[图书][B] Critical forensic studies

R Julian, L Howes, R White - 2021 - taylorfrancis.com
This book provides a comprehensive overview of the emerging interdisciplinary field of
critical forensic studies. It reviews existing research and scholarship on forensic science …

[HTML][HTML] Forensic intelligence-led prevention of drug-facilitated sexual assaults.

P Prego-Meleiro, C Garcia-Ruiz, M Sanz-Pareja… - Forensic science …, 2022 - Elsevier
This work explores the potentially broader contribution of forensic science to preventive
public health through the proactive view promoted by forensic intelligence. For that purpose …

Evaluation of rapid DNA using ANDE™ in a technical exploitation Level 2 laboratory workflow

N Hinton, T Springstead, K Wright… - Journal of Forensic …, 2021 - Wiley Online Library
A trial of rapid DNA (rDNA), a fully automated DNA profiling system, within a technical
exploitation (TE) workflow is an important endeavor. In the 2019 Ardent Defender (AD) …

Developing a strategic forensic science risk management system as a component of the forensic science system of systems

LE Wilson, ME Gahan, C Lennard… - Australian Journal of …, 2020 - Taylor & Francis
Over the last decade, reviews of the forensic science industry have addressed critical system
failures and made recommendations for improvements to the industry. These reviews …

Why do we need a systems thinking approach to military forensic science in the contemporary world?

LE Wilson, ME Gahan, C Lennard… - Australian Journal of …, 2020 - Taylor & Francis
The Australian threat environment has changed as a result of global terrorism and foreign
fighters, which are contributing factors to the blurring of the lines between military objectives …

The black sheep of forensic science: military forensic and technical exploitation

LE Wilson, ME Gahan, C Lennard… - Australian Journal of …, 2019 - Taylor & Francis
ABSTRACT The Improvised Explosive Device (IED) threat faced by coalition partners in Iraq
and Afghanistan required concepts of operations to identify threat actors, network analysis to …

A systems approach to integration of military operations and law enforcement investigations: Toward a unified forensic intelligence model

LE Wilson, MP Kessler, J Ellis‐Smith… - Wiley Interdisciplinary …, 2020 - Wiley Online Library
The changing nature of war in relation to global terrorism, foreign terrorist fighters and length
of conflict has resulted in a transformation of the strategic environment from previous …

Chemical Characterisation and Source Attribution of Inorganic Nitrate-Based Homemade Explosives

JA D'Uva - 2022 - espace.curtin.edu.au
This thesis presents a comprehensive investigation into the chemical characterisation,
identification, and source attribution of inorganic nitrate-based homemade explosives. The …

Case study–crown prosecution of a British citizen for the extraterritorial murder of Sergeant First Class Randy Johnson, United States 2nd Cavalry Regiment

LE Wilson, ME Gahan, C Lennard… - Australian Journal of …, 2021 - Taylor & Francis
ABSTRACT 'Make me comfortable'were the last words of Sergeant First Class Randy
Johnson of the United States 2nd Stryker Cavalry Regiment. The investigation into his …

Use of Criminal Intelligence by Small Law Enforcement Agencies: A Qualitative Case Study

RL Railey - 2023 - search.proquest.com
Criminal intelligence is used by law enforcement. The studied problem was that most small
law enforcement agencies failed to use criminal intelligence. The purpose of this qualitative …