SlideShare a Scribd company logo
Collection of Crime Scene Evidence Chapter 4
Crime Scene Evidence ,[object Object],[object Object],[object Object],[object Object],[object Object]
Forensic Science ,[object Object],[object Object],[object Object],[object Object]
Types of Physical Evidence ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Procedures for Collection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Procedures for Collection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Packaging ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Packaging ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Packaging ,[object Object],[object Object],[object Object],[object Object],[object Object]
Packaging ,[object Object],[object Object],[object Object],[object Object]
Packaging ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Chain of Custody ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Obtaining Reference Samples ,[object Object],[object Object],[object Object],[object Object],[object Object]
Submitting Evidence ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Crime Scene Safety ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Crime Scene Safety ,[object Object],[object Object],[object Object],[object Object]
Search and Seizure Protocols ,[object Object],[object Object]
Search and Seizure Protocols ,[object Object],[object Object],[object Object],[object Object],[object Object]
Search and Seizure Landmark Cases ,[object Object],[object Object],[object Object]

More Related Content

Viewers also liked

Computer forensics
Computer forensicsComputer forensics
Computer forensics
deaneal
 
Forensic Science Introduction
Forensic Science IntroductionForensic Science Introduction
Forensic Science Introduction
University of Southern Mississippi
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
prashant3535
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
Rajat Jain
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

Viewers also liked (7)

Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Forensic Science Introduction
Forensic Science IntroductionForensic Science Introduction
Forensic Science Introduction
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar to Fs Ch4

18.0 COLLECTION OF FORENSIC EVIDENCES_688c2aaeb09d3e72f4d5983a65c87f18.pptx
18.0 COLLECTION OF FORENSIC EVIDENCES_688c2aaeb09d3e72f4d5983a65c87f18.pptx18.0 COLLECTION OF FORENSIC EVIDENCES_688c2aaeb09d3e72f4d5983a65c87f18.pptx
18.0 COLLECTION OF FORENSIC EVIDENCES_688c2aaeb09d3e72f4d5983a65c87f18.pptx
KennyjrLMunisi
 
Day 1 london met at adp
Day 1  london met at adpDay 1  london met at adp
Day 1 london met at adpBashar Sasa
 
collection and packing of biological and firearm evidences
collection and packing of biological and firearm evidencescollection and packing of biological and firearm evidences
collection and packing of biological and firearm evidences
Sandeep Kumar Pathak
 
Criminalistics Unit 3
Criminalistics Unit 3Criminalistics Unit 3
Criminalistics Unit 3
Don Caeiro
 
1.-LEGAL-MEDICINE- BACHELOR OF SCIENCE IN CRIMnew.pdf
1.-LEGAL-MEDICINE- BACHELOR OF SCIENCE IN CRIMnew.pdf1.-LEGAL-MEDICINE- BACHELOR OF SCIENCE IN CRIMnew.pdf
1.-LEGAL-MEDICINE- BACHELOR OF SCIENCE IN CRIMnew.pdf
JemaicaCondesa
 
Forensics ch 3 notes
Forensics ch 3 notesForensics ch 3 notes
Forensics ch 3 notesLeah Morgan
 
Crime Scene Processing
Crime Scene ProcessingCrime Scene Processing
Crime Scene Processingwarren142
 
2018 Crime Scenes, Collection and Preservation of Evidence2.pptx
2018 Crime Scenes, Collection and Preservation of Evidence2.pptx2018 Crime Scenes, Collection and Preservation of Evidence2.pptx
2018 Crime Scenes, Collection and Preservation of Evidence2.pptx
dravidmishra1
 
Sample managemen tby kananika
Sample managemen tby kananikaSample managemen tby kananika
Sample managemen tby kananikaBruno Mmassy
 
Evidence collection & Preservation .pptx
Evidence collection & Preservation .pptxEvidence collection & Preservation .pptx
Evidence collection & Preservation .pptx
khushinidhaan
 
Concepts of Forensic Science for Lawyers
Concepts of Forensic Science for LawyersConcepts of Forensic Science for Lawyers
Concepts of Forensic Science for Lawyers
Prashant Mehta
 
Use of dna tech presentation
Use of dna tech presentationUse of dna tech presentation
Use of dna tech presentationBruno Mmassy
 
Collection Packaging and Forwarding of Physical Evidence.pptx
Collection Packaging and Forwarding of Physical Evidence.pptxCollection Packaging and Forwarding of Physical Evidence.pptx
Collection Packaging and Forwarding of Physical Evidence.pptx
PallaviKumari112
 

Similar to Fs Ch4 (20)

Fs Ch4
Fs Ch4Fs Ch4
Fs Ch4
 
18.0 COLLECTION OF FORENSIC EVIDENCES_688c2aaeb09d3e72f4d5983a65c87f18.pptx
18.0 COLLECTION OF FORENSIC EVIDENCES_688c2aaeb09d3e72f4d5983a65c87f18.pptx18.0 COLLECTION OF FORENSIC EVIDENCES_688c2aaeb09d3e72f4d5983a65c87f18.pptx
18.0 COLLECTION OF FORENSIC EVIDENCES_688c2aaeb09d3e72f4d5983a65c87f18.pptx
 
Day 1 london met at adp
Day 1  london met at adpDay 1  london met at adp
Day 1 london met at adp
 
collection and packing of biological and firearm evidences
collection and packing of biological and firearm evidencescollection and packing of biological and firearm evidences
collection and packing of biological and firearm evidences
 
Criminalistics Unit 3
Criminalistics Unit 3Criminalistics Unit 3
Criminalistics Unit 3
 
Fs Ch 5
Fs Ch 5Fs Ch 5
Fs Ch 5
 
Fs Ch 5
Fs Ch 5Fs Ch 5
Fs Ch 5
 
1.-LEGAL-MEDICINE- BACHELOR OF SCIENCE IN CRIMnew.pdf
1.-LEGAL-MEDICINE- BACHELOR OF SCIENCE IN CRIMnew.pdf1.-LEGAL-MEDICINE- BACHELOR OF SCIENCE IN CRIMnew.pdf
1.-LEGAL-MEDICINE- BACHELOR OF SCIENCE IN CRIMnew.pdf
 
Forensics ch 3 notes
Forensics ch 3 notesForensics ch 3 notes
Forensics ch 3 notes
 
Crime Scene Processing
Crime Scene ProcessingCrime Scene Processing
Crime Scene Processing
 
Dna theory 3
Dna theory 3Dna theory 3
Dna theory 3
 
2018 Crime Scenes, Collection and Preservation of Evidence2.pptx
2018 Crime Scenes, Collection and Preservation of Evidence2.pptx2018 Crime Scenes, Collection and Preservation of Evidence2.pptx
2018 Crime Scenes, Collection and Preservation of Evidence2.pptx
 
Sample managemen tby kananika
Sample managemen tby kananikaSample managemen tby kananika
Sample managemen tby kananika
 
Evidence collection & Preservation .pptx
Evidence collection & Preservation .pptxEvidence collection & Preservation .pptx
Evidence collection & Preservation .pptx
 
Fs Ch 5
Fs Ch 5Fs Ch 5
Fs Ch 5
 
Fs Ch 5
Fs Ch 5Fs Ch 5
Fs Ch 5
 
Concepts of Forensic Science for Lawyers
Concepts of Forensic Science for LawyersConcepts of Forensic Science for Lawyers
Concepts of Forensic Science for Lawyers
 
Use of dna tech presentation
Use of dna tech presentationUse of dna tech presentation
Use of dna tech presentation
 
Collection Packaging and Forwarding of Physical Evidence.pptx
Collection Packaging and Forwarding of Physical Evidence.pptxCollection Packaging and Forwarding of Physical Evidence.pptx
Collection Packaging and Forwarding of Physical Evidence.pptx
 
Crimescenebasics
CrimescenebasicsCrimescenebasics
Crimescenebasics
 

More from warren142 (20)

Ch 8 fingerprints
Ch 8 fingerprintsCh 8 fingerprints
Ch 8 fingerprints
 
Chapter02
Chapter02Chapter02
Chapter02
 
Ch 7
Ch 7Ch 7
Ch 7
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Ch 6
Ch 6Ch 6
Ch 6
 
Ch 6
Ch 6Ch 6
Ch 6
 
Ch 5
Ch 5Ch 5
Ch 5
 
Cj 101 ch 4
Cj 101 ch 4Cj 101 ch 4
Cj 101 ch 4
 
Criminal justice 101 ch 3
Criminal justice 101 ch 3Criminal justice 101 ch 3
Criminal justice 101 ch 3
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
Chapter 16
Chapter 16Chapter 16
Chapter 16
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Ch 14
Ch 14Ch 14
Ch 14
 
Ch 15
Ch 15Ch 15
Ch 15
 
Ch 15
Ch 15Ch 15
Ch 15
 
Ch 14
Ch 14Ch 14
Ch 14
 
Ch 13
Ch 13Ch 13
Ch 13
 
Chapter 9
Chapter 9Chapter 9
Chapter 9
 

Recently uploaded

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 

Recently uploaded (20)

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 

Fs Ch4

  • 1. Collection of Crime Scene Evidence Chapter 4
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.

Editor's Notes

  1. As automobiles run on gasoline, crime laboratories “run” on physical evidence. Physical evidence encompasses any and all objects that can establish that a crime has been committed or can provide a link between a crime and its victim or a crime and its perpetrator. But if physical evidence is to be used effectively for aiding the investigator, its presence first must be recognized at the crime scene.
  2. Forensic science begins at the crime scene. If the investigator cannot recognize physical evidence or cannot properly preserve it for laboratory examination, no amount of sophisticated laboratory instrumentation or technical expertise can salvage the situation. Here, investigators must recognize and properly preserve evidence for laboratory examination. It must be emphasized that the techniques of crime-scene investigation are not difficult to master and certainly lie within the bounds of comprehension of the average police officer
  3. Often, many items of evidence are clearly visible but others may be detected only through examination at the crime laboratory. For this reason, it is important to collect possible carriers of trace evidence, such as clothing, vacuum sweepings, and fingernail scrapings, in addition to more discernible items.
  4. Investigators handle and process physical evidence in a way that prevents changes to the evidence through contamination , breakage, evaporation, accidental scratching or bending, or through improper or careless packaging. The use of latex gloves, disposable forceps, and sanitized equipment reduces the chance for contamination. Whenever possible, one should keep evidence in its original condition as found at the crime scene
  5. Each different item or similar items collected at different locations must be placed in separate containers. Packaging evidence separately prevents damage through contact and prevents cross-contamination. The well-prepared evidence collector will arrive at a crime scene with a large assortment of packaging materials and tools ready to encounter any type of situation.
  6. Disposable forceps and similar tools may have to be used to pick up small items. Unbreakable plastic pill bottles with pressure lids are excellent containers for hairs, glass, fibers, and various other kinds of small or trace evidence. Alternatively, manila envelopes, screw-cap glass vials, or cardboard pillboxes are adequate containers for most trace evidence encountered at crime sites. Ordinary mailing envelopes should not be used as evidence containers because powders and fine particles will leak out of their corners.
  7. Small amounts of trace evidence can also be conveniently packaged in a carefully folded paper, using what is known as a “druggist fold.” Evidence from arson scenes should be packaged in airtight metal or glass containers to prevent the loss of accelerant vapors.
  8. If biological or bloodstained materials are stored in airtight containers, the accumulation of moisture may encourage the growth of mold, which can destroy the evidential value. In these instances, the material should be allowed to air-dry before being packaged in wrapping paper, manila envelopes, or paper bags.
  9. Contamination is a key concern during the collection of DNA-containing specimens such as blood, saliva, sweat or skin cells. Contamination can occur either by introducing foreign DNA through coughing or sneezing onto evidence or if items of evidence are incorrectly placed in contact with each other during packaging. To prevent contamination, the evidence collector must wear a face mask and use disposable latex gloves and disposable forceps when collecting evidence that may contain DNA
  10. Chain of Custody - a list of all persons who came into possession of an item of evidence . Continuity of possession, or the chain of custody, must be established whenever evidence is presented in court as an exhibit. Adherence to standard procedures in recording the location of evidence, marking it for identification, and properly completing evidence submission forms for laboratory analysis is critical to chain of custody. This means that every person who handled or examined the evidence and where it is at all times must be accounted for.
  11. Standard/Reference Sample —Physical evidence whose origin is known, such as blood or hair from a suspect, that can be compared to crime-scene evidence. The examination of evidence, whether it is soil, blood, glass, hair, fibers, and so on, often requires comparison with a known standard/reference sample. Although most investigators have little difficulty recognizing and collecting relevant crime-scene evidence, few seem aware of the necessity and importance of providing the crime lab with a thorough sampling of standard/reference materials.
  12. Evidence is usually submitted to the laboratory either by personal delivery or by mail shipment. Care must be taken in packaging evidence that will be sent by mail in order to prevent breakage or other accidental destruction during transit to the laboratory. Most laboratories require that an evidence submission form accompany all evidence submitted. Case information provided on this form enables the laboratory analyst to make an intelligent and complete examination of the evidence.
  13. Crime scenes: -biological specimens of unknown origin -no way of gauging health hazards -use caution and protection at all times -International Association for Identification Safety Committee that crime scene personnel wear a minimum of latex gloves (double gloved) and protective shoe covers. In cases of large contamination areas, coveralls are also recommended.
  14. The use of a particle mask/respirator, goggles, or face shield is recommended in addition to the minimum protective items when potentially infectious dust or mist are present. Personnel should be alert to sharp objects, knives, hypodermic syringes, razor blades, and similar items. Personnel should maintain a red biohazard plastic bag for the disposal of contaminated gloves, clothing, masks, pencils, wrapping paper, and so on.
  15. The removal of any evidence from a person or from the scene of a crime must be done in conformity with Fourth Amendment privileges: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizure, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”
  16. Supreme Court has determined that search and seizure without a court-approved warrant is justified in four cases: The existence of emergency circumstances The need to prevent the immediate loss or destruction of evidence A search of a person and property within the immediate control of the person provided it is made incident to a lawful arrest A search made by consent of the parties involved
  17. Mincey v. Arizona, the Court dealt with the legality of a four-day search at a homicide scene and determined that the evidence was illegally seized because a warrant was never issued and the circumstances of the case did not justify a warrantless search. In Michigan v. Tyler, fire destroyed a business establishment leased by Loren Tyler and a business partner. The court decided that evidence obtained from the initial search was legally seized, but evidence obtained from searches 4, 7, and 24 days after the incident were illegally seized. Chimel v CA: