loader image



Forensic Audio-Video Analysis and Verification

Audio and video are the digitalized source of evidence that can be found at the scene of a crime or with the victim or the accused in the form of audio-video from mobile device or any CCTV footage. Such types of digital evidences are of utmost importance in civil or criminal cases. Therefore, audio and video forensics is the leading branch of forensic science in the digitalized era.

In forensic science, audio-video forensics forms three basic principles such as acquisition, analysis, and evaluation of audio and video recordings which are admissible in the court of law. One of the main tasks of audio and video forensic experts is to establish the authenticity and credibility of digital evidence. The forensic examination of audio and video is done in order to enhance the recordings to improve speech intelligibility and audibility of the sounds.

How the analysis of Audio-Video evidences are performed?

One of the primary tasks of forensic digital investigators to assist the crime scene investigators in order to find the conclusive proof via a number of scientific tools and equipments. After following the standardized procedure of crime scene investigation, at the time of evidence collection, the investigators must thoroughly search the suspected area and recover the evidence carefully. Such digital evidences must be protected from physical harm, environment, and heat.

Once the evidence is collected in a safe and secure manner, the proper documentation of evidence must be done in the form of notes or photography/videography. The documentation must include in which condition the evidence was found from the crime scene along with the name of the evidence collector, date, and time of evidence collection. All examination protocols are carefully examined and constructed for enhancement techniques that must be employed to the recovered evidence.

A variety of enhancement techniques can be employed on audio and video analysis. The techniques which are employed for video enhancement are as follows:

a. Sharpening: This step makes the edges of the images more clear and distinct.

b. Video Stabilization: This step reduces the amount of movement in the video, and also produces the fine playback.

c. Masking: This step covers the face or areas of the video that may protect the victim, witness or any law enforcement official.

d. Interlacing: In an analog system, the interlaced scanning is used to record the images or at the same time, this process is used to de-interlace which may be used to retrieve the information.

e. Demultiplexing: There is a device in CCTV named multiplexer, which is used to combine multiple series of video signals into a single signal.

The techniques which are employed for audio enhancement are as follows:

a. Frequency Equalization: There is a need for highly precise equalizers that are used to cut specific bands of frequencies. The frequency band which often contains more speech content is amplified or isolated. Large noise or interruptions can be analyzed by spectrum analyzer and the corresponding frequencies are reduced in order to reduce noise level.

b. Compression: Faint or low sound can be increased by compressing or leveling the signal so that the loud range can be minimized.

Such evidences are critically analyzed and listened carefully and proper documentation must be done. After standard forensic protocol, the forensic report is prepared by a forensic cyber expert and presented in the court of law.

The forensic audio-video  report must include the following details:

1. Results which were obtained from the analysis of audio-video files

2. Waveform charts of audio recordings and comparison waveform with formants

3. Identification of the format and type of recording

4. Type of processing which was used to analyze

5. Date and Time of analysis of audio files.

6. Description of the evidence in the type of circumstances and conditions in which it was collected

7. Description of the enhanced audio-video and type of software that was used.

8. Qualifications of the Audio Video Analyst.

9. Authorized signatory with name and stamp.




Software for Audio Analysis

  1. WavePad Master
  2. Sonic Visualizer
  3. Praat
  4. Gold Wave
  5. Audacity
  6. Speech Analyzer


Cross-Examination of Forensic Experts and their forensic reports

Cross-Examination has the power to change the falsehood case into truth. According to Section 137 of the Indian Evidence Act, the examination of a witness by the adverse party shall be called his cross-examination.


Cross-examination aims to highlight discrepancies or inadequacies in the other party’s evidence. This type of examination also uncovers inconsistencies in witness declarations and to inspire realities that help in interrogating the case. The order of Examination is stated under Section 138 of the Indian Evidence Act which stated that the witness must be examined-in-chief, then the opposite party cross-examines the suspect, and if the suspect called by the party in desire, then it is considered as Re-examination.


There are two principle explanations behind conducting a cross-examination process:

a) to have the witness and give evidence that encourages you and your case, and


b) to ask the observer inquiries about any proof they gave before that you don’t believe is right.


The standards about interrogation aren’t as exacting as they are for direct assessment (when you question your own observers). For instance, in interrogation, one can:


 pose driving inquiries, and
 Challenge the other party’s proof (that is, attempt to show that it’s not dependable or right).


One of the major purposes of cross-examination is the revealing of truth and exonerates the innocent one. Another purpose is to distort or weaken the force of witness evidence. The objective of cross-examination is to challenge the credibility, accuracy, and general value of evidence presented in chief to shift the facts related to any case which is already stated by the witness to exposed discrepancies and illicit the true fact which will support the case of opposite party.

In cross-examination, the rules are not as strict as rules which must be taken into consideration at the time of examination-in-chief. In this, one can ask leading questions and also challenge the other party’s evidence in order to show that their evidence is not reliable. The most significant point for the witness to recall is that in such circumstances losing of temper is extremely harming to his bearing.

In most cases, however, the cross-examination of an expert witness is carried out along far more civilized lines, and the evidence is tested by logical questioning about the methods employed in the examination and about the validity of the conclusions reached.

From the perspective of the cross-analyst, there is a need to decrease the evidential estimation of the declaration to a point where the appointed authority or jury will view it as unsound, questionable, or even mixed up.

In the event that the end is sufficiently based, the questioning is probably going to fall flat, however on the off chance that it emerges from erroneous perception or thinking, successful addressing will uncover this.


An arson investigation basically focuses on four broad areas which are as follows:

 Proof of incendiarism: The proof of incendiary materials come from fire scene examination by the experienced forensic expert. With the use of comprehensive knowledge about the fire dynamics, fire investigators determine the root cause and origin of the fire.
 Proof of origin: The forensic fire investigators focuses on the origin of fire by thoroughly examined the crime area.
 Proof of motive: This majorly focuses on financial condition of the individual or the person who claimed his or her property, this also highlighted the profit as well loss from operations and cash flow.


A standardized protocol must be followed in arson and fire investigation which is as follows:

1. Identification of the first caller from the scene of incidence.

2. Identification of any injured person present at the scene of incidence and medical assistance must be provided to the personnel.

3. Protect the whole area by the barricading tape in order to avoid entry of unnecessary personnels.

4. Obtain photographs of the scene of incidence from all the possible angles.

5. Obtain insurance information and identification of the public or private insurance investigators.

6. Record check of the property is another crucial step by the forensic investigators. Record check includes assessor records or tax records.

7. Weather conditions must be taken into consideration as well as proper documentation of the scene of incidence must be taken in the form of notes.

8. Searching method must be employed by the forensic experts and crime scene investigators depending upon the area of the crime scene.

9. Remove all the debris and clean all the relevant tools or articles and establishing the area for evidence collection.

10. Evidences must be thoroughly searched and collected from the crime scene as well as preserved properly for the further laboratory analysis as evidences are admissible in court of law.

11. Analyze fire flow patterns, damage patterns, and evidences such as shields and shadows, inverted cone burn pattern, etc. Document the evidences with photos, sketches and notes.

The role of forensic fire investigator is to check for possible incendiary devices, license plate of automobiles in the area of fire, and to ensure that access to the scene is under control. Another major task of fire investigator is to survey the exterior as well as interior of the structure of the building. The goal is to assess probable fire origin, secure evidence and to control fire overhaul procedures to protect evidence.

Once the evidences are collected in secured manner, they will send to the forensic laboratory for further analysis and examination. After the results are interpretated, the report prepared by forensic expert is admissible under court of law.

Fingerprint Expert Services

Fingerprint forensic experts use fingerprints as most reliable method for civil and criminal cases. Fingerprints are majorly used in criminal investigation as a means of identification because of its uniqueness and persistence. In forensic science, the major reason for gathering fingerprints is to recognize or identify a person. This individual might be the suspect, a casualty, or a witness.

There are three sorts of fingerprints that can be encountered at crime scene: latent, patent, and plastic. Latent fingerprints are deposited on surfaces because of the perspiration and oil on the skin’s surface. This kind of unique mark is imperceptible to the unaided eye and requires extra handling so as to be seen. This handling can incorporate essential powder strategies or the utilization of synthetic substances. Patent fingerprints can be made by blood, oil, ink, or soil. This kind of unique mark is effectively obvious to the natural eye. Plastic fingerprints are three-dimensional impressions and can be made by squeezing your fingers in new paint, wax, cleanser, or tar. Like patent fingerprints, plastic fingerprints are handily observed by the natural eye and don’t require extra preparing for visibility purposes.


Analysis of Collected Prints


When a print is gathered, the process of examination begins at forensic science laboratory. During investigation, analysts decide if there is sufficient data present in the print to be utilized for distinguishing proof. This incorporates deciding class and individual qualities for the obscure print.

Class characteristics are the attributes that limited the print down to a gathering but not an individual. The three unique mark class types are arches, loops and whorls.

Arches are the least normal sort of unique finger impression, occurring only about 5% of the time. This example is portrayed by edges that enter on one side of the print, go up, and exit on the contrary side. Loops are the most widely recognized, covers 60-65% of the world population. This example is portrayed by edges that enter on one side of the print, circle around, and afterward exit on a similar side. Whorls present a circle sort of ridge flow and covers 30-35% of the population. Individual attributes are those qualities that are unique to a person. They are little inconsistencies that appear within the frictional ridges of palmer region and fingerprint tips and are commonly referred to as Ridge characteristics. The most well-known kinds of Galton’s characteristics or ridge characteristics are bifurcation, ridge endings, and dots or islands.


Comparison of Prints


After examination, unknown fingerprints are compared with the known prints by the forensic fingerprint expert. The unknown fingerprint is collected by specialized forensic experts at the crime scene, and compared with the known fingerprint which is the print of a potential suspect. The Level I of Identification begins with the comparison of pattern found at the unknown fingerprints and suspected fingerprints. Further, if the class characteristics of the two prints are not same, at that point no further examination could be done as like can only be compared with the like. On the other hand, if a class characteristic of both the fingerprints show similarity then the forensic fingerprint expert begins the Level II of identification, i.e. examination of individual characteristics. They examine the ridge characteristics or Galton’s details for fingerprint examination. Depending on how prevalent the ridge characteristics, fewer or more points of comparison may be needed for a positive identification.


Evaluation of Comparison


When the examination is completed by the forensic fingerprint expert, they can make a legitimate assessment. If there are any unexplained differences between the unknown and known fingerprints, then they can exclude the known fingerprint as the source. This means that if the class characteristics are in disagreement, then the conclusion would be exclusion. However, if the class characteristics as well as the individual characteristics are in agreement and if there are no unexplained differences between the prints, the conclusion would be identification. In some cases, neither of these conclusions is possible. There may not be a sufficient quality or quantity of ridge detail to effectively make a comparison, making it impossible to determine whether or not the two prints came from the same source. In these instances, no conclusion can be made and the report will read “inconclusive.” The three possible results that can be made from a fingerprint examination are therefore exclusion, identification, or inconclusive.


Verification of Evaluation


Databases such as AFIS (Automated Fingerprint Identification System) have been created as ways of assisting the fingerprint examiners during these examinations. These databases help provide a quicker way to sort through unlikely matches. This leads to quicker identification of unknown prints and allows fingerprints to be as widely used as they are in criminal investigations.







fingerprint expert for courts

Fingerprint Identification, Evaluation & Examination

Fingerprint is an impression of friction ridges of fingers which is a unique in every individual. The fundamental principle is that fingerprint is an individual characteristic which illustrates that no two individuals possess exact fingerprint pattern. The fingerprint pattern will remains the same throughout the life of a person however; in some circumstances the print may change due to permanent scar or injury or any other skin disease. Each individual possess have general characteristic ridge patterns that allow them to systematically classified.

In criminal investigation era, the fingerprint is the corroborative evidence which is frequently encountered at the crime scene as compared to DNA traces. Not every crime scene contains pool or spatters of blood or any other biological fluid, but it has been touched by someone. The three types of fingerprint could be found at the crime scene are: – Latent, Patent and Plastic Prints. Latent prints are extremely difficult to identify as they are not visible with naked eye. They are mostly detected by performing chemical techniques. Patent prints are visible prints that are easily be identified as such prints are left in a substance like blood, paint, grease etc whereas plastic prints are left over the soft substances like mud, soap, wet putty etc. Therefore; it is an important role of forensic fingerprint expert to examine the crime scene carefully. The forensic fingerprint expert must use his exceptional knowledge in identification, evaluation and analysis of a fingerprint.

The fingerprints are mostly found in theft and burglary cases. Such cases are frequently encountered by police personnels and forensic fingerprint expert. It is not necessary that every time the whole fingerprint is found at the crime scene, there are times when partial prints could be encountered. This is the challenging phase for forensic fingerprint expert to examine individual characteristics of a fingerprint and to compare with the comparative samples. In burglary and theft cases, the fingerprints may be found above, below, inside or outside of almirahs, lockers, drawers, cupboards, office desks, currency etc. such fingerprints are said to be latent prints. As these prints are not visible with naked eye, such prints often require the use of chemical reagents, fingerprint powder or alternate light sources.

After the detection of fingerprint, another challenge faced by the forensic fingerprint expert is to lift the fingerprint without any distortion.

The comparison of questioned fingerprint samples is made with the standard comparative samples by the forensic fingerprint expert. The suspect’s fingerprint is taken for personal identification with the developed latent fingerprints left at the crime scene. The comparative samples of suspect must be taken on ten-digit fingerprint card where inked fingers are taken by rolled method. The ink is spread on the plain slab with a roller until the slab is completely covered with a thin layer of ink and then rolled fingerprints of both the hands are taken on the card. After taking the prints, the prints are enhanced by high quality camera to capture the image of a print and analyze the class and individual characteristics of the fingerprint.

The characteristics that places an individual in a group or in subcategory are referred to as class characteristics whereas the features which are peculiar to one specific subject and covers the small detailing of ridge patterns called Minutiae are referred to as individual characteristics. The broad classification of class characteristics are arches, loops and whorls further these categories are sub-classified as plain arch, tented arch, radial loop, ulnar loop, plain and composite whorls. The individual characteristics which are unique to every individual are examined by forensic fingerprint expert by comparing unknown standards to the known standards.

The fingerprint examination requires immense documentation to record the details of the fingerprints which is done by note making, photography and report-making. These documents are prepared for further use in courtroom testimony.

Brilliant Forensic Investigation Pvt. Ltd. is one such private forensic science organization in Janakpuri, New Delhi, India which deals with cases related to fingerprint development and verification for the personal purpose or legal purposes pertaining to judiciary or police etc. BFI forensic organization also deals with fingerprint analysis and its verification from the documents present in judicial records. Fingerprint analyst appears in the courts as expert witness for forensic report demonstration by testimony and cross examination. The forensic services are available all across the states of India specially in the metropolitan cities like Delhi NCR, Mumbai, Kolkata, Bangalore,.



list of banned Chinese apps in India

In the course of the most recent years, we’ve seen an incalculable number of fights via web-based networking media with respect to prohibiting or boycotting certain applications and administrations. Without fail, when something against assumed national intrigue occurs, we witness such shock against some application and administrations. As of now, in India, it is for the most part a direct result of the Chinese applications that are thought to have had a danger to our country. It very well may be from numerous points of view like phony news and deception, information burglary (data theft), and security.


banned china apps in India

A couple of years back, when the Indian cell phone brands are nearer to terminated, and the ascent of Chinese cell phone brands’ development is end-less, at that point started a pattern to boycott/blacklist Chinese cell phones. It hasn’t got like it was arranged and just stayed as a passing cloud however we continued seeing it occasionally. Presently, with the whole world confronting the novel Corona Virus, Indians have decided to boycott Chinese applications.

Indian intelligence agencies have requested that the administration square or inform individuals to stop use with respect to 59 portable applications connected to China over worries that these weren’t protected and wound up separating a lot of information.

Here’s the list of applications sent by the security establishment to the government to impose a complete ban on Chinese Apps:

  • TikTok
  • Vault-Hide
  • Vigo Video
  • Bigo Live
  • Weibo
  • WeChat
  • SHAREit
  • UC News
  • UC Browser
  • BeautyPlus
  • Xender
  • ClubFactory
  • Helo
  • LIKE
  • Kwai
  • NewsDog
  • Photo Wonder
  • APUS Browser
  • VivaVideo- QU Video Inc
  • Perfect Corp
  • CM Browser
  • Virus Cleaner
  • Mi Community
  • DU recorder
  • YouCam Makeup
  • Mi Store, 360 Security
  • DU Battery Saver
  • DU Browser
  • DU Cleaner
  • DU Privacy
  • Clean Master – Cheetah
  • CacheClear DU apps studio
  • Baidu Translate
  • Baidu Map
  • Wonder Camera
  • ES File Explorer
  • QQ International
  • QQ Launcher
  • QQ Security Centre
  • QQ Player
  • QQ Music
  • QQ Mail
  • QQ NewsFeed
  • WeSync
  • SelfieCity
  • Clash of King
  •  Mail Master
  • Mi Video call-Xiaomi
  • Parallel Space
59 Chinese apps banned by Indian govt

According to the sources, there were inputs that many Android and IOS applications, either created by Chinese developers or propelled by companies or organizations with Chinese links, had the potential to be used as spyware or other malicious ware.

Mobile Forensic Investigation

Mobile forensics is the branch of digital forensics or forensic science dealing with data acquisition from mobile phones or similar electronic devices like tablets, personal digital Assistant (PDA) or handheld PC and GPS devices for investigation purposes. In today’s time, most people possess mobile devices for communication by using calls, messages, MMS services. Multiple application based apps and tools are available in all android and IOS mobile devices to communicate and exchange information’s in the forms of text messages, audio files, video files, GPS locations, photos etc. The crimes using mobile technology are also increasing day by day as criminals find mobile devices as the most convenient way to commutate, exchange their plans as well as to execute digital frauds. It has become a necessity for the digital forensic experts as well as investigating officers dealing with digital fraud or digital crimes to get all the digital information’s like call history, location history, deleted files and folders, deleted chats, deleted messages, MMS, photos, videos, app data, contact lists etc. from the seized mobile devices which may lead to key role in investigation by analyzing the digital information’s. Various mobile forensic tools like UFED, Oxygen Forensic, XRY are used for the data extraction, data analysis, and report preparation.

Mobile Forensics

Mobile forensic investigation processes


Mobile devices are generally seized in order to preserve the digital evidence and to keep the device in the same condition so as to avoid shutdown or turning off of the device by the investigating officer or digital forensic expert. Faraday bags or cases are used to keep the mobile device as these bags prevent any further cellular connection or any communication with the device. The mobile device is kept in airplane mode to prevent further alteration or activities. The investigation officer would risk user lock activation.


Data acquisition is the process of gathering information from mobile devices and their associated media. This process reduces the chance of data loss due to damage or battery depletion during storage and transportation. Mobile device identification is necessary at the beginning of the forensic examination.

The data can be gathered from mobile devices in two different ways:

a)Physical Acquisition: – The physical acquisition is also known a physical memory dump. It is a technique for capturing all data from flash memory chips on the mobile device. It allows forensic tools to collect all remnants of deleted data like deleted call history, contacts, media files, GPS locations, passwords etc. Initially, the received data is in raw format and it cannot be read. Later on, some methods are applied to convert the unread data into a readable form.
b) Logical Acquisition: – Logical acquisition is bit by bit copying of data of the directories as well as files preset on file system partition. It is also known a Logical Extraction. It is a technique for extracting the files and folders without any of the deleted data from a mobile. However, some particular data such as pictures, call history, text messages, calendar, and videos. A software tool is used to make a copy of the files.

What type of digital evidences can be extracted from the Mobile Devices?

1. Call Detail Record (CDRs)
 Call started and ended time/data
 Terminating and Originating towers
 Whether the call was outgoing or incoming
 Call time duration
 Who was called and who made the call

However, the collection of this information depends on the policies of the concerned states.

2.Global Positioning System (GPS): – It is an excellent source of empirical evidence. If the suspect as an active mobile device at the crime scene, GPS can pinpoint or locate his/her location as well as his/her criminal act. GPS also locates the movement of the suspect from a crime scene to the hideout. Furthermore, It helps in finding phone call logs, images and SMS..
3.App Data: – Many apps seek permission during the installation process to access the data. Example – a photo or video editing apps request permission to media files, camera, and GPS for navigation. Database and cache memory of applications like WhatsApp, Facebook, Instagram, Twitter, Google maps, calendar etc. can be extracted.
4.SMS: – The text messages or MMS leave an electronic record of dialogues that can be presented in a court.
5.Photos and Videos (Gallery):– All the photos and videos including the deleted files can be extracted using tools.
6.Contacts: – all the contact list can be extracted using forensic tools.



Following cables or connectors are used to connect the mobile device to work station:-

1.JTAG or Cable Connection used in physical extraction
2.Bluetooth or Cable Connection are used in logical extraction

Forensic Tools Classification System:- Forensic specialists or forensic analysts must understand the several types of forensic tools. The classification offers a framework for forensic analysts to compare the acquisition techniques used by different forensic tools to capture data.

a)Manual Extraction: – It allows extracting and viewing data through the device touch screen or keypad. At a later stage, this data is documented photographically. Furthermore, it is time-consuming and involves a great probability of human error.

Tools: –

 Project A phone
 EDEC Eclipse

  b)Logical and Physical Extraction: – The investigators connect the cellular device to a forensic work station or hardware via Bluetooth, RJ – 45 cable or USB cable. The computer using a logical and physical extraction tool sends a series of commands to the mobile device. As a result, the required data is collected from the phone’s memory and sent back to the forensic work station for analysis purposes.

List of Forensic Tools: –

c)Hex Dump: It extracts the raw image in binary format from the mobile devices. The forensic specialists connect the device to the forensic workstation and push the boot – ladder into the device to dump its memory to the computer. This supplies more information and the recovery of deleted phone’s files and unallocated space.

Tools: –

d)Chip – off: This technique allows the examiner to extract data directly from the flash memory to a cellular device. They remove the phone’s memory chip and create its binary image. This process is costly and requires ample knowledge of hardware. Inappropriate dealing with may make a physical harm the chip and renders the information to recover.

Tools: –

 iSeasamo phone opening tool
 FEITA digital inspection station
 Chip epoxy glue remover
e)Micro Read: This involves interpreting and viewing data on memory chips. The investigators use a high power electron microscope to analyze the physical gates on the chip and then convert the gate level into 1’s and 0’s to discover resulting ASCII code. There is no tool available for micro read.

Our organization deals with cases related to mobile forensics like data extraction from mobile devices, memory cards and cloud data for the personal purpose or legal purposes pertaining to judiciary or police etc. our forensic organization also provides training in the field of mobile forensics using digital forensic UFED tool. Our Mobile forensic expert appears in the courts as an expert witness for forensic report demonstration by testimony and cross-examination. The forensic services are available all across the states of India especially in the metropolitan cities like Delhi NCR, Mumbai, Kolkata, Bangalore etc.


Forensic Handwriting Examination

Handwriting Forensics is the comparative examination between a disputed handwriting and a standard handwriting sample of a suspected writer. Handwriting features of class and individual characteristics or specific writing habits of suspected writers are comprehensively compared for similarities or dissimilarities with the known handwriting sample. “Handwriting is known as brainwriting”. The handwriting is central to the person’s identity. Each person writes in his own unique way which represents the individual characteristic. It is a fact noted by handwriting analysts that most handwriting characters appear similar in some person writing as they learn the same way of constructing and forming the letters in a school. But over the period of time, a person possesses certain individual characteristics in his handwriting which differentiates his handwriting from others.

The credibility of handwriting is questioned when any individual tries to forge or alters the genuine handwriting of a writer. Here comes the role of a forensic handwriting and signature expert who analyze and make comparison between disputed and genuine handwriting samples which are mainly admitted and specimen samples of the writer. The handwriting analysis is a science-based on a notion that no two persons write exactly the same in extended handwriting. The other scientific notion is that not a single individual writes exactly the same all the time. The natural variations always exist in the person’s handwriting as hand cannot work like a rubber stamp. Handwriting is a complex act, highly developed skill, and recurring habit of an individual. The primary purpose of a forensic handwriting and signature expert is to analyze and find the differences in the writing habits between the disputed handwriting or signature exhibits and its contemporary comparative samples.

The forensic handwriting examiners are highly trained and specialized in the field of forensic handwriting analysis and verification. They use intense knowledge and scientific methods to determine the authenticity of a questioned handwriting sample. The questioned handwriting samples need to be compared with the standard handwriting samples. There are certain writing features known as class and individual characteristics that need to be taken into consideration for handwriting verification. Such writing characteristics include movement of the hand, the formation of letters, relative size and proportion of letters and words, interspacing between letters, connecting strokes, slant, alignment, line quality, style, pen pressure, shading, pen position, natural variations, etc are to be examined carefully.

There are times when a writer himself camouflages his own handwriting. The writer deliberately changes his own handwriting by changing the slant of letters, size, and proportion of letters, consciously constructs odd letters, and may deceive other tactics to conceal his handwriting identity. The other challenge in handwriting analysis relates to the simulation which is an attempt to copy another person’s handwriting. The forger tries to make a similar model of the signature on various documents like a Will, invoice, business memorandums, sale deeds, property papers, sale-rent agreements, medical certificates, mark sheets, etc. In such a situation, the forensic handwriting and signature examiner must take sufficient standard samples of suspect in order to make conclusive opinion. The standards (exemplars) must be taken in the court of law. Sometimes, while taking the specimen, the suspect consciously tries to alter or disguise his handwriting so the specimen must be taken on multiple sheets, at different writing speeds to avoid any manipulation or disguising efforts made by him. The comparative sample must not be shown to the specimen writer; the specimen must be taken by dictating it.

Sometimes, the forensic handwriting and signature expert may face a challenging phase in the analysis of anonymous handwriting in cases of threatening letters, extortion money letters, harassment notes, blackmailing letters, or notes where the writer is unknown. In such situations, the forensic expert can infer that whether such anonymous notes or letters are written by some closed one’s who are either jealous or feel competitive or rejected lovers whose intention is to torture, harass mentally, defaming, etc.

Therefore; the advancement of the forgers in performing different tactics gives a lesson to the forensic handwriting and signature experts that they must upgrade their skills and knowledge to mark the conclusive analysis and their opinion based on different cases. If any person feels cheated, by way of forgery or disguised he must consult to forensic investigation expert to get the opinion.

Brilliant Forensic Investigation Pvt. Ltd. is one such private forensic science organization in Janakpuri, New Delhi, India which deals with cases related to handwriting and signature analysis, signature verification, anonymous, or miscellaneous handwritings analysis for the personal purpose or legal purposes pertaining to judiciary or police, etc. The forensic services are available all across the states of India.

-Ravshish Kaur Kohli

Forensic Serology and Biology

The forensic biology and serology is one of the crucial discipline in the field of forensic sciences. Generally, the forensic serology deals with the analysis of blood, serum, saliva, semen, hair
and other bodily fluids to establish the relationship of the perpetrator to the crime scene. The major concern of forensic serologists to collect the biological evidence present at the crime scene in an adequate way preventing them from contamination.

Blood is one of the crucial evidences and can be commonly found at the crime scene like murder, vehicular accidents, sexual assaults etc. The forensic serologists must answer the following questions at the time of examining blood, blood stain or smears:

1) Is it blood or not?

2) Is it human blood or originate from any other species?

3) If it’s human blood then how closely it can be related to the particular individual?

The preliminary step to examine whether it’s a blood or not, various colour tests are carried out by specialised forensic at the crime scene.

a) Phenolphthalein Test (Kastle – Meyer Colour Test)

The phenolphthalein test is based on the haemoglobin pigment present in blood which possess peroxidase like activity. The phenolphthalein reagent and hydrogen peroxidase mixture are applied on the bloodstain, thus causes the formation of deep pink colour. The change in colour indicates the presence of blood.

b) Luminol Test

The luminol test is the most sensitive test to detect bloodstains. The bloodstain shows fluorescence instead of producing colour. The luminol reagent is sprayed on the suspected areas, the emission of light can be viewed and thus bloodstain will produce a faint blue glow.

The confirmatory test is performed in the laboratories to determine whether it’s a human blood or not. One of the confirmatory test for origin of species is precipitin test carried out on bloodstain. The precipitin test involves the reaction of antiserum with the corresponding antigen. Another version of precipitin test is the Gel Diffusion method. The extracted bloodstain antigen and human antiserum is placed at different holes opposite to each other. The line of precipitate forms when antigen and antiserum meet, thus confirming the presence of human blood. The precipitin test gives best result even the blood stain is 10-15 years older.

                                                                                – Ravshish Kaur Kohli

                                                               (M.Sc. -Forensic Science), Amity University

Crime Scene Investigation

A crime scene is place where an offence has been committed and the investigators carefully examine or search the area in order to find probative evidence. The purpose of crime scene investigation is to establish the possible link suspect, victim, witnesses in relation to criminal event.

In the majority of cases such as homicidal, suicidal and accidental, the crime scene investigators as well as law enforcement officers play a significant role in determining proper collection as well as preservation of physical evidence which might be accidently left by the criminal. Proper documentation and photography of a crime scene should be done by specialised and well-trained personnel that could help them to reconstruct the crime scene.

A well-trained crime scene investigator (Investigating Officer) must following basic steps in order to perform proper investigation to maintain the chain of custody:

1. MedicalAssistance to the victim if there is even a remote chance of life.

2. Securingthe crime scene by barricading using barricading tape, rope or cones etc. to protect the entry of unauthorized persons like on lookers, family members, witness etc.

3. Documentationof the crime Scene

a. Photography/Videography (Over view, Mid-range and close up photography)

b. Note Taking (Complete description of the crime scene)

c. Sketching of the Crime Scene (Rough and Final Sketch)

4. Searching of the evidences

a. Strip or line search method

b. Grid Search Method

c. Spiral Search pattern

d. Wheel or Ray search pattern

e. Quadrant or Zone Search pattern

5. Collection of Physical Evidences (Following evidences should be sent to Forensic Laboratory):

a. Victim’s Clothing

b. Fingernail Scapings

c. Hairs (head or pubic hairs)

d. Gun/Bullets recovered from the crime scene or victim’s body

e. Hand Swabs from Shooting victim (for gunshot residue analysis)

f. Semen/Vaginal/Anal/oral Swabs in case of sex related crimes for DNA Profiling

g. Blood/Viscera Samples in case of poising cases

h. Debris collection in case of arson/fire cases

6. Preservation of evidence by-

a. EDTA for blood samples

b. Air dry method

c. NaCl Solution for preserving viscera

7. Packaging of Evidences should be done using

a. Unbreakable plastic pill bottles with pressure lids (hair, glass fibers)

b. Manila envelops

c. Screw cap glass vials

d. EDTA tubes for fresh blood

e. Sealable plastic bags

f. Druggist Fold

g. Paper bags

h. FTA card for collecting DNA sample

8. Naming and Tagging of evidence (complete description of the evidence)

a. Nature of evidence

b. Name of the investigating officer

c. Person collected the evidence

d. Initials of the investigating officers

9. Forwarding Letter in order to send the evidence to the Forensic Science Laboratory.

10. Releasing the Crime Scene for general Public or Family members.

Important Awareness for 2020

DNA Fingerprinting

A modern approach of scientific investigation

DNA fingerprinting is one of the modern and standard method especially in criminal forensic case work. The basic principle behind DNA fingerprinting reveals that no two individual share the same genetic code except for identical twins and those elements of DNA that are examined and used to obtain a match. It cannot be forged or altered in anyway.

To understand the significance and value of DNA as evidence it is necessary to gain basic and explicit knowledge about basic structure of DNA, types of DNA, collection and preservation of DNA sources, extraction and isolation of DNA, DNA importance and its legal perspective in the court of law, DNA profiling procedural and ethical concern and many more.

Brilliant forensic investigation provides high quality DNA fingerprinting services all over India for both private sectors as well as law enforcement authorities like police, armed forces, courts etc. There are two different form of test covered under DNA fingerprinting-


Peace of Mind Test

  1. Paternity Test (With Maternal Involvement)
  2. Paternity Test (No Maternal Involvement)
  3. Maternity Test
  4. Siblingship Test
  5. DNA profiling for Individual Identification
  6. Test for Trisomy of Chromosome no. 13, 18 and 21

Court Approved Test

  1. Paternity Test (with/without Maternal Involvement)
  2. Siblingship Test
  3. Immigration Test for Individual identification
  4. Profiling for identification
  5. Identification of unknown deadbodies by DNA Profiling