, coughing, chest tightness, breathing difficulty, nausea, and diarrhea. Those exposed to more concentrated amounts experience loss of consciousness, convulsions, paralysis, and respiratory failure. In the growing confusion and panic, the terrorists slip away into the night, undetected. Apprehension, prosecu- tion, and imprisonment are not likely. No one noticed them. Everyone was watching the fireworks. Police have no leads. Or do they? The developing field of chemical forensics may offer clues. Government scientists, led by chemist Carlos Fraga at the Pacific Northwest National Laboratory, are reporting the development of a unique chemical forensic tracking technology that could help law enforcement trace the residues from terror attacks involving nerve gas and other chemical agents back to the companies or other sources where the perpetra- tors obtained ingredients for the agent. Nerve substances, such as sarin, are among the most toxic and fast-acting chemical warfare agents in existence. Sarin is lethal in amounts as small as 36 ppm. A single drop of sarin the size of a pinhead can kill an adult, as the Japanese learned in 1995 when the Aum Shinrikyo religious sect released sarin in the Tokyo subway, killing 13 and injuring over 5,500. Although traces of nerve agents remain after such attacks, prior to Fraga’s work there has been no practical way of tracing the agent back to its source ingredients. Fraga’s team found a way to do that using a technique called “impurity profiling”—a way of identifying impurities in chemicals or illegal drugs that allows the chemical to be matched to the impurities in the precursor chemicals, pinpointing the likely source. Impurity profiling has been used for several years to track seized drugs, helping law enforcement determine dealer-user relationships, drug sources, distribution networks, and smuggling routes by connecting seized drugs to precursors. Impurity profiling also has the potential to trace counterfeit pharmaceuticals and herbal medicines, banned pesti- cides, and homemade explosives. Fraga adopted the technique to track nerve agents like sarin because of the high threat of a terrorist chemical attack. The researchers found that up to 88% of the impurities in source chemicals used to make sarin appear also in the finished product, and that these impurities are unique, much like fingerprints. “This means potentially tracing a chemical threat agent like sarin to the specific lot number and commercial man- ufacturer that produced the precursor used to make the sarin collected from a crime scene,” Fraga said. Once the manu- facturer of the precursor is known, then purchasing and shipping records may point to the buyer. Fraga said that to his knowledge, this is the first time impurities have been demonstrated for matching a synthetic chemical product to its specific precursor source. This new piece of evidence obtained through impurity profiling could provide useful leads that complement those obtained by traditional pieces of crime-scene evidence, like latent fingerprints, trace DNA, and camera footage. Kevin Lothridge, CEO, National Forensic Science Technology Center, said Fraga’s technique is the same concept as the Drug Enforcement Administration’s cocaine, heroin, and methamphetamine signature programs. “This type of JUNE I JULY 2012 Forensic Magazine I www.forensicmag.com 15 Douglas Page Amazing TraceNew chemical forensics test could help track down terrorists responsible for nerve gas attacks.
  • 16. forensic intelligence can be useful in a range of investigations, from drug cases to terrorism,” Lothridge said. “It adds another technique to the analytical toolbox to help investigators advance the intelligence they are able to gather.” Nothing Special The PNNL method requires no special equipment, other than standard laboratory gas chromatogra- phy/mass spectrometry instruments. “What is most remarkable is that the chem- ical impurity profiles can be recovered mostly intact from sarin samples even after multiple processing procedures, such as distillation and two solvent extraction steps,” Fraga said. Fraga said this development is important for a couple of reasons. First, he said he hopes that this and similar work will deter future chemical attacks by letting terrorists know there are now ways to track them. “Second, by developing a forensic capability, we have a greater chance of finding perpetrators of chemical attacks or their sources of materials before they can strike again,” he said. “And third, our work can potentially be applied to other threats, such as illicit drugs and homemade explosives.” Lawrence Kobilinsky, chair of the Department of Sciences at John Jay College of Criminal Justice, believes Fraga may be on to something valuable in the fight against terrorism. “This work promises to provide a new approach to fighting chemical terrorists and chemistry-oriented crimi- nals,” Kobilinsky said. While sarin attacks have not yet occurred in the U.S., they could at any time. Kobilinsky said terrorists would not think twice about using biological, chemi- cal, or radiological weapons to cause mass destruc- tion of populations in Western nations. “The anthrax attacks were a wake-up call for law enforce- ment and homeland security,” he said. In the event of a nerve agent attack, Kobilinsky said authorities must neutralize the effects of such attacks and ultimately trace the source of the weapon. Sometimes, different groups claim credit for a terrorist attack when it is clear that only one group was responsible. “This tech- nique can help assign blame on those who are truly responsible for a chemical attack,” Kobilinsky said. Origin of Impurities Rashid Chotani, MD, director, Chemical and Biological Defense Programs at TASC (Chantilly, VA), said in order to validate impurity profiling in the context of chemical warfare, the researchers may need to explore the origins of the impurities to increase the confidence of their results. “Given the number of sources for agents and precur- sors—in the U.S. alone about 100 facilities deal with chem- icals that are ‘scheduled’ under the Chemical Weapons Convention—this new technique would work best when traditional forms of investigation have narrowed the sample size to a few possible locations,” he said. Chotani said this technique could potentially enable investigators to link the agent back to a specific laboratory, assuming that sufficient precursor materials remain in the laboratory to identify any impurities. Fraga concedes his work is in the preliminary, proof-of- concept stage of development, that there is a great deal of work required to determine what can and cannot be done with impurity profiling. He said one of the first tasks is to try to understand the sources and causes of variability for the impurity profiles obtained from chemical agents and their precursors, a step necessary to quantitatively determine if the impurity profiles from different samples match and what the error rates are if the profiles match. In the near term, Fraga proposes to combine the impu- rity profiles obtained for sarin and precursors with other impurity profiles and chemical characteristics that are not being captured by current analytical approaches. “We anticipate that these new measurements will independently make the same connection we made between sarin and its specific precursor stocks, thereby increasing the level of confidence in a match,” he said. Fraga does not wish to over-sell his technique nor see its value reduced, like that of compositional analysis of bul- let lead (CABL). CABL is similar to impurity profiling in that the chemical components present in bullet lead can provide forensic information. However, according to a 2004 report (Weighing Bullet Lead Evidence, The National Academies Press) CABL has been over-sold in court and therefore its usefulness and credibility has diminished, Fraga said. “We are therefore try- ing hard to understand the limitations of impurity profiling to avoid over-selling it.” Douglas Page writes about forensic science and medi- cine from Pine Mountain, California. He can be reached at douglaspage@earthlink.net. 16 Forensic Magazine I www.forensicmag.com JUNE I JULY 2012
  • 17. iS50 NIR Module Develop QC methods for bulk samples iS50 ATR Module Leaves main sample compartment free for other analyses iS50 Raman Module Mapping and well-plate screening in sample compartment mounted module Never before has a research grade FT-IR provided more information, in less time and more easily. The revolutionary design of the Thermo Scientific Nicolet iS50 FT-IR Spectrometer allows any user to move from one experiment to another with the push of a single button—integrating ATR, Raman and NIR. Hyphenated techniques are part of its versatility. TGA-IR and GC-IR functionality are coupled with powerful automated data analysis tools to extract information quickly and consistently, eliminating literally hours of data analysis. Smarter spectroscopy, exemplified. • discover easy versatility • thermoscientific.com/iS50 smarter FT-IR easily do more ©2012ThermoFisherScientificInc.Allrightsreserved.
  • 18.
  • 19. Fingerprints are considered one of the most reliable ways to identify individuals associated with criminal cases. However, sometimes they cannot be recovered due to various environmental factors. One of these factors is tem- perature, specifically high temperatures. At high temperatures the water left by fingerprints evaporates and the amino acids denature. In this experiment, the optimal temperature ranges for a sheet of computer paper and plastic bottle was found to be from -20°C to 185°C for a 15 minute exposure to heat and from -20°C to 150°C for an hour exposure to heat. Background Fingerprints are widely accepted as being a unique characteristic of a person. Kaushal states, “No two people, not even identical twins, have ever been shown to have exactly the same pattern of raised, curved lines on their finger- tips.”1 These patterns on the fingertips, called minutiae, are special to each individual person. When a person touches a surface, a chemical mixture of their fingerprint is left behind called an impression, which refers to the fric- tion ridge detail deposited on the surface. If this action is unintentional, it is called a latent print. In most cases, fin- gerprint examiners deal with latent prints. The mixture that makes up these impressions include water, amino acids, cholesterols, fatty acids, small-molecule oils, DNA, and ionic salts.2 Forensic scientists use numerous techniques to react with these chemicals and make the latent print visible to the naked eye. Several factors can alter or disrupt these chemicals and therefore make the latent print unidentifiable to an examiner. The temperature of the surface on which a latent print is left is one such factor.3 A higher temperature would cause the water to evapo- rate and cause the amino acids to denature. This can make the latent print hard to visualize and extremely difficult to identify. A study done by William and Karen Sampson4 suggests that the optimal temperature ranges for identifications are from 68°F to 95°F (20°C to 35°C). The study suggested that if a latent print was exposed to heat or dryness for hours to days, it would be hard to retrieve the print. The purpose of the present study is to deter- mine the optimal temperatures in which a latent print can be recovered from a piece of computer paper and a plastic bottle. Paper and plastic were chosen because they are commonly handled by individuals on a daily basis. Also paper and plastic are commonly found at crime scenes. Once the range is determined, the time period in which the latent print endures those temperatures will be extended to see if the range shortens. Materials and Methods The experiment was conducted using two of the Hamline University Chemistry Department’s ovens, Furnatrol I Type 18200 Automatic Controller Model FA1730 and Fisher Scientific Isotemp Oven Model 630F. The temperature was set to 33°C on the oven and then allowed to pre- heat. Once the temperature was reached, latent prints were placed all over the sheet of computer JUNE I JULY 2012 Forensic Magazine I www.forensicmag.com 19 Anthony Iten OptimalTemperaturesfor LatentPrintRecoveryA study on the effects of time and temperature on the recovery of latent prints from computer paper and plastic bottles. Figure 1: Dusting results of paper and plastic bottle at 90°C for 15 minutes (positive). View a slideshow of the full results above or at www.forensicmag.com/article/optimal-temperatures- latent-print-recovery.
  • 20. paper and the top of the plastic bottle. To ensure a good print, the fin- gertips were rubbed along the forehead and sides of the nose. This allowed the fingertips to collect more water, amino acids, and oils. Once the latent prints were placed on the computer paper and plastic bottle, the computer paper and plastic bottle were placed inside the oven for approximately 15 minutes. After that, they were transferred to a large plastic container and sealed inside. This helped keep the computer paper and plastic bottle at the same temperature as the oven. The con- tainer was then transferred to another building where the super glue fuming chamber was located, as shown in Figure 2. Four drops of liquid super glue were placed on the aluminum foil cup, which was then placed on top of a heating pad inside the chamber. A hot cup of water was also in the back corner of the chamber. The piece of computer paper was then clipped to the top of the chamber and the plastic bottle was placed in the other back corner. Next the heating pad and light were turned on and the chamber was closed. The paper and plastic bottle were exposed to super glue fumes for 15 minutes.5 After that the chamber was opened and the heating pad was turned off to allow the fumes to evaporate. This causes the chemicals left behind by the latent print to condense and become hard. It allows the latent print to be dusted without smudging the print. Then the piece of computer paper and plastic bottle were dusted using Black Magna Fingerprint Powder to reveal an impression if there was any. A picture was then taken of the result of the dusting. The same test was performed at the temperatures of -20°C (obtained by using a freezer), 20°C, 40°C, 60°C, 90°C, 110°C, 160°C, 185°C, and 220°C. Then the temperatures of - 20°C, 120°C, 150°C, and 170°C were tested again, but left inside the oven for one hour. Results Pictures were taken after each dusting was completed on the sheets of computer paper and plastic bottles. The temperatures for the 15 minutes intheovenareshowninFigure1(printswithvisibleminutiaearelabeled positive and non-visible prints are negative). The temperatures for the one hour in the oven are shown in Figure 3 (prints with visible minutiae are labeled positive and non-visi- ble prints are negative). Althoughthepicturesmaynotshowitattimes,theoptimaltem- peraturerangefor15minutesintheovenwas-20°Cto185°C. Temperatureshigherthan185°Cturnedthecomputerpaperbrittleand brownmakingitimpossibletorecoverimpressionsbydustingthem.It wasalsoimpossibletorecoverimpressionsfromtheplasticbottleatthose hightemperaturesbecausethebottlemeltedcompletely,whichwassur- prisingbecauseittookonlyashorttimeforthemtomeltcompletely. Furtherresearchaboutthetemperature at which plastic melts would have helped determine when the plastic bottle would have melted. When testing the latent prints for an hour inside the oven, the -20°C test showed that impressions could still be recovered. However, when the latent prints were tested at 170°C, the computer paper became brittle again and the plastic bottle was partially melted. There were some minu- tiae on the plastic bottle but most of the impression was blurred together. The computer paper impression was blurred completely. When the com- puter paper and plastic bottle sat inside the oven for an hour at 150°C, the super glue fuming and dusting process was able to reveal impressions on both. Discussion This research had many possible sources of error. To begin with, the oven would sometimes change temperature throughout the time the computer paper and plastic bottle were inside. It seemed that once the items were placed inside the oven, the temperature increased periodically. For some of the tests, the temperature would increase only a few degrees but in other tests it increased as much as 15 degrees. This increase in temperature may be due to the make and model of the oven. More tests could be conducted to solve this problem by using a better, stable oven. The increase in temperature could have affected the true temperature at which the items were tested and therefore affected the optimal temper- ature range. Another source of error was the time the computer paper and plastic bottle were super glued. It is possible that the items were not super glued long enough, making the impressions more prone to be smudged when dusting. This again would pro- vide negative feedback on the optimal temperature range. The amount of time items are super glued depends on the number of items present in the chamber.6 With many items, super glue fuming can take up to 45 minutes. This research can be applied when dealing with crime scenes that have been exposed to extreme temperatures. When examiners know the crime scene exceed a certain extreme temperature, then they know that an impression cannot be recovered from an object. However this research only pertains to computer paper and plastic bottles. To make this study more applicable, other surfaces must be considered and tested. For example, different kinds of paper and plastic, metals, rubber, wood, and glass would be suitable items to test. Another area worth exploring is if it is possible to recover impressions from fired bullets and casings along with explosives. ATF conducted a study on Molotov cocktails and were able to 20 Forensic Magazine I www.forensicmag.com JUNE I JULY 2012 Figure 2: Super glue chamber in Drew Science Center Room 205.
  • 21. JUNE I JULY 2012 www.forensicmag.com I Forensic Magazine 21 recover some impressions on the glass fragments.6 A future direction in this area would be to study plastic explosives. Conclusions Forsomesurfaces,therearetemperaturesbeyondwhichlatentprints canberecoveredthusmakingitimpossibletogetanimpression.The longerthelatentprintisexposedtoheat,themaximumtemperature tovisualizethatimpressiondecreases.Thesemaximumtemperatures may vary depending on the surface they are tested on, but were the sameinthisstudy.At15minutesofexposuretoheat,computerpaper and a plastic bottle had a maximum temperature of 185°C. For an hour of exposure to heat, paper and plastic had a maximum temper- atureof150°C.Thereforeitisreasonabletoconcludethatasthedura- tion of time spent at temperature increases, the shorter the tempera- ture range is to obtain an identifiable latent print. Further research would be needed to solidify the exact temperature ranges. References can be found online at www.forensicmag.com/ article/optimal-temperatures-latent-print-recovery. Anthony Iten is recent graduate of Hamline University with a B.A. in Chemistry and a Forensic Science Certificate. 624 Community Dr., Morgantown, WV, 26505; (612-790-0974); aiten01@hamlineuniversity.edu. Figure 3: Dusting results of paper and plastic bottle at 120°C for one hour (positive). View a slideshow of the full results above or at www.forensicmag.com/article/optimal-temperatures- latent-print-recovery.
  • 22. Contact your Streck Representative to request an in-lab evaluation.
  • 23. Traditional definitions of “evidence” include the ideas, “to make evident, something that makes plain or clear, data presented in court in proof of the facts.” (Dictionary.com) If a picture is “worth a thousand words,” and if the definitions above are some of the ways that we define the term “evidence,” then I would like to suggest some perhaps new ways that we can use this vital unappreciated tool. The idea that the only time that one takes pictures is when there is a need to document a broken window, skid marks, vehicle damage, wounds, or injuries needs to be revisited, especial- ly at the “patrol level.” Photography or digital imaging can certainly be an effective tool to doc- ument “evidence” that can save you time and effort down the road. Traffic Enforcement Those of you who stop vehicles for equipment and safety violations probably spend a great deal of time writing out a three paragraph description of the violations that initially caused you to stop the vehicle, and the subsequent violations that you discovered (Figure 1). If, down the road you need to defend your stop and the reasons you took an enforcement action doesn’t it make sense to have a photo or at least three to back up your observations and narrative report. Instead of trying to create a word picture on the witness stand to help the judge or jury to “see” what you saw, why not let them do just that—see what you saw; because after all, seeing is believing right? Having photographs to supple- ment testimony regardless of the case is like conveying the message to the judge or jury that “you don’t need my testimo- ny, have a look for yourselves.” And if you stop and think about it, the proverbial “picture is worth a thousand words,” is also worth at least 45 minutes of direct, cross examination, and re-direct testimony in court when you could be enjoying your day off. If the tires were “as bald as a baby’s behind” then you would most cer- tainly benefit from having a photo to back up that contention (Figure 2). Isn’t this a better way to work? Can you see where a few images can save you from even going to court at all, much less invariably in the middle of your days off? Eyewitness Perspective Documentation We have all had cases where that one witness seems to make the case. So suppose for a minute that our case is one where a witness saw a suspicious person behind a business who appears to be ready to rob the business. The JUNE I JULY 2012 Forensic Magazine I www.forensicmag.com 23 Mike Voelker Evidence Photography: Thinking Outside the Box Photography illustrating your case report can strengthen your case and corroborate your narrative. Figure 1: A photo can illustrate vehicle safety violations. Figure 2: Show don’t tell.
  • 24. IECONFERENCE THE EVIDENCE AT THE SCENE. IN THE LAB. Get aHandle WWW.THEEVIDENCECONFERENCE.COM Early Bird Discount Sign-Up Today - Save $100 Presented by Forensic Magazine® and DFI News®
  • 25. October 1-2, 2012 Washington, DC DIGITAL and MOBILE DEVICE EVIDENCE you collect onthe TRACKS ON CRIME SCENE, FORENSIC LABS, AND DIGITAL AND MOBILE DEVICE FORENSICS. WWW.THE EVIDENCECONFERENCE.COM Platinum Sponsor: Silver Sponsor:
  • 26. caller reports that the person appears to have a shiny object that looks like a firearm of some sort. Suppose that officers who are sent to investigate the subject end up shooting the subject who was “armed” with something other than a weapon. Having initial responding officers document where and how the witness saw what they reported is obviously vital to any case. Instead of simply having the witness testify that they were looking out their window through the slats in their window blinds, again take the jury to the scene (Figure 3). Supplement the witness’s testimony with an image for the jury to take to the deliberation room. Just to make sure that we are being as thorough as possible when we are locating where the suspect was at certain times in the event, suppose we use a traffic cone from our squad car or partner officer positioned by the witness from their perspective to further solidify and document that they had the ability to make their obser- vations. Taking the picture to show where the witness was making observations can also aid their recall at the time of trial some years down the road. Now let’s think about what effect the photos will have if we take it a step further and allow the witness to use our patrol point- and-shoot camera to take a picture framing it with the perspective that they saw. As noted speaker and forensic innovator Dick Warrington says, “Who says you can’t do that?” While this is certain- ly unconventional, I think your prosecutor has an even firmer foun- dation to introduce the images of the witnesses view to show that they had the perspective to see what they are testifying to. Use of Force Documentation At times people will make frivolous claims of excessive force and injuries resulting from arrests and uses of force in an attempt to solve their financial problems. Have you thought about how photography can back up your narrative report and how little appreciated and understood aspects of digital photography can save you, your co- workers, and your department time, effort, and perhaps money? Let’s use an example of a use of force event where you or your co-worker’s suspect ends up with injuries that need to be treated at a hospital or otherwise have the person medically cleared before taking them to jail. I think most of us would think to take pictures of the wounds, but let’s look past the obvious and document the snugness of the handcuffs to cover that base as well. If the suspect is going to con- tend in a civil suit that you or your co-worker were vicious and out of control, would an officer who is busy snapping a series of pictures seem out of control to a jury? Now let’s factor in the often overlooked aspect of the date and time stamp which is part of the digital image file metadata. If your camera has been adjusted to the correct date and time prior to taking the images, then your images can essentially take the jury to the scene. On this date and time this image was created and was saved to the SD card in this camera. Absent in-squad video to back up your report that the suspect was spitting what they claim was contaminated blood at you while being transported; use a few photographs to document that the suspect had indeed done just that (Figure 4). Correctional staff documentation of claimed wounds or injuries on intake to the facility can help refute friv- olous claims. The photographs document what the subject and their injuries looked like on this date and at this time. A good personal, if not departmental practice would be to take a series of pictures the minute the suspect makes a comment about the handcuffs being too tight. After arrest and booking into the jail at least a second set should be taken. Evidence Packaging If there were questions about how you packaged your evidence, you can certainly answer nearly all questions without having to check the evidence out of property, remove the items for photography, and then add another seal when you re-package the evidence—if you took images of how you packaged and sealed your evidence. While this certainly adds a bit more time at the forefront of the investiga- tion, I would argue that this will save you time and effort later on as you won’t need to explain the multiple layers of evidence seals on a particular package on the stand. Here again I feel that your friend and mine, the date and time stamp on digital images, can bolster our position that we are not 26 Forensic Magazine I www.forensicmag.com JUNE I JULY 2012 Figure 3: Photographing the eyewitness’ perpective takes the jury to the scene. Figure 4: Images can help combat frivolous use of force claims.
  • 27. making it up. With a series of images you can lay out in order, on this date and time here is the seal that I put on the package, then on this date and time this seal was put on, followed by this one. I don’t mean to belabor the point, but as our society becomes more visually orient- ed, I think we do our cases a disservice if our only testimony to the truth of the matter is “well, I’m telling you it was this and I am sworn to tell the truth.” Drug Evidence Photographs could probably save you from testifying in court by tak- ing a few pictures of the material at the time of discovery, the subse- quent field test results, and the packaging of evidence. With a few pictures and some basic subject and case informa- tion a prosecutor could literally dictate a criminal complaint just from your images. For example in these next two images you visually depict what the subject was possessing, the officer notes the total amount of currency by (Figure 5) writing it next to each denomina- tion stack. Next the officer has tallied up the total currency amount, and then written the weight of each of the individual baggies by each baggie, followed by the weight of the larger container baggie (Figure 6) to provide even more detailed documentation. In most jurisdic- tions juries are not allowed to review police reports during delibera- tion, but they certainly could be allowed to have your evidentiary photographs to review. Taking our “evidence photography” thought process to another level, how about documenting the weight of our contra- band with a photograph in a new way. Again the side benefit to digital photography is that bleary eyed investigators can readily determine when during that 36–48 hour work day they were pack- aging that particular evidence by reviewing the date and time information which is part of the digital image data (Figure 7). After presenting this at my department I heard that an offi- cer took this to the next level by taking a picture of the scale face before weighing the material. The image showed a .00 gram weight followed by a picture of the evidence and the weight of that evidence. While this seems a bit odd, it can help refute any defense contention that the scale was not working properly and was not zeroed out before you weighed the item. The date and time infor- mation, along with the image number, will back up when the image was taken. The images don’t have to be the greatest thing since sliced bread, they just need to back up your observations and narrative report. Vehicle Searches Juries know from media sources that we tend to find a treasure trove of contraband in the center console of vehicles. Squad video footage can back up the fact that we were in the car empty handed then pulled out something and placed it in an evidence bag. But now with our new or renewed method of taking the jury to the scene let’s take a few pictures before, during, and then after the vehicle search (Figure 8). Having a picture of what we found, how we found it, with the correct date and time stamp as to when we found it—followed by post search photos showing that the K-9 did not claw up the interior of the car during the search—I think closes the door on a great num- ber of issues that arise and confront us regularly. At the next level, if your camera supports and captures geopositioning data you can now “show” the jury nearly exactly where that traffic stop took place or where the images were taken. Officers who work in rural areas can certainly see the tremendous benefit to this. JUNE I JULY 2012 Forensic Magazine I www.forensicmag.com 27 Figure 5: The officer notes the total amount of currency confiscated. Figure 6: Documenting the weight of each individual baggie. Figure 7: Give the jury a failsafe visual: showing just how much the drugs weighed. Figure 8: Take a few pictures before, during, and after a vehicle search.
  • 28. 28 Forensic Magazine I www.forensicmag.com JUNE I JULY 2012 Electronic Evidence Documentation Amongst the problems confounding our best efforts to gather this data is the cost of the extraction devices, and sometimes the distance between the extraction device and the subject device. Whether it is the temporary threat posted on Facebook, the threat, or the no-contact violation sent via a text message, low cost point-and-shoot style digital photography can be an effective tool for officers or investigators in the field to capture and document evi- dence. A background of a brown paper evidence bag, coupled with the business card with the case number and investigator’s name in at least one of the images will demonstrate a level of professionalism. First Responder Photography Finally it probably goes without saying that it is extremely vital for initial responding officers to take at least a few photographs of scenes before they get contaminated by personnel conducting a walk- through. The few minutes of time to take a set of overall and mid range views of a scene can not only provide images to brief respond- ing investigators, they can steer an investiga- tion on a logical course from the start. I know of a department where a number of years ago a full complement of personnel were called in to investigate a body found in the basement storage area of an apartment building. The limited information available was that the area by the body was extremely bloody. Once the documentation of the scene leading to the body was complete, a more thor- ough exam of the specific scene clearly showed that instead of a homicide the department was dealing with a very determined and indeed very bloody self-mutilation suicide event. The inves- tigation showed that the subject clearly lost consciousness after cutting himself, laid down several times, and then would get up again and run around the same area in a circle trying to pump his blood. Clearly, a few scene photographs to brief the investigative team could have focused the investigation from the onset and likely could have saved time, pages of reports, and the cost of personnel for that department. It is my hope that you can see the benefits of having still images to supplement your work and reports, and I have no doubt that in addi- tion to what I have suggested here, you have already thought of additional ways a series of pictures could have improved an investigation. Take a few minutes and share that information with your co-workers and contacts. Mike Voelker is a Detective with the Eau Claire, Wisconsin, Police Department. Det. Voelker has over 23 years of law enforcement expe- rience. Eau Claire Police Department, 740 Second Avenue, P.O. Box 496, Eau Claire, WI 54702- 0496; (715) 839-6165; mvoelker@eauclairewi.gov; www.eauclairewi.gov/police-home. Visit www.labconco.com or call 1-800-732-0031 for more information. Freedom for the good guys—conviction for the bad guys. The Protector® Downdraft Powder Station keeps users safe by containing powders during fingerprinting processing. www.labconco.com Protector® Downdraft Powder Station
  • 29.
  • 30.
  • 31. With modern technology, the simple act of picking up an object or touching a surface can lead to the identification and apprehen- sion of a criminal. In the past few years, not only have the number of touch DNA evidence items being submitted to the lab for analysis skyrocketed, but the number of journal articles regarding touch DNA and DNA transfer (both primary and secondary) has also increased greatly. This article is intended to update the reader on the latest touch and transfer DNA research and attempts to answer some of the most common questions that are asked regarding the topic. What is “touch” DNA? First, a review of what touch DNA is and how it arrives on an object. Touch DNA is simply DNA that is transferred via skin cells when an object is handled or touched. The average human sheds roughly 400,000 skin cells per day;1 however, since it is known that the top-most layers of skin are basically “dead”, being keratinized and having lost their nuclei,2 where does the touch DNA come from? Kita, et al,2 performed experiments which showed that small amounts of fragmented DNA are present on the surface of the skin and they theorized that these fragments of DNA may be constantly sloughed off the keratinized cornified layer of skin and that sweat may also contain fragmented DNA. Later research verified that the presence of sweat helps to contribute to the DNA profile obtained from touch DNA samples.3 This research also showed that cell free nucleic acids, or CNAs, (basically free-floating DNA fragments not encapsulated in the cell nucleus) contribute greatly to the total amount of DNA present in a sample with CNAs being detected in the sweat of 80% of healthy individuals tested. It was also found that, along with CNAs, nucleated cells were present in sweat samples taken from volunteers. Interestingly, most DNA extraction methods do not utilize the portion of the sample where CNAs are found—the aqueous portion of the extract—and after centrifugation to collect the cellular material, the supernatant (con- taining the CNAs) is generally discarded.3 How much DNA is left behind when an object is touched? One of the most common questions asked regarding touch DNA is, “how much DNA is expected to be transferred” given a certain set of circumstances. Unfortunately, this is a difficult question to answer as there are so many variables involved. However, we can use the information from various studies to provide an idea of how much DNA might be recovered from touched objects (Table 1). Suzanna R. Ryan Touch DNA Analysis: UsingtheLiteratureto HelpAnswerSome CommonQuestions Table 1: Summary of amount of DNA detected via contact. Amount of DNA Mean Contact type/substrate Source 0 - 5.2ng 0.52ng glass held for 60s Daly, et al4 0 - 14.8ng 1.23ng fabric held for 60s Daly, et al4 0 - 169ng 5.85ng wood held for 60s Daly, et al4 0.16 - 6.4ng [blank] swab of hands Bright & Petricevic5 0-0.4ng [blank] fingers pressed on various substrates for 30s Alessandrini, et al6 0 - 50.8ng 1.7ng various volume crime evidence items Raymond, et al7 [blank] 4.3ng wallets held for 60s Raymond, et al7 3.1 - 33ng 11.7ng wallets held for various times Raymond, et al7 [blank] 17.8ng plastic knife held for 15 min. van Oorschot and Jones8 6.8ng [blank] mug held for 15 min. van Oorschot and Jones8 34ng [blank] glass held for 15 min. van Oorschot and Jones8 [blank] 51ng vinyl gloves worn for 20-90 min. van Oorschot and Jones8 [blank] 11.68ng cotton rubbed with palm, finger, and side of hand for 15s Goray, et al9 [blank] 0.396ng plastic rubbed with palm, finger, and side of hand for 15s Goray, et al9 JUNE I JULY 2012 Forensic Magazine I www.forensicmag.com 31
  • 32. Is DNA always left on an object via touch? It is important to note that not every contact leaves enough DNA behind to yield a DNA profile. Often the question is asked, “If a person touched this item, would they necessarily have left DNA behind?” The short answer is no, not always. Journal articles regarding the transfer of DNA have shown that DNA is not always transferred through contact alone. Lowe, et al10 found that 12 of 30 subjects transferred little to no DNA to a sterile tube after handling it for 10 seconds. A research arti- cle by Rutty11 showed that of 29 simulated strangulation samples, only 19 yielded DNA results. Of these, only 7 showed signs of any DNA not belonging to the victim. Phipps and Petricevic12 discovered that 51%–70% of individuals (depending on which hand was tested) failed to leave behind their DNA on a sterile tube that was held for 10 sec- onds. In addition, a study by Raymond, et al7 on trace DNA success rates noted that of 252 trace casework samples (all from surfaces touched by hands), 111 (44%) did not produce a profile. It is important to take into account, however, the date the study was published and what methodologies were used at that time, as improvements in the technology and methodology of DNA analysis have arisen. For example, many of the earlier touch and transfer DNA articles report results from samples amplified with Profiler Plus and/or COfiler which are older amplification kits that often used a larger amplification volume (50 µl, as compared to the standard 25 µl reac- tion volume of today’s kits) and required a split of the sample extract into two amplification reactions. In addition, the majority of the earlier papers list extraction volumes of anywhere from 50 µl to 200 µl. It was not as common for the DNA extract to be concentrated to a smaller volume (as little as 10 to 12 µl) as it is today, so it may be that addition- al DNA profiles would have been developed in these earlier studies if this concentration step had been performed. In addition, many labs today have the option of using specialized techniques designed to maxi- mize their DNA results. For example, in addition to concentrating one’s DNA extract, the analyst may also have the option to increase the injection time on the capillary electrophoresis instrument thus increasing the amount of DNA entering the capillary for detection. Additional Taq enzyme and the protein BSA (which helps overcome PCR inhibition) can be added to the amplification reaction. Some labs have the option to reduce the amplification volume even further (from 25 µl to 12.5 µl, for example), which has been shown to increase the sensitivity of the reaction. In addition, the amplified DNA can be sub- jected to post-amplification clean-up steps and additional amplified product can be added to the sample tube for injection. Each of these steps have the possibility of increasing the amount of DNA observed on the resultant electropherogram, but it is important to be aware of possible interpretational difficulties and stochastic effects that may arise from using these techniques. What factors tend to increase the amount of DNA available for transfer? Researchers aren’t exactly sure why sometimes DNA is transferred to an object via touch and sometimes it is not. However, some known fac- tors that can affect the amount of DNA available for transfer include: • Shedder status. Several studies have indicated that some indi- viduals may be considered “good shedders,” someone who tends to slough or shed skin cells at a greater rate than others.10 However it should be noted that the use of the terms “good” and “bad” shedders has been debated as other studies have found that it is nearly impossible to determine someone’s shedder status as repeat tests on the same per- son on different days can give very different results.12 • Hand washing. Hand washing will remove many of the shed cells leaving little DNA available for transfer. • Personal Habits. Some individuals touch their face, eyes, nose, hair, etc. more often than others, thus picking up DNA from those areas to be transferred onto the next thing that is touched. Wickenheiser1 described this as “loading” the fingers with DNA. • Type of Contact. Factors such as pressure and friction can also relate to how much DNA is transferred onto a touched object. An increase in the amount of pressure applied tends to lead to an increase in the amount of DNA transferred and the application of friction to the contact increases the amount of DNA transferred even further.9 • Substrate. Rough surfaces (wood, concrete, grooved surfaces) tend to collect and retain skin cell DNA better than smooth surfaces. • Perspiration. It is thought that sweat can increase the amount of DNA transfered for two reasons. First, as the sweat passes through the pores and makes its way to the skin surface, it can collect cells along the way and wash them to the surface.1 Second, it has been shown that sweat also contains both epithelial cells and cell-free nucleic acids.3 Once the DNA gets there, how long will it stay? Another common question when dealing with touch DNA is, “how long does it last?” As with most questions relating to touch DNA, there is no easy answer. Very little study has been done to assess the persist- ence of touch DNA, but this is becoming an increasingly important area of research, particularly as defense attorneys begin presenting argu- ments to suggest that touch DNA found at a crime scene can be explained by the defendant’s presence at the scene at an earlier time that is unrelated to the crime at hand. Consider the following scenario: A DNA profile matching a male suspect is located on a brick wall outside the home of a murder victim. The DNA appears to be from skin cells as it is negative for blood, semen, and saliva. How did the DNA get there? The prosecution’s the- ory is that the suspect fled the crime scene by climbing over the brick wall. Considering that blood evidence matching the victim is found nearby on the wall, this is a viable possibility. However, upon investiga- tion, it is revealed that the suspect previously lived at the home in ques- tion and is, in fact, a relative of the murder victim. Could it then be possible that the suspect left his skin cell DNA at an earlier date when he either lived at the home or visited his relative? How can we deter- mine which of the scenarios are accurate? Only one study this author is aware of directly addresses the per- sistence of touch DNA. Raymond, et al,13 conducted an investigation into the persistence of DNA at crime scenes. They applied known quantities of “buffy coat” DNA (the white blood cell and platelet layer of whole blood) to gloss-painted wooden window frames, pieces of 32 Forensic Magazine I www.forensicmag.com JUNE I JULY 2012
  • 33. vinyl, and control samples. Not surprisingly, they found that the chance of recovering DNA from an outdoor crime scene decreases significantly over time with two weeks showing a significant drop in alleles detected for most of the samples. The control samples fared much better, with full profiles able to be developed even after six weeks (the longest time peri- od tested). This study also provided a table of results obtained from actu- al touch DNA casework samples and included the time between the offense and the collection of the evidence. Great variability existed; however, it is interesting to note that two of the three evidence items with greater than 50 days between offense and collection yielded DNA profiles. One additional study dealing with direct amplification of touch DNA samples briefly discusses the stability of touch DNA on fabrics. Volunteers rubbed their thumb and forefinger between a sample of fabric for 5 seconds. The fabric samples were left exposed to light on a window ledge and then subjected to direct amplification. Nearly complete PowerPlex 16 profiles were able to be generated from touch DNA on acrylic, nylon, and polyester for up to 36 days after transfer.14 To assess whether it is possible that a touch DNA profile could have been left behind at a time prior to the alleged incident, it is impor- tant to gather as much information as possible. What is the item of evi- dence? Rough objects would be expected to collect more skin cell DNA as compared to smooth items. Does the item have cracks, crevices, or grooves where skin cell DNA might collect and be somewhat protected? An example might be a gun grip, buttons on a cell phone, or a computer keyboard. Was the item indoors (DNA expected to last longer), or was it outside exposed to the elements (heat, humidity, water, UV light, and bacterial growth all degrade DNA)? Was the item an object that may have been touched by many people (bank door handles, etc.) or only by very few (a weapon or a car steering wheel, for example)? It is impossible, however, to put an exact timeline on how long touch DNA evidence, or any biological evidence for that matter, might last. It is clear that addi- tional studies are needed in order to help answer the questions regarding the persistence of touch DNA evidence that are often asked by investi- gators and attorneys alike. Is it possible to tell who handled an item last or most? Due to the variable nature of DNA transfer, it is generally not possible to determine who might have handled an item last or most. For example, just because one person’s DNA profile is more prevalent on an item like a cell phone, does not necessarily mean that they must have handled the phone last. In addition, it does not mean that the phone must be theirs because more of their DNA is present. It could simply mean that one of the factors that tend to increase the amount of DNA transferred (as dis- cussed above) is in play. In fact, three studies have discussed instances wherein the person who touched an object transferred someone else’s DNA to the object.4,10,16 What sort of items might possibly contain touch DNA? The sky is the limit as almost any item might conceivably contain touch DNA evidence. The key is to focus on those items that were most likely to be touched given a particular crime event. In addition, it is important to select items that have not been handled by multiple individuals as the DNA results may be uninterpretable due to the complex mixtures of DNA likely to be obtained. Investigators and analysts must use their experience and their common sense in order to choose the most useful and probative items to test for touch DNA. References can be found online at www.forensicmag.com/ article/touch-dna-analysis-using-literature-help-answer-some- common-questions. Suzanna R. Ryan, MS, D-ABC is an owner/consultant with Ryan Forensic DNA Consulting in Carlsbad, CA. Ms. Ryan is a former DNA analyst and technical leader with over 13 years of experience in both public and private DNA laboratories. sryan@ryanforensicdna.com JUNE I JULY 2012 Forensic Magazine I www.forensicmag.com 33 Item of Evidence Type of case Firearms, knife handles, weapon handles Any Fired casing Any Steering wheel and other vehicle swabs Carjacking, etc. Fingerprints on victim Any Ligatures, hand cuffs, shoestrings Strangulation, kidnapping, rape, etc. Hand swabs from suspects Strangulation, rape Face swabs from child victims (slapping, hitting) Child abuse Swabs from limbs removed from animal carcasses Poaching Cell phone swabs Robbery, etc. Victim neck swabs Strangulation Swabs from torn or forcibly removed clothing Rape, assault Airbag DUI cases and others Tools Burglary Baggies Drug possession Paper demand notes Bank robberies Clothing items, hats, masks, gloves, glasses Any Table 2: This is a short list, by no means comprehensive, of some items that may be swabbed and submitted to the crime lab for touch DNA analysis:
  • 34. To register, learn more or submit an abstract visit: ishinews.com Join more than 800 forensic scientists from around the globe to explore and discuss the latest research, technologies and ethical issues in forensic DNA today. Submit your abstract now! Oral abstract deadline is June 11th
  • 35. NUCLEIC ACID EXTRACTION The Maxwell® 16 Forensic System is a compact, plug and play instrument that extracts high quality DNA from up to 16 samples in about 30 minutes. Optimized reagents and protocols are backed by service and support, giving you the confidence to focus on performing and analyzing STR assays. Promega Corporation www.promega.com PCR STRIPS Each tube of the 8-strip PCR Multiply®-μStrip PCR tubes now features a molded number for easy identification and tracking, and the connecting bridges between tubes have been reinforced. The corresponding lid strip is an optically clear, flat version appropriate for real-time and standard PCR applications. When used together, the tube and cap strips provide a leak-resistant seal to minimize sample loss. Sarstedt, Inc. www.sarstedt.com AUTOMATED FT-IR MICROSCOPE LUMOSisastand-aloneFT-IRmicroscopewithfullautomation.Itisdesignedtocombineperform- anceforvisibleinspectionandinfraredspectralanalysiswithusercomfort.Duetothemotorization ofallmoveablecomponentsinsidetheLUMOS,thesystemprovidesahighdegreeofautomation. Theintuitivesoftwareguidestheoperatorstepbystepthroughtheprocessofdataacquisition. Bruker Optics www.brukeroptics.com AUTOMATED LIQUID HANDLING The new VERSA™ 10 Automated Liquid Handling Workstation has been developed to simplifylaboriousroutineprotocolsbycombiningautomatedmulti-channeldispensing(4 or 8 channels), with single-channel, cherry-picking functionality. The customizable sys- tem set-up, and optional deck modules allow users to automate a range of applications such as PCR/qPCR plate formatting, sequence reaction set-up, enzymatic modifications, and general liquid handling. Aurora Instruments Ltd. www.aurora-instr.com JUNE I JULY 2012 www.forensicmag.com I Forensic Magazine 35 DUCTLESS FUME HOOD The Aura® ductless chemical fume hoods provide advanced safety monitoring and controls. EverSafe II™ microprocessor safety controller monitors and adjusts fume hood face velocity to theuserpresetvalue.AurahasbeenASHRAE110testedandprovidescontainmentfromtoxic fumes and vapors. Aura ductless fume hoods are available in 30, 42, and 54 inch widths. Mystaire Inc. www.mystaire.com
  • 36. FINGERPRINT PATTERNSTo comprehend why friction skin is unique, one must look at biological uniqueness 3 MAIN CATEGORIES ARCHES Arches are the least common of the three general patterns and are subdivided into two distinctive groups. LOOPS WHORLS The second most common of the three general patterns are Whorls. Whorls are subdivided into 4 distinct groups. Occurs in only 5% of the population Occurs in 60-65% of the population Occurs in 30-35% of the population FREQUENCY OF EACH PRINT TYPE LOOP TYPE ULNAR 94% RADIAL 6% ARCH TYPE PLAIN 60% TENTED 40% WHORL TYPE PLAIN 71% DOUBLE LOOP 13% ACCIDENTAL 3% CENTRAL POCKET LOOP 13% PRINT TYPE ARCHES 5% LOOPS 60-65% WHORLS 30-35% A L W TP U R ACPLDLP The most common of the three general patterns are Loops. You will see both right and left loops. FRICTION RIDGE DEFINED TTERAATPATTERNSe must look at biolog of the population Occurs in only 5% o comprehend why friction skin is unique, one must look at biological uniqueness of the population Occurs in only 5% of the population Occurs in 60-65% of the population of the population Occurs in 60-65% of the population groups. are subdiv s a are subdivided into 4 distinct are Whorls. Whorls of the population Occurs in 30-35% of the population Occurs in 30-35% FREQUENCY groups. OF EACH PRINTFREQUENCY A ARCHES 5% TYPEPRINT TYPEOF EACH PRINT L LOOPS 60-65% W WHORLS 30-35%LOOPS 60-65% WHORL ULNAR 94% TYPELOOP PLAIN 60% TYPEARCH PLAIN 71% TYPEWHORL U P TENTED 40% P POCENTRALL DOUBLE LOOP 6%RADIAL T TENTED 40% CPLDL 13%LOOPOCKETT 3%ALLACCIDENTTA13%DOUBLE LOOP A R FRICTION RIDGE DEFINEDFRICTION RIDGE DEFINEDFRICTION RIDGE DEFINED
  • 37. WHORL TYPES Plain Whorl One or more ridges form a complete circle-like pattern around the center *These often look like a Double Loop Whorl Two separate loops are present in one impression *These often look like the Central Pocket Loop Whorl Ridges form a loop pattern which go around the circle-like pattern in the center *These often look like a Accidental Whorl A mixture of two different types of patters * LOOP TYPES Ulnar Loop side, loop around and exit toward *These often look like a lake Radial Loop Ridges enter from the thumb side, loop around and exit toward the thumb *These often look like a lake ARCH TYPES Plain Arch Ridges enter the impression, rise in the center, and exit the oppo- site side of the impression * Tented Arch Ridges enter the impression, spike upwards in the center, and exit the opposite side of the impression * SUB CATEGORIES WHICH PATTERN DO YOU HAVE? TYPESARCH TEGSUB CAATTEGORIES TYPESLOOP TYPES ArchentedTTe * site side of the impression , and exit the oppoin the center Ridges enter the impression, rise ArchPlain TYPESARCH site side of the impression -, and exit the oppo Ridges enter the impression, rise Radial Loop These often look like a lake* side, loop around and exit toward Ulnar Loop TYPESLOOP Radial Loop These often look like a lake side, loop around and exit toward TYPES * impression and exit the opposite side of the spike upwards in the center Ridges enter the impression, ArchentedTTe and exit the opposite side of the ,spike upwards in the center Ridges enter the impression, These often look like a lake* the thumb side, loop around and exit toward Ridges enter from the thumb Radial Loop These often look like a lake side, loop around and exit toward Ridges enter from the thumb Radial Loop around the center complete circle-like pattern One or more ridges form a Plain Whorl TYPESWHORL complete circle-like pattern One or more ridges form a TYPES These often look like the* in one impression wo separate loops are presentT Double Loop Whorl These often look like a* around the center These often look like the wo separate loops are present Double Loop Whorl These often look like a WHICH TAPPAHICH
  • 38. Get Ready for Rapid DNA Booth 500 Bruce Jamieson RapidHIT Senior Director of Sales Get ReadyGet Ready Rapid DNAforyy Rapid DNARapid DNAGet ReadyGet Ready Rapid DNAforyy Rapid DNARapid DNA oduct specifications may change.Pr trademarks of IntegenX Inc. All other brands and names ar Copyright © 2012 IntegenX Inc. All rights r oduct specifications may change. trademarks of IntegenX Inc. All other brands and names ar eserved. Patents pending. IntegenX and RapidHIT arCopyright © 2012 IntegenX Inc. All rights r espective owners.operty of their re the sole prtrademarks of IntegenX Inc. All other brands and names ar eeserved. Patents pending. IntegenX and RapidHIT ar espective owners.
  • 39. No, we are not talking about a new state lottery. We are talking about Lockout/Tagout, the process by which equipment is put into a safe condi- tion so repairs or maintenance can take place. Forensic crime laboratories are becoming more automated and complex every year. Sophisticated equipment such as automated pipetting systems, evidence drying cabi- nets, fuming chambers, centrifuges, and ultra-low temperature freezers are commonplace necessities. As our facilities become more efficient and complex, we must stay alert to the intrinsic dangers. Although considered necessary mostly in large manufacturing and production plants, Lockout/Tagout is needed whenever equipment needs servicing, which is everywhere. Lockout/Tagout measures are taken to prevent the release of unwanted or stored hazardous energy. Failure to fol- low good Lockout/Tagout procedures often results in some of the most gruesome and often fatal accidents encountered in the workplace. Keep reading to learn how you can design and implement a successful Lockout/Tagout program for your facility. When thinking about why Lockout/Tagout is important, one televi- sion commercial comes to mind. Remember the one where the handy- man husband has just finished installing a new garbage disposal under the kitchen sink but dropped something into it. As he is trying to fish it out with his arm inserted up to the elbow his wife enters the kitchen, goes to turn on the light and asks which switch to flip. Now, being a capable electrician and handyman at home, would you want to bet your arm on which switch to flip? During the period 1982–1997 NIOSH (National Institute for Occupational Safety and Health) found that 82% of fatal incidents involving maintenance or repair to equipment resulted from a failure to completely isolate or dissipate the energy source.1 In addition, a short four years between 1992–1996 saw accidents from being caught in machinery kill almost 750 workers while another 5,000 lost limbs from amputation.2 Sadly, every one of these could have been easily prevented. By imple- menting a good Lockout/Tagout program you will ensure that your facili- ty does not experience an ugly accident or worse. What is Lockout/Tagout? Lockout/Tagoutisaseriesofstepstakenbyemployeestoisolate,dissipate,or otherwise prevent unexpected start up or energizing of equipment that could cause injury. The premise is simple and straightforward; however, detailed planning and intimate knowledge of the equipment is para- mount for implementation. For example, say a centrifuge needs servic- ing. Before the maintenance employee can begin work, he must make sure the equipment can not be turned on by tripping the circuit breaker and then placing a lock on the switch so someone else does not ener- gize the unit while it is being serviced. It may be as simple as pulling the plug, but many large items are hard-wired and it may not be this simple. In addition, there may be other dangers, such as stored energy. Different Types of Hazardous Energy A good Lockout/Tagout program is exhaustive and meticulously detailed. Autoclaves, centrifuges, and other automated equipment are capable of injuring employees in numerous ways. This is because there are several forms of hazardous energy. • Electrical energy is most common yet still the cause of many injuries. Often overlooked are electrical storage devices such as batteries and capacitors. • Thermal energy, either high temperature (e.g. steam) or low (e.g. liquid nitrogen) is also easily recognized. Mechanical work, chemical reactions, electrical resistance, and radiation can also produce thermal energy. • Potential energy is energy stored in pressure vessels (e.g. com- pressed gas cylinders), hydraulic systems and pneumatic systems, and mechanical devices (e.g. springs). • Kinetic energy is associated with moving mechanical parts usu- ally resulting from the release of potential energy. Most automated equipment will contain more than one form of hazardous energy. Thus, a thorough understanding of its operation and a detailed Lockout/Tagout procedure is needed. OSHA Requirements TheOSHAstandardforthecontrolofhazardousenergy,29CFR1910.147, coversservicingandmaintenanceofmachinesandequipmentwhereacci- dentalstartuporreleaseofstoredenergycanharmworkers.Itrequires employerstoestablishaprogramanduseprocedurestolockoutortagout energysources,andtootherwisedisablemachinesorequipmenttoprevent injurytoemployees.Thefirststepis to develop a written program docu- menting the techniques and devices to be used, authorizing personnel, describing the training, and providing for program evaluation and com- pliance. Next, identify equipment in your facility that must follow LOTO and designate them with proper warning signs. Keep in mind that employers must provide needed Lockout/Tagout devices to trained and authorized personnel. Lockout is the placing of a lock to hold an energy isolating device in JUNE I JULY 2012 Forensic Magazine I www.forensicmag.com 39 Vince McLeod, CIH Safetyguys the Winning with LOTO
  • 40. 40 Forensic Magazine I www.forensicmag.com JUNE I JULY 2012 the safe position. Tagout is the use of a prominent warning device, such as a tag and a means of attachment, which can be securely fastened to an ener- gy isolating device. OSHA mandates that lockout take precedence over tagout. Tagout is only allowed where equipment is not capable of being locked out. Tags may evoke a false sense of security, and employees must understand their meaning. Tags are essentially warning devices affixed to energy isolating devices, and do not provide the physical restraint that is provided by a lock. The cardinal rule is “one lock, one key” to prevent inadvertent removal by another employee. Clearly label each lock with durable tags to identify the worker assigned to the lock. In general, the worker who installs a lock is the one who removes it after all work has been completed. The written program should have procedures on how to deal with maintenance or service that spans shift changes, special situations, and other absences. The final check before beginning work is to verify that all energy sources for the equipment are de-energized. For instance, the employee should try to start up the equipment and test that all forms of hazardous energy have been bled down, relieved, disconnected, restrained, and other- wise rendered safe. After the maintenance or repair is complete, a reversal of the Lockout/Tagout procedures will ensure a safe start up. Perform a final inspection to confirm that all tools and nonessential items have been removed and that the equipment components are properly installed. Make sure all affected employees are safely positioned and clear of potential dan- ger zones. Finally, remove the Lockout/Tagout devices and notify affected employees of the removal and that start up will commence. A successful Lockout/Tagout programreliesongoodtraining.Regularly evaluatetheprogramandcheckthatproperproceduresarebeingfollowed. Retrainemployeeswhenevertherearechangestojobassignmentsornew equipmentorenergycontroldevicesareinstalled.Inaddition,ifyouobserve inadequaciesintheemployees’knowledgeoruseoftheenergycontrolproce- duresthenretrainingisnecessary. TheSafetyGuyswelcomeyourcommentsandquestions.Youcane- mailthemtothesafetyguys@forensicmag.com.Untilnexttime“StayAlert” andremember“SafetyFirst!” References 1. “Preventing Worker Deaths from Uncontrolled Release of Electrical, Mechanical, and Other Types of Hazardous Energy,” National Institute for Occupational Safety and Health, Center of Disease Control. Atlanta, GA. NIOSH publication 99-110, August 1999. http://www.cdc.gov/niosh/docs/99-110/ 2. “Worker Fatalities from being Caught in Machinery,” Windau, Janice A. Compensation and Working Conditions, Winter 1998: 35-38. 3. “The control of hazardous energy,” Occupational Safety and Health Administration, US Department of Labor. Washington D.C. 29CFR1910.147. May 2011 (http://www.osha.gov/pls/oshaweb/ owadisp.show_document?p_table=STANDARDS&p_id=9804) Vince McLeodisanAmericanBoardofIndustrialHygieneCertified IndustrialHygienistandtheseniorIHwiththeUniversityofFlorida’s EnvironmentalHealthandSafetyDivision.Hehas24yearsofexperienceinall facetsofoccupationalhealthandsafetyandspecializesinconductingexposure assessmentsandhealthhazardevaluations.
  • 41. Increasingly more evidence is being collected from crime scenes. Often by legal mandate, forensic laborato- ries are required to store more evidence for longer peri- ods of time, sometimes indefinitely. Other items of reference, be it weapons or slides, require more and more room. Space constraints, always one of the major issues in labs, continue to worsen. What options exist to better store items that not only provide more storage but also provide an economy of space? Depending on what is being stored there are a number of products to help facilitate that need. High density storage is one such product that allows for the more efficient use of space than standard shelv- ing. Fixed shelving requires a large amount of circula- tion space to access items. High density storage captures this lost space by compressing shelving units together. The shelves are mounted on a rail system with one cir- culation space. Either manually or with electronic con- trols, the shelves are moved along the rails to reposition this circulation space allowing access to the shelf you need. The advantage of high density storage is clear; you can fit far more high density shelves in the same area as standard fixed shelves. Individual high density shelving units can be customized for specific needs. Common forensic examples would be weapons rests or barrel pegs for a weapons reference collec- tion or small shelving specifi- cally sized to store histology slides. There are some disadvan- tages to high density storage. High density systems are more expensive than standard shelves. Because of the com- pressed nature of the shelves, only one shelf can be accessed at a time. This requires coordi- nation if multiple people want to access evidence at the same time in different areas of the system. There are also special considerations for accom- modating the rails on which the high density storage system travels. Because these rails are a few inches high, adding high density storage to an existing room may require ramps to access the system. If high density stor- age is incorporated during new construction or renova- tion it is important to plan for recessed areas in the concrete for rail placement. Another space-saving shelf alternative is vertical carousel storage. Vertical carousel storage is a computer- ized system which stores files, books, or anything that is generally of a uniform size in vertical storage. The sys- tem assigns each item in storage with an identifier which allows it to electronically retrieve the item, rotat- ing the storage unit until the item in question is at the access port. The major advantage of vertical carousel storage is its ability to use the entire floor to ceiling space of its footprint, greatly increasing the amount of items that can be stored. This allows any size user to readily access items stored in the vertical carousel without having to either stoop or use a ladder. Also of note, because it is a computerized system, the system can generate a record of access to the items in storage. The disadvantages of vertical carousel storage are similar to that of high density storage. It is more expen- sive than standard shelving. It too can create a bottleneck in accessing evidence, as only one or two persons can access the system at once. Vertical carousel storage is designed for smaller items which are of unified size, such as histology slide con- tainers, but cannot house larger items. Because each item in the carousel has an identifier, upfront work is required to label each item in order to work with the sys- Answers to Facility Issues JUNE I JULY 2011 Forensic Magazine I www.forensicmag.com 41 LaboratoryStorage Solutions: EfficientSolutionstotheEverPresentIssueofStuff Mostwanted Susan Halla and Cy Henningsen Figure 1: High Density Storage
  • 42. tem. Specialized containers may also be necessary in order to provide a standardized storage size for use within the system. Evidence lockers are focused more toward maintain- ing chain of custody than providing efficient storage space. However, even evidence lockers can be used more effi- ciently by the addition of electronic controls. Evidence storage lockers are generally provided in different sizes and configurations, some sized for small items such as DNA kits, some tall and narrow for items such as long arms, and some larger units for the storage of bulky items. Tradition- ally a certain number of lockers of each size were specifi- cally assigned to each investigator. On any given day, an investigator might have all bulky items from a crime scene and not have enough lockers of an appropriate size, while another investigator might not need all of his or her lock- ers, but there has been no effective way to share space while providing running proof of chain-of-custody. Computerized sys- tems can track which lockers are in use and which are open. An authorized user can access the computer system, identify which locker size they need, check out an available locker, and then place evidence in the avail- able locker. That lock- er is then locked and can only be opened by that investigator or an evidence system administrator. The system logs all access to the lockers so that chain-of-custody can be proven. Because the computer system controlling the lockers indicates which lockers are available, there are fewer rea- sons to permanently assign a certain block of lockers to an investigator. This can allow a department to get by with fewer lockers; or support additional staff with the same number of manually controlled lockers. Additionally, lock- ers can often be controlled with proximity cards in lieu of keys, allowing for key cards to be decommissioned easily or reassigned as staff changes and relieves the issue of losing valuable keys. As with the other options presented, additional cost is one thing to consider when evaluating the introduction of computer controlled evidence lockers. While electronic control systems may be added to existing lock- ers, power and storage for the control system components is required for installation and would be an additional cost either as a retrofit or in new construction. As Benjamin Franklin noted, “…in this world nothing can be said to be certain, except death and taxes.” Appending this quote to add “storage” seems appropriate to the way in which forensic facili- ties must operate. It is assured that storage requirements will con- tinue to grow and finding smart ways to manage storage by more efficiently and effectively using the space available is a necessity. Susan Halla (susanh@crimelabdesign.com) is a Project Leader and Senior Forensic Planner with Crime Lab Design which provides full architectural and engineering services for forensic and medical examiner facilities worldwide. Cy Henningsen (cyh@crimelabdesign.com) is an Equipment Coordinator with Crime Lab Design. www.crimelabdesign.com 42 Forensic Magazine I www.forensicmag.com JUNE I JULY 2011 Figure 2: Inside an evidence locker Figure 3: Run of evidence lockers Figure 4: Vertical Carousel Storage