9,905 research outputs found

    The effects of zinc sulfate on ethyl glucuronide immunoassay urine testing

    Full text link
    Published research in the Journal of Analytical Toxicology and the American Society for Clinical Pathology has confirmed that the presence of Zinc Sulfate in adulterated urine samples can influence the testing results using EMIT and ELISA immunoassay testing when testing for Cannabinoids (THC), Cocaine (Benzoylecgonine), Methamphetamines, Opiates (Morphine, Methadone, and Propoxyphene), Phencyclidine (PCP), and Ethanol (Alcohol Dehydrogenase). This research included adding Zinc Sulfate directly to urine samples. In 2006, the Substance Abuse and Mental Health Service Administration (SAMHSA) released an advisory that the use of Ethyl glucuronide (EtG) as a new biomarker as an indicator for the past-use of alcohol was promising and warranted more research. Ethyl glucuronide is a direct metabolite of the biotransformation of ethanol in the human body. This compound is excreted in urine and can be used as a specific biomarker for the ingestion of alcohol. Because EtG is only produced when ethanol is metabolized, there are no false positives due to fermentation and a much longer detection window exists for its detection. Scientific literature states that EtG can be present in urine long after ethanol has been eliminated. Testing for EtG is commonly referred to as the “80 hour test” for the ability of EtG to be measured up to 80 hours after consuming alcohol. It was hypothesized that if the presence of Zinc Sulfate added to urine falsely reduced urine alcohol level when measuring for Alcohol Dehydrogenase enzyme, will the presence of Zinc Sulfate added to SurineTM falsely reduce the urine alcohol level when measuring for EtG? Since it is very likely that EtG would still be present in the body after ethanol has been eliminated, samples contained either no ethanol or 5% (5g/dL) of ethanol. Samples were spiked at 10mg/mL, 15mg/mL or contained 0mg/mL of Zinc Sulfate. Additionally, duration testing was conducted to see if there was any observed differences between testing the samples fresh and then after a one week duration in a refrigerator and brought to room temperature prior to testing. Two different immunoassay EtG tests were used to perform the analysis. It was concluded that Zinc Sulfate directly added to the sample affected one of the immunoassay test regardless of whether EtG or ethanol were present, by fading the Test and Control regions. Additionally, it is concluded that SurineTM samples containing Zinc Sulfate could easily be distinguished from samples free of Zinc Sulfate because of the presence of a white cloudy precipitate

    Applying psychological science to the CCTV review process: a review of cognitive and ergonomic literature

    Get PDF
    As CCTV cameras are used more and more often to increase security in communities, police are spending a larger proportion of their resources, including time, in processing CCTV images when investigating crimes that have occurred (Levesley & Martin, 2005; Nichols, 2001). As with all tasks, there are ways to approach this task that will facilitate performance and other approaches that will degrade performance, either by increasing errors or by unnecessarily prolonging the process. A clearer understanding of psychological factors influencing the effectiveness of footage review will facilitate future training in best practice with respect to the review of CCTV footage. The goal of this report is to provide such understanding by reviewing research on footage review, research on related tasks that require similar skills, and experimental laboratory research about the cognitive skills underpinning the task. The report is organised to address five challenges to effectiveness of CCTV review: the effects of the degraded nature of CCTV footage, distractions and interrupts, the length of the task, inappropriate mindset, and variability in people’s abilities and experience. Recommendations for optimising CCTV footage review include (1) doing a cognitive task analysis to increase understanding of the ways in which performance might be limited, (2) exploiting technology advances to maximise the perceptual quality of the footage (3) training people to improve the flexibility of their mindset as they perceive and interpret the images seen, (4) monitoring performance either on an ongoing basis, by using psychophysiological measures of alertness, or periodically, by testing screeners’ ability to find evidence in footage developed for such testing, and (5) evaluating the relevance of possible selection tests to screen effective from ineffective screener

    Computer Forensics Field Triage Process Model

    Get PDF
    With the proliferation of digital based evidence, the need for the timely identification, analysis and interpretation of digital evidence is becoming more crucial. In many investigations critical information is required while at the scene or within a short period of time - measured in hours as opposed to days. The traditional cyber forensics approach of seizing a system(s)/media, transporting it to the lab, making a forensic image(s), and then searching the entire system for potential evidence, is no longer appropriate in some circumstances. In cases such as child abductions, pedophiles, missing or exploited persons, time is of the essence. In these types of cases, investigators dealing with the suspect or crime scene need investigative leads quickly; in some cases it is the difference between life and death for the victim(s). The Cyber Forensic Field Triage Process Model (CFFTPM) proposes an onsite or field approach for providing the identification, analysis and interpretation of digital evidence in a short time frame, without the requirement of having to take the system(s)/media back to the lab for an in-depth examination or acquiring a complete forensic image(s). The proposed model adheres to commonly held forensic principles, and does not negate the ability that once the initial field triage is concluded, the system(s)/storage media be transported back to a lab environment for a more thorough examination and analysis. The CFFTPM has been successfully used in various real world cases, and its investigative importance and pragmatic approach has been amply demonstrated. Furthermore, the derived evidence from these cases has not been challenged in the court proceedings where it has been introduced. The current article describes the CFFTPM in detail, discusses the model’s forensic soundness, investigative support capabilities and practical considerations

    Paper Session II: Computer Forensics Field Triage Process Model

    Get PDF
    With the proliferation of digital based evidence, the need for the timely identification, analysis and interpretation of digital evidence is becoming more crucial. In many investigations critical information is required while at the scene or within a short period of time - measured in hours as opposed to days. The traditional cyber forensics approach of seizing a system(s)/media, transporting it to the lab, making a forensic image(s), and then searching the entire system for potential evidence, is no longer appropriate in some circumstances. In cases such as child abductions, pedophiles, missing or exploited persons, time is of the essence. In these types of cases, investigators dealing with the suspect or crime scene need investigative leads quickly; in some cases it is the difference between life and death for the victim(s). The Cyber Forensic Field Triage Process Model (CFFTPM) proposes an onsite or field approach for providing the identification, analysis and interpretation of digital evidence in a short time frame, without the requirement of having to take the system(s)/media back to the lab for an in-depth examination or acquiring a complete forensic image(s). The proposed model adheres to commonly held forensic principles, and does not negate the ability that once the initial field triage is concluded, he system(s)/storage media be transported back to a lab environment for a more thorough examination d analysis. The CFFTPM has been successfully used in various real world cases, and its investigative importance and pragmatic approach has been amply demonstrated. Furthermore, the derived evidence from these cases has not been challenged in the court proceedings where it has been introduced. The current article describes the CFFTPM in detail, discusses the model’s forensic soundness, investigative support capabilities and practical considerations

    Case Study: A New Method for Investigating Crimes Against Children

    Get PDF
    Investigations of crimes against children are often complex, both in terms of the varied and large amount of digital technology encountered and the offensive nature of the crimes. Such cases are numerous, large, and prioritised, requiring digital forensics competence. Earlier digital forensics was considered and treated as a typical forensic science like fingerprint analysis, performed in a laboratory isolated from the investigative team. This decoupled way of working has proved to be both inefficient and error prone. At the Digital Forensic Unit of Oslo Police District we have developed a new way of working that addresses many of the problems created by the earlier lack of integration. This method stresses a much closer co-operation between the digital and criminal investigators. We document this method and share our experiences, hoping to spur more discussion of specific methods for dealing with particular types of cases with a large digital component

    Understanding the lived experience of British non-offending paedophiles

    Get PDF
    © 2020, Emerald Publishing Limited. Purpose: Research into paedophilia mainly uses offender samples; thus, little is understood about non-offending paedophiles. The limited body of research has been conducted in North America or Europe whose health and legal systems differ from those in the UK. Using semi-structured interviews, the purpose of this study is to explore the experience of three non-offending British paedophilic males. Design/methodology/approach: The interview discussed their paedophilia, refraining from offending and perspectives on treatment initiatives. Data were analysed using interpretative phenomenological analysis. Findings: Three superordinate themes emerged: “paedophilia as more than a sexuality,” “acceptance leads to management” and “barriers to support.” These encapsulated how paedophilia was understood, how accepting one’s sexual attraction is tantamount to well-being and the various obstacles to providing support were discussed. Research limitations/implications: Acknowledging the sampling considerations (size and recruitment), the results implicate research into paedophilia. The onset of paedophilia was chronologically associated with typical sexual attraction, and not the result of sexual abuse as some theories suggest. Furthermore, the tenets of attraction to children extending beyond sexual desire were highlighted. Practically, the results influence future research into the area and highlight the dearth in our understanding of diverse behavioural management techniques (i.e. computerised images of children or human-like dolls). Originality/value: This paper presents novel insight into the aspects of paedophilia, excluding offensive behaviour and highlights the need for affordable, UK-based services targeted towards people with a paedophilic attraction to manage child sexual abuse preventatively and not reactively

    Rethinking affordance

    Get PDF
    n/a – Critical survey essay retheorising the concept of 'affordance' in digital media context. Lead article in a special issue on the topic, co-edited by the authors for the journal Media Theory

    Ransomware Incident Preparations With Ethical Considerations and Command System Framework Proposal

    Get PDF
    Concerns with cyber-attacks in the form of ransomware are on the mind of many executives and leadership staff in all industries. Inaction is not an option, and approaching the topic with real, honest, and hard discussions will be valuable ahead of such a possible devastating experience. This research note aims to bring thoughtfulness to the topics of ethics in the role of cybersecurity when dealing with ransomware events. Additionally, a proposed set of non-technical recovery preparation tasks are outlined to help organizations bring about cohesiveness and planning for dealing with the real potential of a ransomware event. Constraints from many factors come into focus during preparations for ransomware, and a method to categorize them is detailed. Finally, the use of Incident Command Systems is well known and documented in emergency management, and a proposed model for integrating this process for ransomware episodes is sketched

    Scavenging effects and scattering patterns on porcine carcasses in Eastern Massachusetts

    Full text link
    Forensic investigators encountering remains deposited in an outdoor environment face many obstacles, including the scavenging, scattering, and reconcentration of remains by local vertebrate fauna. Scattering rates can vary considerably from region to region, and are highly dependent on the indigenous scavengers present (Haglund et al. 1988; Haglund et al. 1989; Mann et al. 1990; Morton and Lord 2006). In turn, scavenger activity is highly dependent on seasonal changes, rainfall, temperature fluctuations, and environmental stressors such as seasonal resource availability and dietary changes (Brown et al. 2006; Mann et al. 1990; O’Brien et al. 2007). A more thorough knowledge of the variation in scavenging and scattering patterns of the indigenous fauna in different geographical regions would produce a more productive search pattern and increase the recovery rate of scattered remains for those involved in outdoor crime scene investigations. The current study followed and documented the behavior of the indigenous carnivorous birds and mammals, as well as the scattering patterns of these species, in Eastern Massachusetts, using five porcine (Sus scrofa) carcasses. Carcasses were deposited in lightly wooded environments under different depositional settings and tracked by low-light wildlife video cameras and radio transmitter tags attached to the long bones of some of the limbs. The major scavengers of decomposing remains were documented, and the distance and direction of scattered skeletal elements were noted, as well as any secondary depositions. This research was conducted in three phases; the first was a preliminary observation of faunal wildlife and their distribution during the early summer of 2011, followed by one 14-week observation of porcine models during midsummer of 2011 and one 6-week observation of porcine models during late summer and early fall of 2011. Results show that seasonality greatly affects scavenging activity, as carrion deposited in the summer are primarily consumed by the indigenous invertebrate community, causing accelerated decomposition and vertebrate scavenger exclusion. Additionally, though marsupials and avian species fed the longest, coyotes (Canis latrans) produced the most destructive dispersal of carrion. Moreover, although coyotes disarticulated carcasses relatively nearby the original deposition, they sought out outdoor environments that are mostly devoid of human activity to feed upon disarticulated assemblages
    • 

    corecore