loader image


Digital Forensic Training Program

Enroll Yourself Via This Form: https://forms.gle/xeBKRBKPgNJrqhAZA





Graphology|Signature and Handwriting Analysis

Handwriting Anaylsis - A Reflection of Personality

Handwriting analysis can be considered as one of the non-technical ways of knowing about an individual’s personality based on their way of writing. Like fingerprints, no 2 people can ever have the same handwriting. Handwriting can be of great help during personality analysis.

There are many factors which we take into consideration when we talk about handwritings and they include:





the emotional state of person,

the physical state of the person,

the age of the person etc.

Hence it is clear that no two handwritings can match each other, because no two people can have the exact same mental, physical and emotional states of mind. 

Graphology -handwriting analysis

Handwriting analysis (graphology) is the one and only way to gain insight about the physical, mental and emotional state of mind of a writer. Our mouth, hands or feet does not decide, which way we will slant our handwriting or how small or big we will write and at what extent, but whatever the style that we adopt in our handwriting, it comes directly from our brain. This is why handwriting can also be termed as brain writing. A graphologist observes the letter formation and strokes in an individual’s handwriting by using a magnifying lens or microscopic techniques.

It is scientifically proven that whenever there is a sudden change in our mood, emotions or behaviour there is a sudden chemical change in our brain and then a subsequent change in the handwriting has been clearly seen. Manual analysis involves the study of various handwriting features and individual characteristics like slant, margins, word spacing, connections, line spacing, movements, formations, ‘i’ dots, t bars etc. Each of these feature has a specific meaning and helps in identifying the personality traits. Accuracy of such analysis depends on the skills of a forensic graphologist.

Advantages of Personality Analysis using Handwriting

Some of the major advantages of Handwriting analysis is that : 

·        Handwriting tells the inner story of a person therefore it can never be disguised, especially from a graphologist.

·        Handwriting analysis is objective: Handwriting analysis is accomplished by analysing writing sample only as it doesn’t have any prejudice or says is not bias at all.

·        Handwriting analysis can reveal inner feelings and conflicts and such kind of hidden tension, stress, worries and anxiety of a writer.

·        Practice can help bring a change in an individual’s personality and behaviour

·        Handwriting analysis can play a vital role for commercial usage. It aids high level authority or managers of a company to recruit appropriate personnel at appropriate place for optimum level of output at any work place or in any division.

·        It can be used by the teachers, mentors and parents for understanding a child fear factor and personality better.

·        It can help a counsellor to get more information about his or her  client’s personality. It can also be used for checking suicidal tendencies and other details about the client which might help the counsellor to save their lives.

·        Handwriting analysis can also be used by the HR team during the recruitment process which helps in checking whether the candidate is fit for the job profile or not. 

Ranveer Singh nude photoshoot: Nude pictures land Bollywood actor in trouble

Bollywood actor known for his vibrancy fashion, be it in airport or in events has been booked for his recent photoshoot post in Instagram and twitter account that went viral.

The audience’s expeditious response over the actor’s nude pictures is boosting the internet. An FIR (First Information Report) has been lodged by Mumbai Police Station based on the complaints of an NGO runner, Lalit.  According to the complainant, such obscene pictures of the renowned actor may have a bad influence amongst kids who have a soft spot for the actor. Adding to which the complainant also alleged that the picture insulted women’s modesty or sentiments.

Mumbai police registered a case under IPC Section 292, 293, 509, and IT section 67.

IPC Section 292:  a book, pamphlet, paper, writing, drawing, painting, representation, figure, or any other object, shall be deemed to be obscene if it is lascivious or appeals to the pruri­ent interest or if its effect, or (where it comprises two or more distinct items) the effect of any one of its items, is, if taken as a whole, such as to tend to deprave and corrupt person.

IPC Section 293: Whoever sells, lets to hire, distributes, exhibits, or circulates to any person under the age of twenty years any such obscene object as is referred to in the last preceding section, or offers or at­tempts so to do, shall be punished 2[on first conviction with imprisonment of either description for a term which may extend to three years, and with fine which may extend to two thousand rupees, and, in the event of a second or subsequent conviction, with imprisonment of either description for a term which may extend to seven years, and also with fine which may extend to five thousand rupees].

IPC Section 509: Whoever, intending to insult the modesty of any woman, utters any words, makes any sound or gesture, or exhibits any object, intending that such word or sound shall be heard, or that such gesture or object shall be seen, by such woman, or intrudes upon the privacy of such woman, [shall be punished with simple imprisonment for a term which may extend to three years, and also with fine].

IT Section 67A: Whoever publishes or transmits or causes to be published or transmitted in the electronic form any material which contains sexually explicit act or conduct shall be punished on first conviction with imprisonment of either description for a term which may extend to five years and with fine which may extend to ten lakh rupees.

However, experts believe is harassment.

Thokchom Mona; – Apurva Pal




Role of DNA Fingerprinting in Rape case Investigation

In Forensics, the DNA analysis resolves so many cases related to rape cases, murder cases, paternity, and maternity disputes. The crime against female increasing day by day especially rape, assault, molestation, unnatural offences. In such cases DNA fingerprinting technique come out to be most effective tool in identification of the culprit from biological evidence. The DNA report in such cases proves to be most effective evidence in the court of law. DNA from semen, blood and saliva is extracted and matched with the relevant specimen or suspected DNA samples.

DNA Isolation

In Forensic Science Laboratory, there are different methods for DNA extraction. The method may vary as per the biological sample. Generally, two methods of DNA extraction were used i.e., Organic extraction and Automated extraction of DNA.

Organic Extraction of DNA

The exhibit for DNA extraction is taken and a small portion is cut off. That small portion is further cut into fine pieces and then transferred into Eppendorf tube.

·       To the Eppendorf tube, 20% SDS, Proteinase K (to break the cell membrane and separate the protein) and Forensic/lysis buffer are added. Incubate for 24 hours.

·       Then next day, the elute is transferred to new tube and chilled Phenol is added, vortex the mixture.

·       To isolate the clustered cell debris from the DNA, centrifuge the tubes.

·       After centrifugation, the supernatant is extracted and transferred onto a new tube. Phenol and Chloroform Iso-amyl is added to the tube, then vortex and centrifuge. Then the supernatant is transferred again to new tube and Chloroform Iso-amyl alcohol is added. Vortex and centrifuge. Transfer the extract to new tube.

·       Sodium acetate and chilled Isopropanol is added and mixed, then incubate. Remove the supernatant and keep the pellet.

·       To the pellet 70% chilled ethanol and then 100% ethanol is added for washing.

·       The extracted DNA then dissolved in TE buffer, pH 8.0 and then preserved at 4℃.

PCR (Polymerase Chain Reaction)

PCR is an enzymatic interaction wherein a particular area of DNA is replicated again and again to yield numerous copies of a specific succession. This “Xeroxing” process includes warming and cooling samples in an exact thermal cycling design more than 30 cycles. During each cycle, a duplicate of the target DNA sequence is created for each molecule containing the target sequences.

Real Time PCR

The extracted DNA is then subjected to the RT-PCR. It is most sensitive method for mRNA detection and quantitation. The RT-PCR test gives us the 3 variables i.e., larger DNA, smaller DNA, Y-DNA, and it also gives us the degradation quotient.

Short Tandem Repeats (STRs)

STR loci comprise of short, repetitive sequences elements base pairs of 3-7 long. These repeats are very much disseminated all through the human genome and are rich wellspring of exceptionally polymorphic markers, which might be detected utilizing the polymerase chain reaction. Alleles of STR loci are separated by the quantity of copies of the repeat sequence contained inside the amplified region and are recognized from each other utilizing fluorescence detection following electrophoretic separation.

     Procedure for DNA amplification using Promega PowerPlex 21 System

  •   The PCR amplification mix contains Master mix, Primer mix, Template DNA, and water Amplification Grade.
  •     All the above components were mixed except Template DNA and added into each reaction well. Then Template DNA is added to it
  •    Positive amplification control was prepared, then a portion of DNA was diluted to the desired template DNA volume. Diluted DNA was then added to a reaction well containing PCR   amplification mix.
  •      The plate is then sealed and centrifuged for a few seconds.
  •      Thermal Cycling- The machine was then set up for Powerplex 21, and the ramping rate was set to 100%.


The essential technique utilized for separation/detection of Short Tandem Repeats (STR) is Capillary Electrophoresis (CE). The bigger DNA entity move more gradually through the capillary than the more modest, more light DNA pieces, which permits the particles to be isolated dependent of their size. The DNA particles pass a viscous polymer solution act as the sieving medium.

The smaller DNA particles show up at the detection point initially followed by the bigger DNA arranged by their migration speed, which associates with length or the quantity of base pairs. Information from CE are plotted as a function of relative fluorescence intensity observed from fluorescence emission of dye passing the indicator. Now the obtained DNA profile were compared for matching among the DNA profiles of victim and suspects. Then the results were mentioned in the report.


it has been observed that DNA is one of the important tools to identify whether or not an accused has committed a particular crime. This importance and reliability of DNA is due to its unique character. In rape cases, DNA can be traced from the accused’s saliva, semen and blood found on the victim’s clothing, body and also from objects at the crime scene. The investigating authority must take utmost care to ensure that these extracts are traced and sent to the testing laboratories within the prescribed time set for each extract in order to obtain proper results. 

                   Lakhan Rana;-

Forensic Graphology

Graphology is the analysis of the physical attributes and patterns of handwriting which claims to identify the writer, indicating the psychological state at the time of writing or evaluating personality characteristics.

Forensic graphology is the diverse branch of forensic science where scientific analysis is required to reveal the physiological as well as psychological functions of an individual to solve the crime.

Forensic graphologists highlight the individual’s mood, motive, integrity, emotional stability, thought process and personality of the suspect who has written the anonymous letter or notes. The forensic graphologist use handwriting pattern to determine personality traits. The forensic graphologists help to analyze the handwriting on ransom notes in kidnapping cases or blackmailing letters or in case of pen poison letters.

The important features which are analyzed for personality profiling in handwriting of an individual are as follows:

a. Word Spacing

b. Line Spacing

c. Line Margins

d. Pen Pressure

e. Alignment

f. Movement

g. Size and Proportion of letters

h. Slant

i. Main Heading

j. Observing the position as well as shape of i-dots

k. Observing the position as well as shape of t-bars

Word spacing indicates the width of the handwriting by looking at narrow or wide spacing between the words whether the writer is of intrusive or extrusive in nature. Line spacing indicates the thinking capability of the writer whether he/she is open minded or narrow minded. Page margin is another important characteristic for handwriting analysis because it provides a lot of information such as identification of behavior, cautious level and the patience level of the writer. The alignment of the handwriting can be better judged when the content is written on blank paper. It generally possesses the mood of the writer whether the writer is optimistic or pessimistic. Slant refers to the angle of inclination or a letter of it from the baseline. Size and proportion of the letters in handwriting are another important characteristic in personality profiling and especially judges the confidence level of the writer. The position of i-dots indicates how far the writer has artistic or imaginative personality and position of t-bars indicates the intelligence level, leadership qualities and how strongly the writer is responsible in his/her life.

Therefore, these parameters or combination of characteristics of handwriting help the forensic graphologists to identify the writer state of mind, mood, motive and personality.


Forensic Audio-Video Analysis and Verification

Audio and video are the digitalized source of evidence that can be found at the scene of a crime or with the victim or the accused in the form of audio-video from mobile device or any CCTV footage. Such types of digital evidences are of utmost importance in civil or criminal cases. Therefore, audio and video forensics is the leading branch of forensic science in the digitalized era.

In forensic science, audio-video forensics forms three basic principles such as acquisition, analysis, and evaluation of audio and video recordings which are admissible in the court of law. One of the main tasks of audio and video forensic experts is to establish the authenticity and credibility of digital evidence. The forensic examination of audio and video is done in order to enhance the recordings to improve speech intelligibility and audibility of the sounds.

How the analysis of Audio-Video evidences are performed?

One of the primary tasks of forensic digital investigators to assist the crime scene investigators in order to find the conclusive proof via a number of scientific tools and equipments. After following the standardized procedure of crime scene investigation, at the time of evidence collection, the investigators must thoroughly search the suspected area and recover the evidence carefully. Such digital evidences must be protected from physical harm, environment, and heat.

Once the evidence is collected in a safe and secure manner, the proper documentation of evidence must be done in the form of notes or photography/videography. The documentation must include in which condition the evidence was found from the crime scene along with the name of the evidence collector, date, and time of evidence collection. All examination protocols are carefully examined and constructed for enhancement techniques that must be employed to the recovered evidence.

A variety of enhancement techniques can be employed on audio and video analysis. The techniques which are employed for video enhancement are as follows:

a. Sharpening: This step makes the edges of the images more clear and distinct.

b. Video Stabilization: This step reduces the amount of movement in the video, and also produces the fine playback.

c. Masking: This step covers the face or areas of the video that may protect the victim, witness or any law enforcement official.

d. Interlacing: In an analog system, the interlaced scanning is used to record the images or at the same time, this process is used to de-interlace which may be used to retrieve the information.

e. Demultiplexing: There is a device in CCTV named multiplexer, which is used to combine multiple series of video signals into a single signal.

The techniques which are employed for audio enhancement are as follows:

a. Frequency Equalization: There is a need for highly precise equalizers that are used to cut specific bands of frequencies. The frequency band which often contains more speech content is amplified or isolated. Large noise or interruptions can be analyzed by spectrum analyzer and the corresponding frequencies are reduced in order to reduce noise level.

b. Compression: Faint or low sound can be increased by compressing or leveling the signal so that the loud range can be minimized.

Such evidences are critically analyzed and listened carefully and proper documentation must be done. After standard forensic protocol, the forensic report is prepared by a forensic cyber expert and presented in the court of law.

The forensic audio-video  report must include the following details:

1. Results which were obtained from the analysis of audio-video files

2. Waveform charts of audio recordings and comparison waveform with formants

3. Identification of the format and type of recording

4. Type of processing which was used to analyze

5. Date and Time of analysis of audio files.

6. Description of the evidence in the type of circumstances and conditions in which it was collected

7. Description of the enhanced audio-video and type of software that was used.

8. Qualifications of the Audio Video Analyst.

9. Authorized signatory with name and stamp

10. Hash Values of the Audio Video Files.

Software for Audio Analysis
  1. WavePad Master
  2. Sonic Visualizer
  3. Praat
  4. Gold Wave
  5. Audacity
  6. Speech Analyzer


Cross-Examination of Forensic Experts and their forensic reports

Cross-Examination has the power to change the falsehood case into truth. According to Section 137 of the Indian Evidence Act, the examination of a witness by the adverse party shall be called his cross-examination.


Cross-examination aims to highlight discrepancies or inadequacies in the other party’s evidence. This type of examination also uncovers inconsistencies in witness declarations and to inspire realities that help in interrogating the case. The order of Examination is stated under Section 138 of the Indian Evidence Act which stated that the witness must be examined-in-chief, then the opposite party cross-examines the suspect, and if the suspect called by the party in desire, then it is considered as Re-examination.


There are two principle explanations behind conducting a cross-examination process:

a) to have the witness and give evidence that encourages you and your case, and


b) to ask the observer inquiries about any proof they gave before that you don’t believe is right.


The standards about interrogation aren’t as exacting as they are for direct assessment (when you question your own observers). For instance, in interrogation, one can:


 pose driving inquiries, and
 Challenge the other party’s proof (that is, attempt to show that it’s not dependable or right).


One of the major purposes of cross-examination is the revealing of truth and exonerates the innocent one. Another purpose is to distort or weaken the force of witness evidence. The objective of cross-examination is to challenge the credibility, accuracy, and general value of evidence presented in chief to shift the facts related to any case which is already stated by the witness to exposed discrepancies and illicit the true fact which will support the case of opposite party.

In cross-examination, the rules are not as strict as rules which must be taken into consideration at the time of examination-in-chief. In this, one can ask leading questions and also challenge the other party’s evidence in order to show that their evidence is not reliable. The most significant point for the witness to recall is that in such circumstances losing of temper is extremely harming to his bearing.

In most cases, however, the cross-examination of an expert witness is carried out along far more civilized lines, and the evidence is tested by logical questioning about the methods employed in the examination and about the validity of the conclusions reached.

From the perspective of the cross-analyst, there is a need to decrease the evidential estimation of the declaration to a point where the appointed authority or jury will view it as unsound, questionable, or even mixed up.

In the event that the end is sufficiently based, the questioning is probably going to fall flat, however on the off chance that it emerges from erroneous perception or thinking, successful addressing will uncover this.


An arson investigation basically focuses on four broad areas which are as follows:

 Proof of incendiarism: The proof of incendiary materials come from fire scene examination by the experienced forensic expert. With the use of comprehensive knowledge about the fire dynamics, fire investigators determine the root cause and origin of the fire.
 Proof of origin: The forensic fire investigators focuses on the origin of fire by thoroughly examined the crime area.
 Proof of motive: This majorly focuses on financial condition of the individual or the person who claimed his or her property, this also highlighted the profit as well loss from operations and cash flow.


A standardized protocol must be followed in arson and fire investigation which is as follows:

1. Identification of the first caller from the scene of incidence.

2. Identification of any injured person present at the scene of incidence and medical assistance must be provided to the personnel.

3. Protect the whole area by the barricading tape in order to avoid entry of unnecessary personnels.

4. Obtain photographs of the scene of incidence from all the possible angles.

5. Obtain insurance information and identification of the public or private insurance investigators.

6. Record check of the property is another crucial step by the forensic investigators. Record check includes assessor records or tax records.

7. Weather conditions must be taken into consideration as well as proper documentation of the scene of incidence must be taken in the form of notes.

8. Searching method must be employed by the forensic experts and crime scene investigators depending upon the area of the crime scene.

9. Remove all the debris and clean all the relevant tools or articles and establishing the area for evidence collection.

10. Evidences must be thoroughly searched and collected from the crime scene as well as preserved properly for the further laboratory analysis as evidences are admissible in court of law.

11. Analyze fire flow patterns, damage patterns, and evidences such as shields and shadows, inverted cone burn pattern, etc. Document the evidences with photos, sketches and notes.

The role of forensic fire investigator is to check for possible incendiary devices, license plate of automobiles in the area of fire, and to ensure that access to the scene is under control. Another major task of fire investigator is to survey the exterior as well as interior of the structure of the building. The goal is to assess probable fire origin, secure evidence and to control fire overhaul procedures to protect evidence.

Once the evidences are collected in secured manner, they will send to the forensic laboratory for further analysis and examination. After the results are interpretated, the report prepared by forensic expert is admissible under court of law.

Fingerprint Expert Services

Fingerprint forensic experts use fingerprints as most reliable method for civil and criminal cases. Fingerprints are majorly used in criminal investigation as a means of identification because of its uniqueness and persistence. In forensic science, the major reason for gathering fingerprints is to recognize or identify a person. This individual might be the suspect, a casualty, or a witness.

There are three sorts of fingerprints that can be encountered at crime scene: latent, patent, and plastic. Latent fingerprints are deposited on surfaces because of the perspiration and oil on the skin’s surface. This kind of unique mark is imperceptible to the unaided eye and requires extra handling so as to be seen. This handling can incorporate essential powder strategies or the utilization of synthetic substances. Patent fingerprints can be made by blood, oil, ink, or soil. This kind of unique mark is effectively obvious to the natural eye. Plastic fingerprints are three-dimensional impressions and can be made by squeezing your fingers in new paint, wax, cleanser, or tar. Like patent fingerprints, plastic fingerprints are handily observed by the natural eye and don’t require extra preparing for visibility purposes.


Analysis of Collected Prints


When a print is gathered, the process of examination begins at forensic science laboratory. During investigation, analysts decide if there is sufficient data present in the print to be utilized for distinguishing proof. This incorporates deciding class and individual qualities for the obscure print.

Class characteristics are the attributes that limited the print down to a gathering but not an individual. The three unique mark class types are arches, loops and whorls.

Arches are the least normal sort of unique finger impression, occurring only about 5% of the time. This example is portrayed by edges that enter on one side of the print, go up, and exit on the contrary side. Loops are the most widely recognized, covers 60-65% of the world population. This example is portrayed by edges that enter on one side of the print, circle around, and afterward exit on a similar side. Whorls present a circle sort of ridge flow and covers 30-35% of the population. Individual attributes are those qualities that are unique to a person. They are little inconsistencies that appear within the frictional ridges of palmer region and fingerprint tips and are commonly referred to as Ridge characteristics. The most well-known kinds of Galton’s characteristics or ridge characteristics are bifurcation, ridge endings, and dots or islands.


Comparison of Prints


After examination, unknown fingerprints are compared with the known prints by the forensic fingerprint expert. The unknown fingerprint is collected by specialized forensic experts at the crime scene, and compared with the known fingerprint which is the print of a potential suspect. The Level I of Identification begins with the comparison of pattern found at the unknown fingerprints and suspected fingerprints. Further, if the class characteristics of the two prints are not same, at that point no further examination could be done as like can only be compared with the like. On the other hand, if a class characteristic of both the fingerprints show similarity then the forensic fingerprint expert begins the Level II of identification, i.e. examination of individual characteristics. They examine the ridge characteristics or Galton’s details for fingerprint examination. Depending on how prevalent the ridge characteristics, fewer or more points of comparison may be needed for a positive identification.


Evaluation of Comparison


When the examination is completed by the forensic fingerprint expert, they can make a legitimate assessment. If there are any unexplained differences between the unknown and known fingerprints, then they can exclude the known fingerprint as the source. This means that if the class characteristics are in disagreement, then the conclusion would be exclusion. However, if the class characteristics as well as the individual characteristics are in agreement and if there are no unexplained differences between the prints, the conclusion would be identification. In some cases, neither of these conclusions is possible. There may not be a sufficient quality or quantity of ridge detail to effectively make a comparison, making it impossible to determine whether or not the two prints came from the same source. In these instances, no conclusion can be made and the report will read “inconclusive.” The three possible results that can be made from a fingerprint examination are therefore exclusion, identification, or inconclusive.


Verification of Evaluation


Databases such as AFIS (Automated Fingerprint Identification System) have been created as ways of assisting the fingerprint examiners during these examinations. These databases help provide a quicker way to sort through unlikely matches. This leads to quicker identification of unknown prints and allows fingerprints to be as widely used as they are in criminal investigations.







fingerprint expert for courts

Fingerprint Identification, Evaluation & Examination

Fingerprint is an impression of friction ridges of fingers which is a unique in every individual. The fundamental principle is that fingerprint is an individual characteristic which illustrates that no two individuals possess exact fingerprint pattern. The fingerprint pattern will remains the same throughout the life of a person however; in some circumstances the print may change due to permanent scar or injury or any other skin disease. Each individual possess have general characteristic ridge patterns that allow them to systematically classified.

In criminal investigation era, the fingerprint is the corroborative evidence which is frequently encountered at the crime scene as compared to DNA traces. Not every crime scene contains pool or spatters of blood or any other biological fluid, but it has been touched by someone. The three types of fingerprint could be found at the crime scene are: – Latent, Patent and Plastic Prints. Latent prints are extremely difficult to identify as they are not visible with naked eye. They are mostly detected by performing chemical techniques. Patent prints are visible prints that are easily be identified as such prints are left in a substance like blood, paint, grease etc whereas plastic prints are left over the soft substances like mud, soap, wet putty etc. Therefore; it is an important role of forensic fingerprint expert to examine the crime scene carefully. The forensic fingerprint expert must use his exceptional knowledge in identification, evaluation and analysis of a fingerprint.

The fingerprints are mostly found in theft and burglary cases. Such cases are frequently encountered by police personnels and forensic fingerprint expert. It is not necessary that every time the whole fingerprint is found at the crime scene, there are times when partial prints could be encountered. This is the challenging phase for forensic fingerprint expert to examine individual characteristics of a fingerprint and to compare with the comparative samples. In burglary and theft cases, the fingerprints may be found above, below, inside or outside of almirahs, lockers, drawers, cupboards, office desks, currency etc. such fingerprints are said to be latent prints. As these prints are not visible with naked eye, such prints often require the use of chemical reagents, fingerprint powder or alternate light sources.

After the detection of fingerprint, another challenge faced by the forensic fingerprint expert is to lift the fingerprint without any distortion.

The comparison of questioned fingerprint samples is made with the standard comparative samples by the forensic fingerprint expert. The suspect’s fingerprint is taken for personal identification with the developed latent fingerprints left at the crime scene. The comparative samples of suspect must be taken on ten-digit fingerprint card where inked fingers are taken by rolled method. The ink is spread on the plain slab with a roller until the slab is completely covered with a thin layer of ink and then rolled fingerprints of both the hands are taken on the card. After taking the prints, the prints are enhanced by high quality camera to capture the image of a print and analyze the class and individual characteristics of the fingerprint.

The characteristics that places an individual in a group or in subcategory are referred to as class characteristics whereas the features which are peculiar to one specific subject and covers the small detailing of ridge patterns called Minutiae are referred to as individual characteristics. The broad classification of class characteristics are arches, loops and whorls further these categories are sub-classified as plain arch, tented arch, radial loop, ulnar loop, plain and composite whorls. The individual characteristics which are unique to every individual are examined by forensic fingerprint expert by comparing unknown standards to the known standards.

The fingerprint examination requires immense documentation to record the details of the fingerprints which is done by note making, photography and report-making. These documents are prepared for further use in courtroom testimony.

Brilliant Forensic Investigation Pvt. Ltd. is one such private forensic science organization in Janakpuri, New Delhi, India which deals with cases related to fingerprint development and verification for the personal purpose or legal purposes pertaining to judiciary or police etc. BFI forensic organization also deals with fingerprint analysis and its verification from the documents present in judicial records. Fingerprint analyst appears in the courts as expert witness for forensic report demonstration by testimony and cross examination. The forensic services are available all across the states of India specially in the metropolitan cities like Delhi NCR, Mumbai, Kolkata, Bangalore,.



list of banned Chinese apps in India

In the course of the most recent years, we’ve seen an incalculable number of fights via web-based networking media with respect to prohibiting or boycotting certain applications and administrations. Without fail, when something against assumed national intrigue occurs, we witness such shock against some application and administrations. As of now, in India, it is for the most part a direct result of the Chinese applications that are thought to have had a danger to our country. It very well may be from numerous points of view like phony news and deception, information burglary (data theft), and security.


banned china apps in India

A couple of years back, when the Indian cell phone brands are nearer to terminated, and the ascent of Chinese cell phone brands’ development is end-less, at that point started a pattern to boycott/blacklist Chinese cell phones. It hasn’t got like it was arranged and just stayed as a passing cloud however we continued seeing it occasionally. Presently, with the whole world confronting the novel Corona Virus, Indians have decided to boycott Chinese applications.

Indian intelligence agencies have requested that the administration square or inform individuals to stop use with respect to 59 portable applications connected to China over worries that these weren’t protected and wound up separating a lot of information.

Here’s the list of applications sent by the security establishment to the government to impose a complete ban on Chinese Apps:

  • TikTok
  • Vault-Hide
  • Vigo Video
  • Bigo Live
  • Weibo
  • WeChat
  • SHAREit
  • UC News
  • UC Browser
  • BeautyPlus
  • Xender
  • ClubFactory
  • Helo
  • LIKE
  • Kwai
  • NewsDog
  • Photo Wonder
  • APUS Browser
  • VivaVideo- QU Video Inc
  • Perfect Corp
  • CM Browser
  • Virus Cleaner
  • Mi Community
  • DU recorder
  • YouCam Makeup
  • Mi Store, 360 Security
  • DU Battery Saver
  • DU Browser
  • DU Cleaner
  • DU Privacy
  • Clean Master – Cheetah
  • CacheClear DU apps studio
  • Baidu Translate
  • Baidu Map
  • Wonder Camera
  • ES File Explorer
  • QQ International
  • QQ Launcher
  • QQ Security Centre
  • QQ Player
  • QQ Music
  • QQ Mail
  • QQ NewsFeed
  • WeSync
  • SelfieCity
  • Clash of King
  •  Mail Master
  • Mi Video call-Xiaomi
  • Parallel Space
59 Chinese apps banned by Indian govt

According to the sources, there were inputs that many Android and IOS applications, either created by Chinese developers or propelled by companies or organizations with Chinese links, had the potential to be used as spyware or other malicious ware.

Mobile Forensic Investigation

Mobile forensics is the branch of digital forensics or forensic science dealing with data acquisition from mobile phones or similar electronic devices like tablets, personal digital Assistant (PDA) or handheld PC and GPS devices for investigation purposes. In today’s time, most people possess mobile devices for communication by using calls, messages, MMS services. Multiple application based apps and tools are available in all android and IOS mobile devices to communicate and exchange information’s in the forms of text messages, audio files, video files, GPS locations, photos etc. The crimes using mobile technology are also increasing day by day as criminals find mobile devices as the most convenient way to commutate, exchange their plans as well as to execute digital frauds. It has become a necessity for the digital forensic experts as well as investigating officers dealing with digital fraud or digital crimes to get all the digital information’s like call history, location history, deleted files and folders, deleted chats, deleted messages, MMS, photos, videos, app data, contact lists etc. from the seized mobile devices which may lead to key role in investigation by analyzing the digital information’s. Various mobile forensic tools like UFED, Oxygen Forensic, XRY are used for the data extraction, data analysis, and report preparation.

Mobile Forensics

Mobile forensic investigation processes


Mobile devices are generally seized in order to preserve the digital evidence and to keep the device in the same condition so as to avoid shutdown or turning off of the device by the investigating officer or digital forensic expert. Faraday bags or cases are used to keep the mobile device as these bags prevent any further cellular connection or any communication with the device. The mobile device is kept in airplane mode to prevent further alteration or activities. The investigation officer would risk user lock activation.


Data acquisition is the process of gathering information from mobile devices and their associated media. This process reduces the chance of data loss due to damage or battery depletion during storage and transportation. Mobile device identification is necessary at the beginning of the forensic examination.

The data can be gathered from mobile devices in two different ways:

a)Physical Acquisition: – The physical acquisition is also known a physical memory dump. It is a technique for capturing all data from flash memory chips on the mobile device. It allows forensic tools to collect all remnants of deleted data like deleted call history, contacts, media files, GPS locations, passwords etc. Initially, the received data is in raw format and it cannot be read. Later on, some methods are applied to convert the unread data into a readable form.
b) Logical Acquisition: – Logical acquisition is bit by bit copying of data of the directories as well as files preset on file system partition. It is also known a Logical Extraction. It is a technique for extracting the files and folders without any of the deleted data from a mobile. However, some particular data such as pictures, call history, text messages, calendar, and videos. A software tool is used to make a copy of the files.

What type of digital evidences can be extracted from the Mobile Devices?

1. Call Detail Record (CDRs)
 Call started and ended time/data
 Terminating and Originating towers
 Whether the call was outgoing or incoming
 Call time duration
 Who was called and who made the call

However, the collection of this information depends on the policies of the concerned states.

2.Global Positioning System (GPS): – It is an excellent source of empirical evidence. If the suspect as an active mobile device at the crime scene, GPS can pinpoint or locate his/her location as well as his/her criminal act. GPS also locates the movement of the suspect from a crime scene to the hideout. Furthermore, It helps in finding phone call logs, images and SMS..
3.App Data: – Many apps seek permission during the installation process to access the data. Example – a photo or video editing apps request permission to media files, camera, and GPS for navigation. Database and cache memory of applications like WhatsApp, Facebook, Instagram, Twitter, Google maps, calendar etc. can be extracted.
4.SMS: – The text messages or MMS leave an electronic record of dialogues that can be presented in a court.
5.Photos and Videos (Gallery):– All the photos and videos including the deleted files can be extracted using tools.
6.Contacts: – all the contact list can be extracted using forensic tools.



Following cables or connectors are used to connect the mobile device to work station:-

1.JTAG or Cable Connection used in physical extraction
2.Bluetooth or Cable Connection are used in logical extraction

Forensic Tools Classification System:- Forensic specialists or forensic analysts must understand the several types of forensic tools. The classification offers a framework for forensic analysts to compare the acquisition techniques used by different forensic tools to capture data.

a)Manual Extraction: – It allows extracting and viewing data through the device touch screen or keypad. At a later stage, this data is documented photographically. Furthermore, it is time-consuming and involves a great probability of human error.

Tools: –

 Project A phone
 EDEC Eclipse

  b)Logical and Physical Extraction: – The investigators connect the cellular device to a forensic work station or hardware via Bluetooth, RJ – 45 cable or USB cable. The computer using a logical and physical extraction tool sends a series of commands to the mobile device. As a result, the required data is collected from the phone’s memory and sent back to the forensic work station for analysis purposes.

List of Forensic Tools: –

c)Hex Dump: It extracts the raw image in binary format from the mobile devices. The forensic specialists connect the device to the forensic workstation and push the boot – ladder into the device to dump its memory to the computer. This supplies more information and the recovery of deleted phone’s files and unallocated space.

Tools: –

d)Chip – off: This technique allows the examiner to extract data directly from the flash memory to a cellular device. They remove the phone’s memory chip and create its binary image. This process is costly and requires ample knowledge of hardware. Inappropriate dealing with may make a physical harm the chip and renders the information to recover.

Tools: –

 iSeasamo phone opening tool
 FEITA digital inspection station
 Chip epoxy glue remover
e)Micro Read: This involves interpreting and viewing data on memory chips. The investigators use a high power electron microscope to analyze the physical gates on the chip and then convert the gate level into 1’s and 0’s to discover resulting ASCII code. There is no tool available for micro read.

Our organization deals with cases related to mobile forensics like data extraction from mobile devices, memory cards and cloud data for the personal purpose or legal purposes pertaining to judiciary or police etc. our forensic organization also provides training in the field of mobile forensics using digital forensic UFED tool. Our Mobile forensic expert appears in the courts as an expert witness for forensic report demonstration by testimony and cross-examination. The forensic services are available all across the states of India especially in the metropolitan cities like Delhi NCR, Mumbai, Kolkata, Bangalore etc.


Forensic Handwriting Examination

Handwriting Forensics is the comparative examination between a disputed handwriting and a standard handwriting sample of a suspected writer. Handwriting features of class and individual characteristics or specific writing habits of suspected writers are comprehensively compared for similarities or dissimilarities with the known handwriting sample. “Handwriting is known as brainwriting”. The handwriting is central to the person’s identity. Each person writes in his own unique way which represents the individual characteristic. It is a fact noted by handwriting analysts that most handwriting characters appear similar in some person writing as they learn the same way of constructing and forming the letters in a school. But over the period of time, a person possesses certain individual characteristics in his handwriting which differentiates his handwriting from others.

The credibility of handwriting is questioned when any individual tries to forge or alters the genuine handwriting of a writer. Here comes the role of a forensic handwriting and signature expert who analyze and make comparison between disputed and genuine handwriting samples which are mainly admitted and specimen samples of the writer. The handwriting analysis is a science-based on a notion that no two persons write exactly the same in extended handwriting. The other scientific notion is that not a single individual writes exactly the same all the time. The natural variations always exist in the person’s handwriting as hand cannot work like a rubber stamp. Handwriting is a complex act, highly developed skill, and recurring habit of an individual. The primary purpose of a forensic handwriting and signature expert is to analyze and find the differences in the writing habits between the disputed handwriting or signature exhibits and its contemporary comparative samples.

The forensic handwriting examiners are highly trained and specialized in the field of forensic handwriting analysis and verification. They use intense knowledge and scientific methods to determine the authenticity of a questioned handwriting sample. The questioned handwriting samples need to be compared with the standard handwriting samples. There are certain writing features known as class and individual characteristics that need to be taken into consideration for handwriting verification. Such writing characteristics include movement of the hand, the formation of letters, relative size and proportion of letters and words, interspacing between letters, connecting strokes, slant, alignment, line quality, style, pen pressure, shading, pen position, natural variations, etc are to be examined carefully.

There are times when a writer himself camouflages his own handwriting. The writer deliberately changes his own handwriting by changing the slant of letters, size, and proportion of letters, consciously constructs odd letters, and may deceive other tactics to conceal his handwriting identity. The other challenge in handwriting analysis relates to the simulation which is an attempt to copy another person’s handwriting. The forger tries to make a similar model of the signature on various documents like a Will, invoice, business memorandums, sale deeds, property papers, sale-rent agreements, medical certificates, mark sheets, etc. In such a situation, the forensic handwriting and signature examiner must take sufficient standard samples of suspect in order to make conclusive opinion. The standards (exemplars) must be taken in the court of law. Sometimes, while taking the specimen, the suspect consciously tries to alter or disguise his handwriting so the specimen must be taken on multiple sheets, at different writing speeds to avoid any manipulation or disguising efforts made by him. The comparative sample must not be shown to the specimen writer; the specimen must be taken by dictating it.

Sometimes, the forensic handwriting and signature expert may face a challenging phase in the analysis of anonymous handwriting in cases of threatening letters, extortion money letters, harassment notes, blackmailing letters, or notes where the writer is unknown. In such situations, the forensic expert can infer that whether such anonymous notes or letters are written by some closed one’s who are either jealous or feel competitive or rejected lovers whose intention is to torture, harass mentally, defaming, etc.

Therefore; the advancement of the forgers in performing different tactics gives a lesson to the forensic handwriting and signature experts that they must upgrade their skills and knowledge to mark the conclusive analysis and their opinion based on different cases. If any person feels cheated, by way of forgery or disguised he must consult to forensic investigation expert to get the opinion.

Brilliant Forensic Investigation Pvt. Ltd. is one such private forensic science organization in Janakpuri, New Delhi, India which deals with cases related to handwriting and signature analysis, signature verification, anonymous, or miscellaneous handwritings analysis for the personal purpose or legal purposes pertaining to judiciary or police, etc. The forensic services are available all across the states of India.

-Ravshish Kaur Kohli

Forensic Serology and Biology

The forensic biology and serology is one of the crucial discipline in the field of forensic sciences. Generally, the forensic serology deals with the analysis of blood, serum, saliva, semen, hair
and other bodily fluids to establish the relationship of the perpetrator to the crime scene. The major concern of forensic serologists to collect the biological evidence present at the crime scene in an adequate way preventing them from contamination.

Blood is one of the crucial evidences and can be commonly found at the crime scene like murder, vehicular accidents, sexual assaults etc. The forensic serologists must answer the following questions at the time of examining blood, blood stain or smears:

1) Is it blood or not?

2) Is it human blood or originate from any other species?

3) If it’s human blood then how closely it can be related to the particular individual?

The preliminary step to examine whether it’s a blood or not, various colour tests are carried out by specialised forensic at the crime scene.

a) Phenolphthalein Test (Kastle – Meyer Colour Test)

The phenolphthalein test is based on the haemoglobin pigment present in blood which possess peroxidase like activity. The phenolphthalein reagent and hydrogen peroxidase mixture are applied on the bloodstain, thus causes the formation of deep pink colour. The change in colour indicates the presence of blood.

b) Luminol Test

The luminol test is the most sensitive test to detect bloodstains. The bloodstain shows fluorescence instead of producing colour. The luminol reagent is sprayed on the suspected areas, the emission of light can be viewed and thus bloodstain will produce a faint blue glow.

The confirmatory test is performed in the laboratories to determine whether it’s a human blood or not. One of the confirmatory test for origin of species is precipitin test carried out on bloodstain. The precipitin test involves the reaction of antiserum with the corresponding antigen. Another version of precipitin test is the Gel Diffusion method. The extracted bloodstain antigen and human antiserum is placed at different holes opposite to each other. The line of precipitate forms when antigen and antiserum meet, thus confirming the presence of human blood. The precipitin test gives best result even the blood stain is 10-15 years older.

                                                                                – Ravshish Kaur Kohli

                                                               (M.Sc. -Forensic Science), Amity University

Crime Scene Investigation

A crime scene is place where an offence has been committed and the investigators carefully examine or search the area in order to find probative evidence. The purpose of crime scene investigation is to establish the possible link suspect, victim, witnesses in relation to criminal event.

In the majority of cases such as homicidal, suicidal and accidental, the crime scene investigators as well as law enforcement officers play a significant role in determining proper collection as well as preservation of physical evidence which might be accidently left by the criminal. Proper documentation and photography of a crime scene should be done by specialised and well-trained personnel that could help them to reconstruct the crime scene.

A well-trained crime scene investigator (Investigating Officer) must following basic steps in order to perform proper investigation to maintain the chain of custody:

1. MedicalAssistance to the victim if there is even a remote chance of life.

2. Securingthe crime scene by barricading using barricading tape, rope or cones etc. to protect the entry of unauthorized persons like on lookers, family members, witness etc.

3. Documentationof the crime Scene

a. Photography/Videography (Over view, Mid-range and close up photography)

b. Note Taking (Complete description of the crime scene)

c. Sketching of the Crime Scene (Rough and Final Sketch)

4. Searching of the evidences

a. Strip or line search method

b. Grid Search Method

c. Spiral Search pattern

d. Wheel or Ray search pattern

e. Quadrant or Zone Search pattern

5. Collection of Physical Evidences (Following evidences should be sent to Forensic Laboratory):

a. Victim’s Clothing

b. Fingernail Scapings

c. Hairs (head or pubic hairs)

d. Gun/Bullets recovered from the crime scene or victim’s body

e. Hand Swabs from Shooting victim (for gunshot residue analysis)

f. Semen/Vaginal/Anal/oral Swabs in case of sex related crimes for DNA Profiling

g. Blood/Viscera Samples in case of poising cases

h. Debris collection in case of arson/fire cases

6. Preservation of evidence by-

a. EDTA for blood samples

b. Air dry method

c. NaCl Solution for preserving viscera

7. Packaging of Evidences should be done using

a. Unbreakable plastic pill bottles with pressure lids (hair, glass fibers)

b. Manila envelops

c. Screw cap glass vials

d. EDTA tubes for fresh blood

e. Sealable plastic bags

f. Druggist Fold

g. Paper bags

h. FTA card for collecting DNA sample

8. Naming and Tagging of evidence (complete description of the evidence)

a. Nature of evidence

b. Name of the investigating officer

c. Person collected the evidence

d. Initials of the investigating officers

9. Forwarding Letter in order to send the evidence to the Forensic Science Laboratory.

10. Releasing the Crime Scene for general Public or Family members.

Important Awareness for 2020

DNA Fingerprinting

A modern approach of scientific investigation

DNA fingerprinting is one of the modern and standard method especially in criminal forensic case work. The basic principle behind DNA fingerprinting reveals that no two individual share the same genetic code except for identical twins and those elements of DNA that are examined and used to obtain a match. It cannot be forged or altered in anyway.

To understand the significance and value of DNA as evidence it is necessary to gain basic and explicit knowledge about basic structure of DNA, types of DNA, collection and preservation of DNA sources, extraction and isolation of DNA, DNA importance and its legal perspective in the court of law, DNA profiling procedural and ethical concern and many more.

Brilliant forensic investigation provides high quality DNA fingerprinting services all over India for both private sectors as well as law enforcement authorities like police, armed forces, courts etc. There are two different form of test covered under DNA fingerprinting-


Peace of Mind Test

  1. Paternity Test (With Maternal Involvement)
  2. Paternity Test (No Maternal Involvement)
  3. Maternity Test
  4. Siblingship Test
  5. DNA profiling for Individual Identification
  6. Test for Trisomy of Chromosome no. 13, 18 and 21

Court Approved Test

  1. Paternity Test (with/without Maternal Involvement)
  2. Siblingship Test
  3. Immigration Test for Individual identification
  4. Profiling for identification
  5. Identification of unknown deadbodies by DNA Profiling