Verified Document

Forensics Residing In A City Research Proposal

The DNA and fingerprints matched to a particular suspect would provide verification that the suspect had handled the gun. It would also rule out any other suspects if no other DNA or fingerprints were found on the weapon. Last but not least would be any traces of blood found on the suspects clothing. Blood evidence is very powerful evidence since current technology allows for establishing identities through the analysis of blood that is very effective. George Schiro, a forensic scientist with the Louisiana State Police Crime Laboratory writes, "a blood source can now be statistically narrowed down to one person out of several million or even several billion" (Schiro). Most importantly, according to Schiro, blood evidence can eliminate prospective suspects while providing strong evidence in regards to establishing identities of other suspects. All four of the above mentioned evidence types can provide helpful evidence for the prosecutor(s) and often times are direct links to the defendant in regards to establishing crime scene scenarios and what took place during the particular event. Concerning the case example used in this paper, the ballistics of the weapon showed that it was the weapon used during the murder, fingerprints (though no DNA) were found on the weapon that helped to establish the identity of the shooter, and blood spatters on the defendant's shoes were analyzed and it was determined that those blood spatters were from the victim. The suspect was identified by the fingerprint results, while the blood spatters tied him to the victim, and the ballistics tied the defendant to the weapon used during the crime. Profiling the victim and the accused showed enmity between them and the gangs that provided motive for the killing. Once the motive was established, the forensic investigator was allowed the opportunity...

Since it was already determined that the victim was a member of a gang, and that the defendant knew and had had frequent contact with the victim and was a member of a rival gang, the investigator had to use the physical evidence, technological advantages and deductive reasoning to determine exactly what happened. The evidence provided a series of relationships that assisted in that determination. The blood spatters found on the defendant's clothing showed that the defendant was in close proximity to the victim when he was bleeding. The fingerprints on the gun provided evidence that the gun was used in the killing, and the proximity of the gun to the victim showed that the defendant had (at the least) been in the same area as the victim within a certain time frame.
Deductive reasoning assisted the investigator in establishing the fact that the defendant had shot the victim. When confronted with the overwhelming evidence, the defendant confessed, and the crime was solved.

References

Kaasa, S.O.; Peterson, T.; Morris, E.K.; Thompson, W.C.; (2006) Statistical inference and forensic evidence: Evaluating a bullet lead match, Law & Human Behavior, Vol. 31, pp. 433-437

Noble, a.A.; (2006) Introduction: DNA fingerprinting and civil liberties, Journal of Law, Medicine & Ethics, Vol. 34, No. 2, pp. 149-152

Pollman, C.; (2004) Suspect identities, the British Journal of Criminology, Vol. 44, No. 2, pg. 297-300

Schiro, G.; (1999) Collection and Preservation of Blood Evidence from Crime Scenes, http://www.crime-scene-investigator.net/blood.html, Accessed March 8, 2009

Sources used in this document:
References

Kaasa, S.O.; Peterson, T.; Morris, E.K.; Thompson, W.C.; (2006) Statistical inference and forensic evidence: Evaluating a bullet lead match, Law & Human Behavior, Vol. 31, pp. 433-437

Noble, a.A.; (2006) Introduction: DNA fingerprinting and civil liberties, Journal of Law, Medicine & Ethics, Vol. 34, No. 2, pp. 149-152

Pollman, C.; (2004) Suspect identities, the British Journal of Criminology, Vol. 44, No. 2, pg. 297-300

Schiro, G.; (1999) Collection and Preservation of Blood Evidence from Crime Scenes, http://www.crime-scene-investigator.net/blood.html, Accessed March 8, 2009
Cite this Document:
Copy Bibliography Citation

Related Documents

Jeffery Dahmer
Words: 2674 Length: 8 Document Type: Research Paper

Dahmer Forensic Analysis Jeffrey Lionel Dahmer Crime Scene and Discovery Never before has egregious police incompetence hindered the apprehension of a serial killer as in the case of Jeffrey Dahmer. When police were called to investigate an alleged domestic disturbance between Konerak Sinthasomophone and Jeffrey Dahmer on May 27, 1991. Although two women came to the aide of Sinthasomophone and urged police to look further into the alleged dispute, the police ignored their

Search Warrant Request Probable Cause
Words: 895 Length: 2 Document Type: Research Paper

This is true because of the following: Computer storage devices (hard disks, diskettes, tape, and removable drives) can store the equivalent of thousands or millions of pages of information. When users desire to conceal criminal evidence, they often store the information in random order with deceptive file names. Directories and subdirectories that contain these files can also be electronically hidden from normal view. Special forensic software is required to

Washington D.C. Police Department Washington D.C. Metropolitan
Words: 2006 Length: 7 Document Type: Essay

Washington D.C. Police Department Washington D.C. Metropolitan Police Department Washington D.C. is the nation's capital, and thus holds a special responsibility in terms of providing the ultimate image of safety and enforcement of American ideals. The Metropolitan Police Department of Washington D.C. is in charge of keeping that esteemed community safe. Today, the department is in the top ten largest police organizations throughout the country (Metropolitan Police Department 2012). Being "founded in

Threatening Email the Law Enforcement
Words: 2058 Length: 6 Document Type: Research Paper

This is why computer evidence -- such as the email itself -- cannot outweigh the underlying crime. What is being investigated is a threat against human life. While investigating this threatening email and Westfall (the main suspect), it is important for the investigator to heed the law; suspects still have all the legal rights and protections afforded them per the United States Constitution (Reyes & Brittson 2007). "Reading emails, intercepting

Insurance Fraud
Words: 11287 Length: 35 Document Type: Term Paper

Insurance Fraud After tax evasion, insurance fraud is considered the highest-ranked among white-collar crimes. The original concept of insurance, as a for-profit endeavor, was to collect funds from a large number of people to pay for damages and accidents that involved a small percentage of the population that paid premiums. Insurance fraud is an ever-growing problem. Solving or eliminating this problem requires the resources and knowledge of individuals or associations with

Police Reform in Post Authoritarian Brazil
Words: 12011 Length: 35 Document Type: Thesis

Police Reform in Post-Authoritarian Brazil A majority of new democracies entail an unbelievable illogicality of an immensely feeble citizenship coalesced with a stern description of the constitutional guarantees. In order to explicate this disparity it would be prudent to contemplate the significance of political institutions regarding representation of citizen, which were prevalent subsequent to the military establishments attributed as troublesome and a majority of the new restrictions. A few defined in

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now