You are on page 1of 207

FORENSIC SCIENCE AND BEYOND:

AUTHENTICITY, PROVENANCE
AND ASSURANCE
EVIDENCE AND CASE STUDIES

lllllll
Annual Report of the Government Chief Scientific Adviser 2015
Forensic Science and Beyond: Authenticity, Provenance and Assurance
Evidence and Case Studies

This volume comprises chapters which form the evidence for the Government Chief Scientific Adviser’s
Annual Report 2015, together with illustrative case studies. It should be cited as:
Annual Report of the Government Chief Scientific Adviser 2015: Forensic Science and Beyond: Authenticity,
Provenance and Assurance. Evidence and Case Studies.

The Government Office for Science would like to thank the authors who contributed evidence chapters,
case studies and their time towards this report and gave it freely.

This report is intended for:


Policymakers, legislators, and a wide range of business people, professionals, researchers and other
individuals whose interests include the use of forensic analysis within the Criminal Justice System through to
authenticity, provenance and assurance in the provision of goods and services.

The report project team was Martin Glasspool, Richard Meadows, Lindsay Taylor, Adam Trigg and Jenny
Wooldridge.

This report consists of contributions received from academia and industry and others outside of
government. The views expressed do not represent policy of any government or organisation.

This report is presented in two parts. The first is the summary report of the Government Chief Scientific
Adviser. This was developed as a result of seminars and the advice of the experts who provided the source
of the evidence. The second part, the evidence, has been gathered from and written by a distinguished
group of experts. The evidence takes two forms: chapters that consider a major aspect of the forensic
landscape; and individual case studies that illuminate points of detail and principle. The evidence section
provides the views of the experts themselves, who met on several occasions during the preparation of the
report and had the opportunity to help to develop the narrative and to comment on each other’s
contributions. The Government Chief Scientific Adviser is responsible and accountable for the summary
report, and the experts for their individual contributions to the evidence papers and case studies. Neither
should be blamed for the sins and omissions of the other!
FOREWORD

My second annual report explores new and emerging forensic techniques so that policy
makers can ensure they are developed and used for the benefit of the UK.

It covers four main areas:

● An overview of the UK’s forensic science landscape from the perspective of its users
● The changing nature of crime (including cybercrime), examining how forensic science can predict,
deter and overtake it
● The forensic application of analytical science beyond the court system
● The steps required to secure the UK’s forensic science sector for the long term, with particular
attention to innovation and new market opportunities.

In producing the report, I have drawn on the knowledge of a range of experts and academics. They
have provided a clear evidence base for each of these four areas. This volume presents that body of
evidence, as well as illustrative case studies.

The chapters and case studies herein represent the authors’ personal views rather than those of the
Government Office for Science, but their insights – for which I am greatly indebted – have
fundamentally informed the messages and questions raised in my report.

Sir Mark Walport


Government Chief Scientific Adviser
December 2015
CONTENTS
SECTION 1: The forensic science landscape
CHAPTER 1: FORENSIC SCIENCE IN CONTEXT 12
Dr Angela Gallop, Axiom International Ltd
Karen Squibb-Williams, Acorn Chambers
DNA ANALYSIS 17
Dr Susan Pope, Director of DNA Principal Forensics Ltd
A PARADIGM SHIFT IN UK FORENSIC SCIENCE 20
Professor Niamh Nic Daeid, Centre for Anatomy and Human Identification,
University of Dundee

CHAPTER 2: FORENSIC SCIENCE IN PRACTICE 24


Gary Pugh, Director of Forensic Services at the Metropolitan Police Service
THE POLICYMAKER’S PERSPECTIVE 27
Amanda Cooper, SRO Digital Policing and Science, Home Office
THE COMMERCIAL PROVIDERS’ PERSPECTIVE 29
Roger Robson, Managing Director of Forensic Access
FORENSIC SCIENCE IN HIGHER EDUCATION 30
Dr Geraldine Fahy, University of Kent

CHAPTER 3: ASSURANCE – STANDARDS, VALIDATION AND ACCREDITATION 32


Dr Josephine Bunch, National Physical Laboratory
UKAS ACCREDITATION: PROVIDING CONFIDENCE IN FORENSIC SCIENCE 34
Malcolm Hynd, External Affairs Manager, UK Accreditation Service

CHAPTER 4: COGNITIVE AND HUMAN FACTORS 40


Dr Itiel Dror, University College London (UCL) and Cognitive Consultants
International (CCI-HQ)
STATISTICS IN COURT 50
Dr David Lagnado, University College London, with contributions from
Professor Colin Aitken, University of Edinburgh

SECTION 2: The changing nature of crime


CHAPTER 5: THE CHANGING NATURE OF CRIME 56
Pete Merrill, Head of Science & Innovation, National Crime Agency
TROJAN OPENS THE GATES TO COMPANY CASH 62
Oliver Smith, PwC Cyber Threat Operations

CHAPTER 6: IDENTITY AND IDENTIFICATION 64


Professor Sue Black, Centre for Anatomy and Human Identification, University of Dundee
SUPERIDENTITY 68
Dr Sarah Stevenage, University of Southampton
71 MANAGING BIOMETRICS
Isabelle Moeller, Chief Executive, Biometrics Institute
73 EMERGING BIOMETRICS IN THE COURTROOM
Dr Lucina Hackman, Dr Chris Rynn and Dr Helen Meadows,
Centre for Anatomy and Human Identification, University of Dundee

74 CHAPTER 7: CYBER FORENSICS


Professor Andrew Blyth, University of South Wales
Matthew Johnson, Chief Technology Officer, Guardtime
80 CHILD ABUSE IMAGE DATABASE
Chris Felton, Safeguarding Directorate’s Online and Digital Lead, Home Office

82 CHAPTER 8: THE GLOBAL PERSPECTIVE


Professor Tim Wilson, Northumbria Centre for Evidence and Criminal Justice Studies,
Northumbria University
90 DISASTER VICTIM IDENTIFICATION: MH17
Detective Superintendent Jen Williams, National Civil Contingencies and Disaster Victim
Identification Coordinator, National Police Chiefs Council (NPCC)
92 FORENSIC ANALYSIS OF CHEMICAL WEAPONS IN SYRIA
Dr Cerys Rees, Head of Chemical and Biological Analysis and Attribution,
Defence Science and Technology Laboratory (Dstl)
94 WILDLIFE CRIME
Dr Lucy Webster, Wildlife Forensic Scientist, Science and Advice for
Scottish Agriculture (SASA)

96 CHAPTER 9: DESIGNING OUT CRIME


Nick Ross, Chairman, UCL Jill Dando Institute of Crime Science
100 ETHICS IN FORENSIC SCIENCE
Chris Hughes, Chair of the National DNA Database Ethics Group
102 DESIGNING OUT MOBILE PHONE CRIME
Nick Ross, Chairman, UCL Jill Dando Institute of Crime Science
105 TRENDS IN VEHICLE CRIME
Mike Briggs, Crime Research Manager at Thatcham Research

SECTION 3: Forensic science: beyond the court


110 CHAPTER 10: AUTHENTICITY AND PROVENANCE
Dr Derek Craston, Government Chemist, LGC
112 NUCLEAR FORENSICS
Dr Vladimír Šucha, Professor Maria Betti and Dr Klaus Lützenkirchen
Joint Research Centre, European Commission
116 PROVENANCE OF NUCLEAR MATERIALS
Dr Daniel Thomas, Nuclear Threat Reduction, AWE

CHAPTER 11: FOOD AND DRINK 122


Dr Vladimír Šucha, Professor Elke Anklam and Professor Franz Ulberth,
Joint Research Centre, European Commission
SCOTCH WHISKY: AUTHENTICITY, PROVENANCE AND ASSURANCE 125
Julie Hesketh-Laird, Deputy Chief Executive, Scotch Whisky Association
STOPPING FOOD FRAUD 129
Sue Davies, Chief Policy Adviser, Which?
EXPLOITING THE MICROBIOME 130
Paul Brereton, Head of Fera International

CHAPTER 12: COUNTERFEIT PHARMACEUTICALS AND METHODS TO TEST THEM 132


Dr Harparkash Kaur, London School of Hygiene and Tropical Medicine
OPERATION PANGEA 138
Gift Minta, Senior Criminal Intelligence Analyst, Medicines and Healthcare products
Regulatory Agency
THE COUNTERFEITING OF HEALTHCARE PRODUCTS 140
David A Tainsh, Chief Product Quality Officer
Nisha Mistry, Senior Investigator (R&D), GlaxoSmithKline

CHAPTER 13: CONSUMER PRODUCTS 142


Melissa Dring, Director of Policy
Robyn Ellison, Policy Officer, Chartered Trading Standards Institute
MAKING THE MOST OF TRADING STANDARDS SERVICES 143
Melissa Dring, Director of Policy, Chartered Trading Standards Institute
Robyn Ellison, Policy Officer, Chartered Trading Standards Institute
CONSUMER PROTECTION AND SOCIAL MEDIA 147
Mike Andrews, National Trading Standards eCrime Team
BLOCK CHAIN – AUTHENTICITY AND PROVENANCE 148
Jessi Baker, CEO of Project Provenance Ltd

CHAPTER 14: ENVIRONMENTAL FORENSICS 150


Professor Ian L Boyd, Chief Scientific Adviser, Defra
ENVIRONMENTAL DNA ANALYSIS FOR WILDLIFE CONSERVATION 152
Dr Peter Brotherton, Director of Specialist Services and Programmes, Natural England
SECTION 4: Securing the future of UK forensic science
162 CHAPTER 15: FUTURE APPROACHES IN ANALYTICAL SCIENCES
Dr Steve Bleay
Dr Neil Cohen
Dr Barbara Daniel, Head of Forensic Science Unit, King’s College London
Ian Elkins, Crown Prosecution Service
Professor Dick Lacey
Shaun Mallinson, Partnerships and Funding Coordinator, CAST
Nick McCoy, Head of Forensic Services, Warwickshire Police and West Mercia Police
Pete Merrill, Head of Sciences, National Crime Agency
Kevin Morton, Director of Regional Scientific Support Services, Yorkshire and the Humber
166 SKILLS AND COMPETENCY FOR THE FUTURE
Dr Anya Hunt, CEO, The Chartered Society of Forensic Sciences
170 FORENSICS AND THE INTERNET OF THINGS
Alastair Cook, Director of Critical Insight Security Ltd
172 NEXT-GENERATION DIGITAL FORENSICS
Graham Bromelow, MCM Solutions

174 CHAPTER 16: ENCOURAGING INNOVATION


Dr Geraint Morgan, The Open University,
Dr Thomas Bassindale, Sheffield Hallam University,
Dr Mark Pearse, LGC
179 INNOVATE UK AND THE FORENSIC SCIENCE
SPECIAL INTEREST GROUP
Dr Meez Islam, Teesside University
181 BIOSENSORS IN FORENSICS
Dr Barbara Daniel, Head of Forensic Science Unit, King’s College London

182 CHAPTER 17: ACCESSING FORENSICS AS A NEW MARKET


Dr Mark Littlewood, co-ordinator of the Forensic Science Special Interest Group,
Dr Gillian Tully, Forensic Science Regulator
185 BRINGING A FORENSIC PRODUCT TO MARKET
Michael Heffernan, CEO of ArroGen,
Kim Sandquist, CSO Chemistry,
Peter Schad, CSO Biology,
John Owen, Managing Director
188 CYBER SCIENCE AND CONSUMER INTELLIGENCE
Stephen Hay, Director, Pilot Lite Ventures
SECTION 1:
THE FORENSIC SCIENCE
LANDSCAPE
THE FORENSIC SCIENCE LANDSCAPE

THE FORENSIC SCIENCE


LANDSCAPE

The interaction between criminal investigation,


justice and science is complex, but offers
one of the strongest safeguards against false
allegation and wrongful conviction.
Digital forensics
10 can recover, analyse and compare
vast amounts of information from
mobile phones, tablets, PCs, CCTV
Traditional types of forensics and satellite data.

DNA Drugs Toxicology

Firearms Footwear Patterns Fingerprints

Blood Spatter Fibres Fire Investigation


In the UK we There are
identify approximately

50,000 25,000
DNA
offenders matches
from crime scenes using between crime scenes
fingerprints each year and offenders
each year

The National DNA Database produces over

2,000 DNA matches a month 11


and has a match rate of over 60% with a
DNA profiles obtained from samples taken
from a crime scene or victim

Cognitive and human factors


underpin many aspects of
forensic work, from the initial The complexity of forensic
collection and evaluation of data
at the crime scene, throughout
science is increasing rapidly.
work in the laboratory where Policymakers and practitioners
evidence is interpreted, to need to work towards
presentation in court.
consistency, collaboration,
clarity and common standards.
THE FORENSIC SCIENCE LANDSCAPE

CHAPTER 1

FORENSIC SCIENCE IN
CONTEXT
ANGELA GALLOP, The privatisation of forensic science services in England and Wales has
Axiom been a resounding success, in some ways: it has saved costs, reduced
International Ltd, case turnaround times, maintained quality and, to some extent, inspired
KAREN innovation. But the way services are procured has become increasingly
SQUIBB-WILLIAMS, fragmented, threatening future innovation and potentially undermining
Acorn Chambers public confidence in the criminal justice process. The UK urgently needs
a national strategy covering all aspects of forensic science that takes

I
account of all stakeholders, not just the police.

n reality there may be no such thing tread patterns on shoes and feet marks inside
as ‘Forensic Science’. Perhaps instead, them; differences between voices; paint and glass
a multiplicity of sciences and scientific fragments on tools; the life cycle of flies; and
methodologies, old and new, when applied assemblages of pollen grains.
to legal questions, become the discipline of Most recently, forensic science has been further
forensic science. These questions are usually transformed by our ability to detect and analyse
associated with the prosecution of crime, but tiny amounts of DNA, found to varying extents
12 they also cover consumer and environmental in every part of the human body and in animals
protection, health and safety, and civil proceedings and plants too (see case study p17). And it can
such as breach of contract and negligence. The now recover, analyse and compare vast amounts
sheer variety of scientific disciplines involved in of information stored on mobile phones, tablets
forensic science can potentially distract focus from and PCs, in CCTV footage and other imagery,
the formation of a coherent strategy for their use as well as incalculable quantities of satellite data.
within the justice system. This seemingly endless list of capabilities also
Forensic science is a term that has come to includes the statistical analysis of the likelihood of
be used over the past century and a half to a probability, which can generate confusion that
describe an increasing number of practices. These potentially weakens the contribution of scientific
began with the observations that fingertips evidence (see Chapter 4).
feature different patterns, and that people write Nevertheless, forensic science has led to a
in different, distinguishable ways; that chemistry much more reliable understanding – and indeed
could help to identify poisons; that the blood shed hard physical evidence of – where, when, how
from different types of injury formed distinctive and by whom crimes have been committed.
patterns; and that different chemical groups It can uncover the nature and likely origin of a
could be used to distinguish blood from different wide range of objects and substances; which of
people. All these were used to clear up mysteries two competing accounts is more likely to be
and help get to the bottom of matters in dispute. right; the extent of an individual’s criminality; as
As analytical techniques and methodologies well as the nature of drugs and firearms supply
developed and experience broadened, it became chains, and who is involved in them. Increasingly,
possible to determine the composition of forensic science is also being used to predict
everyday items such as plastic bags and tracksuit when crimes are likely to be committed so they
trousers; the trajectory of a knife or a bullet; the can be pre-empted and disrupted, and it answers
precise nature of arson and ballistics residues; innumerable other questions across endeavours
the meaning of bone damage; how old a bruise in all sections of society. To this extent, it makes
might be; narcotic traces on bank notes; individual an invaluable contribution to our justice and
characteristics of hair, nails, and teeth and bite security systems and thereby to our economic
marks; the interpretation of simple binary data; and social stability.
FORENSIC SCIENCE IN CONTEXT

THE IMPACTS OF FORENSIC FORENSIC SCIENCE HAS LED


SCIENCE
Forensic science impacts on government,
TO A MUCH MORE RELIABLE
law enforcement, academia, lawyers, judges, UNDERSTANDING – AND INDEED
scientists and technicians, insurers, regulators,
journalists and the public. All of these different
HARD PHYSICAL EVIDENCE OF –
sections of society, as well as different specialists WHERE, WHEN, HOW AND BY WHOM
within forensic science, will have different
perspectives and interpretations about what
CRIMES HAVE BEEN COMMITTED
forensic science is, and what it can and cannot
do.These perspectives go to the heart of our
justice system. For instance, prosecution lawyer s and from those whose focus is solely in the
are statutorily obliged to exercise their own UK to those who also operate internationally.
view of the strengths and weaknesses of the Indeed, some UK forensic providers are foreign
scientific evidence before deciding whether an owned. They include private companies,
investigation can progress to the prosecution public organisations, academic institutions, and
process – this ‘gatekeeping’ decision takes place commercial and industrial operations.
long before a judge is involved in the matter. Their customers are just as varied. The
Legal defence teams need to know whether 43 police services in England and Wales, and
any specific aspects of scientific evidence might associated investigative and law enforcement
usefully be subjected to challenge. How are any bodies (e.g. the National Crime Agency), are
of them to make such assessments without a the largest cohort of customers, and much of
reasonable grasp of the science and scientific what follows in this chapter will inevitably focus
methodology? It follows that where discussion on this area. Prosecution lawyers throughout 13
and formulation of policy regarding the social the UK also represent a large body of users,
utility of the sciences takes place, a very clear despite rarely having any contractual or direct
common language is necessary; this remains an contact with the scientists. But there are many
essential, yet arguably elusive, aim. other organisations that also use forensic science
How then are forensic science providers including, for example, lawyers representing
and those who use their services and products, people accused of crime or acting for one
particularly law enforcement personnel side or the other in civil matters; regulatory
and lawyers, best able to understand and bodies; manufacturers whose products are
maximise the opportunities available to them? alleged to be faulty, contaminated or fraudulent;
Scientific excellence, commercial success private individuals and their professional bodies
and just outcomes depend on the consistent conducting investigations of their own; and
understanding, integration and utility of high- insurers (and their loss adjusters) challenging
quality scientific processes and practices, claims. Rightly, of course, there is no limit
grounded in a fertile, confident environment globally on how the sciences are used, or by
that is supported by a consistent government whom; consequently, those with criminal intent
strategy which includes sufficient funding and and terrorists also make full use of scientific
open, defragmented communication (see case opportunity. In response, the UK must have
study p20). the capability to monitor and analyse such use
While this is a relatively straightforward overtly and, where appropriate, covertly.
concept, the reality is far more complex. There
are many different forensic science providers, A STRATEGY FOR FORENSIC
reflecting the sheer scope and scale of forensic SCIENCE
activity. They range from organisations that As we write this chapter, the government is
specialise in forensic science to the exclusion of currently in the process of developing a national
everything else, to those who do it as a side line; strategy for forensic science. It is clearly critical
from large-scale operations to niche suppliers that the true views and experiences of forensic
of specialist services; from those who are both suppliers are captured during this process. This
customers and providers of forensic services; is not always easy, owing to significant sensitivities
THE FORENSIC SCIENCE LANDSCAPE

It is clearly critical that those with potentially


AS THE MOTHER OF INVENTION, important forensic application are tested, and
ADVERSITY HAS INSPIRED SOME where appropriate, validated and incorporated
into operational use as quickly and effectively as
IMAGINATIVE PARTNERSHIPS BETWEEN possible. But identifying which these might be,
DIFFERENT TYPES OF ORGANISATION and conducting the necessary tests for relevance,
reliability and robustness is a costly and time-
consuming business (see Chapter 3).
Gone are the days when providers might
about investigative customer perceptions of expect to earn sufficient profits from their work
individual firms, which often limit what these to fund all of this R&D themselves. It is difficult
firms are prepared to say openly. for them to compete effectively for external
There are different ways in which forensic funding from research councils and other funding
providers interact with their customers, ranging institutions because historically this has not been
from contracts covering routine testing, to one-off a core skill, and besides, there are few such funds
investigations requiring specific strategies which with a forensic science focus – most are targeted
need continual refinement as work progresses. towards the ‘pure’ sciences (see Chapter 16).
The greatest change in recent times has been in Gone too is the Forensic Science Service (FSS),
relation to work commissioned by the police (see which benefitted from additional direct support
Chapter 2). This reflected the shift from public from government for this purpose. Recognising
to private providers on cost and effectiveness these difficulties, the House of Commons Science
grounds, and the desire by police services to be and Technology Committee commented in its
able to compare products and services of one 2011 report1: “Forensic R&D in the UK is not
14 provider with another on an ‘apples with apples’ healthy, and we call on the Home Office and
basis. To assist with this, a system was devised Research Councils to develop a new national
which effectively broke down forensic services research budget for forensic science”. In its 2013
into their smallest component parts, which report2, the committee wrote that “it remains as
could then be bought and sold as commodities difficult as ever for forensic researchers to obtain
through a national streamlined procurement funding”. While some funds are available from the
process. At the same time, and in an effort to government’s Innovate UK agency, which works
further control and reduce costs, police services closely with the Home Office’s Centre for Applied
started in-sourcing increasing amounts of the Science and Technology (CAST) and other bodies
work themselves, mainly in connection with the in administering them, the process is fairly opaque
initial examination of items for evidential traces. and we know from experience that providers’
Such traces – often on swabs, in scrapings, or on access to such funds remains very problematic.
snippets of fabric – are then submitted for more As the mother of invention, adversity has
detailed analysis to one or more external forensic inspired some imaginative partnerships between
science laboratories. different types of organisation – most notably
The leading forensic suppliers complain police services, forensic suppliers and academic
consistently about the difficulties of continuing to institutions, which have added to the richness
provide services to the various standards required of projects. But a properly developed national
while remaining competitive. They do this in strategy with universal buy-in is required to
private for fear of creating concern amongst provide focus and impetus for research, along
their customers about their resilience and ability withthe necessary funds to ensure the timeliness,
to cope with new procurement awards. This safety and reliability of emerging forensic
inevitably means that funding for activities such as technologies.
research and development suffers, and projects In formulating such a strategy, we need to look
tend to be skewed towards those more directly deeper into the way we deploy forensic science.
related to saving operational costs. A good place to start would be with the attrition
It is in the very nature of science that new rate in criminal cases in England and Wales:
technologies and methodologies constantly specifically, those cases where forensic evidence
emerge from the wider scientific community. was sought during the initial investigation, then
FORENSIC SCIENCE IN CONTEXT

passed to the Crown Prosecution Service (CPS), explore more rigorously what the value of forensic
but which fail to continue to court. Since the early science and forensic analysis is to the criminal
2000s, the authors have been told by a number of justice system as a whole.
Chief Constables and other investigators that only The cost of obtaining forensic evidence and
around 10% of cases involving forensic science using expert witnesses is loosely said among senior
evidence ever reach a courtroom. Is there really police to be second only to salary costs within
a 90% attrition rate? And if there is, what are some law enforcement agencies (there is no
the reasons for it? Is this acceptable, for instance reliable and comprehensive data). Consequently,
through a case ending satisfactorily before reaching exploring and seeking to reduce this significant
court, or does it potentially represent a waste and potentially unjust attrition rate should now be
of public funds? And why does our experience placed alongside all the other key considerations of
suggest that public policymakers do not always forensic science and related strategic policy making.
seem to be fully aware of these operational issues? Effective public policy can only be achieved
Answering these questions would offer valuable through identifying and understanding the real
information for strategic forward planning. In challenges of involving forensic science and
the interests of justice and in the public interest, scientific methodologies in the criminal justice
therefore, it is worth considering a different landscape. In this regard, perhaps much is to be
approach to investigating crimes using forensic learnt by moving the focus away from the intense,
evidence (and necessarily expert evidence) and ‘sexy’ work of police, crime scene investigators
preparing cases specifically for the CPS (rather (CSIs) and forensic scientists, or the dramatic
than the perpetual focus of preparation for the and charismatic nature of the courtroom; and
court room). instead shift it to the ‘backroom’ dynamics and
comparatively dry mechanics of the prosecution
HOW USEFUL IS FORENSIC SCIENCE? process. This is the critical decision-making point 15
It is notable that academic, investigative, political where cases either proceed to court, or are filed
and media attention on forensic science has away with numbers of others that have reached
focused almost exclusively on crime scene the end of the criminal justice road.
investigative input and prosecution process Although a body of research exists into attrition
outcomes in the courtroom (i.e. reported rates of particular crime types, especially domestic
cases). But this only addresses the outcomes of violence and rape cases3, there is a dearth of
about 10% of investigative activity, potentially research in relation to attrition rates associated
significantly skewing any analysis. Indeed, if the with particular scientific evidence types (save
effectiveness of police investigations, and the utility perhaps for the US National Academy of Sciences
of forensic evidence, are to be measured by way Report on Forensic Sciences – see below).
of appearances in the courtroom this may lead While the UK has seen myriad reports on police
to ignoring the 90% of investigations that, hidden investigations, and the use of forensic science, these
from view in the manner hypothesised above, fall have almost always based their conclusions upon
by the wayside post-investigation and pre-trial. those rarefied cases that end up in court, which
Such a lack of reliable, evidence-based information are then available for academic and public scrutiny
about what has occurred in the significant majority and comment. Even when directly informed
of cases could suggest that what is ‘known’ about by operational police or forensic scientists,
police investigative and forensic practice is just the these commentators are sometimes at risk of
tip of an iceberg, and any conclusions based upon commenting from behind a veil of ignorance of
such limited knowledge thus remain conjecture. why cases have been ‘dropped’ by the CPS.
No scientific methodology would recommend So why might the attrition rate be so high? Law
extrapolating findings from just 10% of their enforcement investigation files are subjected to
experiments; and yet, if this attrition rate is in a seven-stage filtering process, defined by the
any way accurate, police officers, criminologists, statutory function of the CPS as cases leave the
forensic scientists, lawyers and judges have been investigative field and enter into the gateway
at risk of doing just that. It may be shown in the of the prosecution process. The application
future that this is not the definitive percentage, of these filters appears to have the effect of
but the figure is less important than the need to reducing the strength of the forensic evidence,
particularly when subjected to the “evidential on the murders found that if processes to share
stage” of the Test set out in the Code for information between between forces were
Crown Prosecutors (7th Edition), which Crown followed and adequate checks were conducted
Prosecutors are statutorily obliged to apply in by the school and the police then Ian Huntley
order to determine whether a case proceeds would not have been able to gain employment
into the prosecution process. These seven filters as a school caretaker.
can be broadly defined as follows: In addition, law enforcement agencies – and
1 Applicable statute and case law in the the politicians responsible for them – rely heavily
jurisdiction of England & Wales on the positive public perception of their role
2 The Code for Crown Prosecutors, 7th Edition to achieve co-operation (‘policing by consent’).
3 The CPS Core Quality Standards This requires favourable media coverage, and
4 The Criminal Procedure Rules they are potentially drawn into a public-relations
5 The Criminal Procedure and Investigations Act, approach which accentuates ‘success’ at tackling
1996 crime, and detecting and convicting offenders.
6 The more contemporary4 principles of The increase in forensic laboratories and the
streamlining Forensic Case Management and diversification of forensic techniques over the
proportionate prosecutions past thirty years, propelled especially by DNA
7 The absence of a contractual relationship testing, has occurred without a corresponding
between forensic science providers and end- efflorescence of published research on the
users, namely the CPS and the court efficacy of such techniques on solving crime
and actually convicting criminals6. Studies7, 8
The second stage of this filtration process, in have shown that forensic evidence did impact
particular, calls for attention because it deals on prosecution rates, though not uniformly
16 with the status of evidence itself – a question – for example, by increasing sentences and
which probes the core of the place of science incarceration, though not actually affecting
within the development of the modern nation whether or not a defendant was convicted in the
state, and one taken up in the work of major first place.
philosophers of science Karl Popper, Thomas Joseph Peterson and Ira Sommers have
Kuhn, and Paul Feyerabend5. According to the shown that the impact of forensic evidence
description of the evidential stage in the CPS’s varied between different kinds of cases. Forensic
Code for Crown Prosecutors, for evidence to be evidence has a strong impact on the rate of
used in court, the prosecutor must be satisfied arrest, charging, and conviction for aggravated
that it is reliable, credible, and admissible. It assault, burglary and robbery, and rape, in
could be that it is in the face of these questions particular6. The same study found that in only
that the findings and methodologies of forensic “~2% of all cases, 6% of cases with crime scene
science encounter significant resistance. evidence, and 12% of cases with examined
Importantly, it may also help to consider evidence” did forensic evidence link a suspect to
whether the ability of the 43 police services of a crime scene or a victim. However, it should be
England and Wales to individually source their acknowledged that this conclusion may, to some
forensic science needs – rather than acting extent, depend on the particular methodology
together as a nationwide ‘super user’ – may have used, as with all research.
fed a tendency for each police service to use Kelly Pyrek has represented forensic science
their scientific and technological capability in a as a mêlée in which “the numerous stakeholders
‘siloed’ manner to excel in achieving individual in the criminal justice system extract from
police service performance indicator targets. forensic science what they need to perpetuate
Such targets are potentially counter-productive their positions”9. Further recent research has
to a national cohesive knowledge sharing highlighted the conflicted agendas in which
approach. Looking wider than forensic science, forensic science is caught. According to Kevin
the Soham murders are perhaps an example Strom and Matthew Hickman, “compared
of the price paid by the public interest for the with reducing crime rates, maximizing case
past lack of unified action and communication solution, conviction, and sentencing rates may
by some police services. The Bichard Report not command the same attention”10. Though
FORENSIC SCIENCE IN CONTEXT

CASE STUDY

DNA ANALYSIS

D
SUSAN POPE, Director of DNA Principal Forensics Ltd

ifferent types of DNA test can one person’s Y profile can be used to include
produce profiles that provide or exclude all of the male blood relatives of the
important investigative leads in person tested, so the number of people profiled
unsolved cases. Imagine a case can be limited. Mitochondrial DNA, inherited
where the body of a person has been found with through the female line, can provide further
multiple stab wounds. There are no witnesses to familial leads.
the incident, but a knife and a tissue were found If the profile obtained from cells on the knife
beside the body. Investigators swab the handle handle shows a mixture of DNA from multiple
of the knife and take samples from the tissue, in donors, then the direct DNA database searches
order to recover DNA from skin cells deposited for that result may be more limited and its
by people who have touched them. intelligence value is decreased. However, once a
Standard DNA tests analyse genetic markers named individual is compared with the mixture
in areas of DNA called short tandem repeats then standard methods for evaluating the
(STRs) that vary greatly between people. By significance can be performed on many mixtures,
testing cells on the tissue, investigators produce with an increasing range of specialist statistical
a full DNA profile that appears to be from a analysis available for complex mixtures. 17
single person. This result can be searched against Specialist investigative tests analyse markers
the profiles of (a) people and (b) other crimes for physical appearance including eye, hair and
held on the National DNA Database. Police are skin colour. These may provide intelligence leads
notified if the profile matches a named person, about the general appearance of the offender
who can then be interviewed. Intelligence in cases where a DNA profile from a crime
information can be obtained if the profile stain has not produced any matches on DNA
matches samples from other crimes. At the same database searches and there is no eyewitness
time, individuals that do not match the profile evidence to describe the offender.
are eliminated from enquiries. In the short term, the police are testing rapid
If no matches are obtained in the UK, the DNA devices that can analyse reference and
police may consider searching international DNA crime samples in two hours, producing profiles
databases. The standard test contains all of the suitable for DNA database searches. This would
DNA markers needed for searches of European provide reference and crime profiles and allow
DNA databases, for example. DNA tests are a suspect to be included or eliminated from an
currently available that analyse more than 24 investigation within custody time limits.
STR areas of DNA, including all of those present Longer-term research is currently directed
in both the European Standard Set and the US towards Next Generation Sequencing (NGS)
CODIS system, enabling wider international systems, which combine and extend all of the
searches. These are not performed routinely in applications listed so far. A single test will not
England and Wales or Northern Ireland, but are only analyse many more STRs, but it will do
used in Scotland. so at a greater level of discrimination. It will
If no matches to named individuals are also include Y chromosome markers, physical
obtained then familial searches for relatives such markers and ancestry informative tests. These
as parent, child or sibling can be performed for are already being used for medical applications,
intelligence purposes. Familial leads for male and similar systems useful for forensic work are
samples can be followed up by testing markers being evaluated for future implementation, once
(called Y STRs) on the Y chromosome, which is suitable DNA databases and methods have been
inherited through the male line. This means that produced, evaluated and validated.
THE FORENSIC SCIENCE LANDSCAPE

they may be important from a justice system whether there is any evidential basis for the
perspective, they may command less attention anecdotal 90% attrition rate, and if so to set out
from the police executive which has more the cause and effect landscape with the clear aim
influence over funding. of supporting future strategic forensic policy in
The authors of a 2005 UK Home Office the justice system.
research study on attrition in volume crime
presented an optimistic picture about the THE CHANGING LANDSCAPE OF
contribution of forensic science in ensuring FORENSIC SCIENCE
conviction in such crimes11. They cited the The ethical status of forensic science has seen
science’s ability to create strong “first links” dramatic changes over recent years. We have
between suspects and offences, as well as the come a long way from the miscarriages of justice
“principal information needed to make a case of the 1970s and 1980s (John Preece, and the
against a suspect”, and that this had changed Birmingham Six, for example) which highlighted
from a previous situation in which forensic shortcomings in laboratory systems and processes
evidence was merely used for corroboration. and heralded the introduction of formal quality
Most importantly, though, they found that management. These days there is a requirement
forensic science did not improve the generally for internationally-accredited quality systems
high attrition rate within volume crime. This in most forensic laboratories (see Chapter 3),
is because forensic evidence was either not except in the newer disciplines such as digital
collected in efficient ways – in household forensics (see Chapter 7), and fingerprints (with
burglary cases, for example, it may be collected its very different origin in the police service),
as a way to reassure the victim, rather than where these are still being developed. A Forensic
because of its likely efficacy – or that it was not Regulator (currently non-statutory) has been
18 collected at all from those crime scenes (such as introduced to develop and oversee standards
vehicle crimes) where it would be more likely to and codes of conduct and practice; although it
prevent attrition11. should be noted that this superintendence only
From recent literature on forensic science, applies to forensic providers to the prosecution.
attrition, and the Criminal Justice System, it may Scientists have also been required to interpret the
be suggested that while the growth of forensic significance of their findings in a more ‘scientific’
science methods and applications has given way, using statistical approaches to support their
cause for optimism, significant discrepancies otherwise almost entirely subjective assessments,
exist in the effective management of the science and to set out the basis of their opinion in their
and its resources. Though the findings of the witness statements so that this can be more
studies cited here have served to circumscribe effectively assessed by others (see Chapter 4).
this problem, none of them have dealt with it to One interesting development is the increase
the extent of offering detailed remedial policy in forensic work being conducted within police
recommendations. The following chapters of this services. Many police services have established
report will help to set out the foundations upon or extended their own forensic screening units
which future government strategy can be built which undertake initial examinations of items
by the integration of well-informed, cohesive and to varying extents. As a consequence of this,
collaborative policy making. external suppliers receive significantly fewer
In addition, Northumbria University is now items for examination or review, and sometimes
funding a research project to explore precisely receive only samples taken from such items. This
the areas of potentially significant attrition equates to a substantial shift in some of the work
described in this chapter. The programme, from external to in-house police facilities. At the
led by Karen Squibb-Williams, will explicitly extreme end of the scale is the Metropolitan
concern itself with the passage of cases involving Police Laboratory, re-created after the closure of
forensic science and scientific methodologies, the FSS. This now provides the vast majority of
from the criminal investigation phase through forensic laboratory services for what is by far the
to the prosecution process, as well as ‘case largest police service in England and Wales. Use of
management’ (which means different things to digital forensics is rising rapidly, reflecting trends in
different organisations). A key aim is to establish modern life, and much of this work is also being
FORENSIC SCIENCE IN CONTEXT

provided from within police services themselves.


This development puts police services in a
THE ETHICAL STATUS OF FORENSIC
position of both hunting criminals, and being SCIENCE HAS SEEN DRAMATIC
responsible for directing and presenting impartial
scientific evidence to the prosecution process
CHANGES OVER RECENT YEARS.
and courts of law. The very act of selecting which WE HAVE COME A LONG WAY
items should be examined for what – irrespective
of who actually does the testing – can have
FROM THE MISCARRIAGES OF
an impact on the outcome of an investigation. JUSTICE OF THE 1970s AND 1980s
(See Chapter 4 for a discussion on the range of
other factors). Of course, there may be nothing
wrong with any of this, but it certainly seems to
be something worthy of public awareness and should not be restricted to just those likely to
debate before it becomes an accepted norm. support the prosecution’s case, as this may limit
Forensic input is also now sensibly and bias interpretations of what the evidence is
commissioned in stages to avoid any unnecessary likely to mean
work. Individual tests are selected in the order in • Work on the same case may be fragmented
which they are most likely to yield information between different organisations. For example,
of use to an investigation (though it should be a police screening unit may examine the items,
noted that prosecuting lawyers are very rarely before one or more external laboratories
involved in this selection process). Where this analyse different samples selected from them.
prompts a guilty plea, no further work needs to This means that no one person is likely to
be undertaken. Wherever possible, the results of have a full picture of the evidence, which is
such tests are reported by way of Streamlined vital to interpret its likely significance in the 19
Forensic Reports (SFRs) that merely contain the wider context of the case. (See chapter 4 for
facts of a test; as opposed to an expert witness a discussion on how separation of parts of the
statement, which considers the results in the forensic process can help to counter cognitive
context of the case and includes a scientist’s bias). This can also lead to the application of the
full expert opinion of what they are likely to Code for Crown Prosecutors and subsequent
mean. At the lowest level, for example, SFRs that presentation of the evidence at court becoming
report a ‘hit’ on the National DNA Database far more complex than it could be
are prepared by police officers. At the next level • Reducing the scope of scientific input to a
up – for instance, if a reference sample profile is series of tests chosen by others, with no time
compared with a crime stain profile – a scientist or opportunity for scientists to advise on the
will be involved,although the output will still be a testing strategy, risks narrowing their skill and
purely factual SFR. knowledge base
It is obvious to many practitioners in the • Focusing on increasingly fewer types of test –
field that these changes have been successful in such as DNA, fingerprints and digital forensics
dramatically reducing police spending on external – may be inevitable to some extent; but it is
forensics. But they have also had a number of also effectively de-skilling scientists. This risks the
unintended consequences that pose a risk of prospect that critical knowledge and practical
miscarriage of justice. These were highlighted skills will diminish, and not be there when they
in the 2014 report of the Independent Police are needed
Commission12, and Angela Gallop and Jennifer
Brown in their 2014 paper entitled ‘The Market Additionally, in the authors’ experience there
Future for Forensic Science Services in England is an extended use of factual SFRs as evidence
and Wales’13. They include, for instance: in contested cases, rather than their originally-
• Dangers from the mere selection of which intended purpose as the staged form of
items are to be examined, and for which evidence or advisory documents (as per the
types of evidential traces. To minimise costs, Criminal Procedure Rules).
it is clearly critical to test as few items as is As we engage with these challenges, a
necessary. But it is equally critical that items reduction in funding for legal defence teams
THE FORENSIC SCIENCE LANDSCAPE

CASE STUDY

A PARADIGM SHIFT IN
UK FORENSIC SCIENCE

I
NIAMH NIC DAEID, Centre for Anatomy and Human Identification, University of Dundee

n 2009, the US National Academy of Sciences understanding and direction.


produced a report – ‘Strengthening Forensic There were two principal outcomes from the
Science in the United States: A Path Forward’1 second Royal Society event. The first was borne
– that provided a robust critique of many of out of a drive initiated by the Lord Chief Justice
the techniques used within forensic science. The of England and Wales, supported by the senior
NAS report (as it has become known) essentially judiciary from across the UK, that the scientific
exposed the stark reality that much of the forensic community should engage more effectively and
evidence currently presented in our courts had efficiently in the communication of science to
little, if any, scientific underpinning. the judiciary and the public (who form the jury).
To catalyse a long overdue disruption to the This project is now under active discussion in
forensic science ecosystem, Sue Black and Niamh a partnership between Niamh Nic Daeid and
Nic Daeid from the University of Dundee secured Sue Black, the Royal Society, the Royal Society of
20 funds from the Royal Society to host a 4-day Edinburgh, the Lord Chief Justice of England and
international event in February 2015. The first 2 Wales and other partners, with the objective
days were an open scientific conference2 where to develop scientific primers for use within the
expert forensic scientists from around the world courtroom.
and senior members of the judiciary discussed The second outcome from the Royal Society
the current health of the community and why the event was the unanimous agreement to source an
warnings of the NAS report appeared to have urgent solution to halt the decline in confidence
been largely ignored. The output from this event attributed to the poor or inadequate scientific
was an anniversary edition of the Philosophical foundations of some forensic science. Participants
Transactions of the Royal Society B3. The meeting identified different types of forensic evidence,
was attended by representatives of one-third of in current use in the court, which caused
all police forces in the UK, the UK forensic science them concern regarding the robustness of the
providers, government agencies, professional bodies, underpinning science. This resulted in a list of 40
45 universities and a range of industrial partners. evidence types ranging from interpretation of
A further 2-day closed event4 then followed complex DNA profiles through to gait analysis.
for selected participants and invited guests. This Participants ranked these in order according to
was an extraordinary meeting, facilitated through value to the court, and used a novel Research
a business modeling approach that generated Gap Analysis Tool (RGAT) to further interrogate
a ‘strategic conversation’. In our experience, the top 10 evidence types according to five pillars
research scientists, forensic practitioners and the of assessment: detection, recognition, comparison,
most senior judiciary had never before spoken interpretation/evaluation and communication.
so freely and openly about the type and nature This highlighted that in almost every case,
of scientific evidence being used in courts and deficiencies were most evident in the comparison,
their shared concerns about the scientific frailty interpretation/evaluation and communication
of some of that evidence. What followed was a aspects of evidence delivery. This has provided
crumbling of the barriers across the discipline- an agreed launch pad for the development of
specific silos within the forensic science ecosystem a novel, disruptive and visionary pathway for
– a genuine effort to see things from the forensic science research requiring strong research
perspective of others, and to derive a common leadership to ensure delivery and sustainability.
FORENSIC SCIENCE IN CONTEXT

to commission checks of the prosecution’s in terms of driving down the cost of services,
scientific evidence means that the safety net of reducing case turnaround times, maintaining
proper independent peer review risks growing quality and inspiring innovation, through market
increasingly thin. competition and professional variety. Without
Adding to the risks is the fact that there is this, police spend on forensics would have been
currently no requirement for forensic scientists much higher, and it is arguable whether some
to be individually accredited. It is still perfectly of the most complex, high-profile cases would
possible for a scientist with an impressive have been solved (including, for example,
academic or industrial pedigree to present those of Damilola Taylor, Rachel Nickell and
themselves as an expert without a proper Stephen Lawrence). But the market remains
understanding of operational facts of life, fragile in areas (see Chapter 2 case study p29).
and how context can turn scientific findings Providers are engaged in what some of them
on their head. An attempt to establish such privately describe as ‘a race to the bottom’
an accreditation body – the Council for the commercially (i.e. that the market is becoming
Registration of Forensic Practitioners (CRFP) – overly competitive, with the dangers that
was abandoned when it became apparent that standards will slip or that firms will withdraw
it was unlikely ever to be self-funding. Other from the market). And the provision of forensic
countries (e.g. the Netherlands) have accepted science to the criminal justice process is
that such funding is a state responsibility. But increasingly fragmented, having been allowed
the UK relies instead on aspects of the quality to evolve with insufficient strategic focus or
systems in place in some laboratories, and direction, and without effective consultation of
voluntary adherence to codes of conduct and all relevant stakeholders.
practice. This is unlikely to be sufficient to The closure of the FSS in 2012 could be
allay concerns about scientists caught up in the regarded as an early example of, amongst 21
prosecution ‘machine’, and experts ‘for hire’ by other things, the harshness of the forensic
the defence. science market. The House of Commons
Much has been learned in recent years Science and Technology Committee report1
particularly from the work of Itiel Dror about on the Forensic Science Service in 2011
the consequences of a range of cognitive biases, concluded that its “dire financial position
or the risk of confirmatory interpretation of appears to have arisen from a complex
scientific evidence (see Chapter 4). Important combination of factors, principally the shrinking
experiments have been conducted with both forensics market, driven by increasing police
fingerprint and more recently DNA experts, in-sourcing of forensic science services, and
which show that their conclusions can be a forensic procurement framework that has
influenced by the information with which they driven down prices and does not adequately
were initially supplied. We need to work hard recognise the value of complex forensic
on developing a better understanding of this services”. When the FSS closed, there was
risk, and finding cost-efficient ways to ensure apparently little that could be ‘saved’ of
any potential bias is filtered out – in relation to the organisation which had hitherto been
experts for both the prosecution and defence. servicing approximately 60% of the external
forensic requirement. We are aware of other
CONCLUSIONS casualties in the market, and of concern about
The UK has a proud and illustrious history in the wisdom of investing in it at the current
forensic science. It has shown that it can take time – as predicted by the 2013 report on
bold and imaginative steps and make them forensic science by the House of Commons
work. It is still the only country (in England Science and Technology Committee, in which it
and Wales at least) to have privatised all of commented that “there is great concern about
its forensic science services for the Criminal the future of the forensics market and that
Justice System (apart from fingerprints, for forensic science providers may not be willing
historical reasons, and the recent trend to invest further in a shrinking market”2.
towards law enforcement in-sourcing). In our view, the UK urgently needs a national
Privatisation has been a resounding success, strategy covering all aspects of forensic science
THE FORENSIC SCIENCE LANDSCAPE

to ensure that it is: one of the most important here is the US


• Reliable and unbiased National Academy of Sciences (NAS) whose
• Used in the most efficient and cost effective 2009 report commented on precisely the
way same sorts of concerns that we have described
• Makes the most of new developments in here14. The report made 13 recommendations,
techniques and methodology which can usefully be summarised as follows:
• Reflective of the needs and purposes of all 1 Create a national institute for forensic
stakeholders sciences
• Properly funded for the job it has to do 2 Standardise terminology and reporting
practices
Unity will be a key element in building the best 3 Expand research on the accuracy, reliability,
environment for the continuing success and and validity of forensic sciences
value of science and scientific methodology, 4 Remove forensic science from administrative
namely via the following qualities across all the control by police or prosecution
relevant sectors of forensic science: 5 Suppor t forensic research on human
• Communication observer bias and sources of human error
• Consistency 6 Develop tools for advancing measurement,
• Collaboration validation, reliability, information sharing, and
• Clarity proficiency testing, and establish protocols for
• Common standards examinations, methods and practices
7 Require mandator y accreditation of all
The factors that work against achieving forensic laboratories and certification of all
this unity include: the different investigative forensic practitioners
22 techniques used across 43 police services; the 8 Laboratories should establish routine quality
different applications of the law (prosecutors, assurance and quality control procedures
Counsel and Judges); the very wide range 9 Establish a national code of ethics with a
of understanding of forensic science among mechanism for enforcement
ministers and their advisers; and the media’s 10 Suppor t higher education in forensic
role in explaining forensic science and its graduate programs to include scholarships
implications to the public. and fellowships
One approach could be to defragment the 11 Improve the medico-legal death-investigation
forensic science community itself. This would system
enable more cost-effective training mechanisms 12 Suppor t Automated Fingerprint Identification
for all applicable agencies, particularly for System (AFIS) interoperability through
law enforcement officers and prosecution development of standards
lawyers; more commercially effective business 13 Suppor t the use of forensic science in
planning (within a free-market model); and, homeland security
most significantly, it could lead to a coherent
streamlined UK-wide strategy for research The impact of science on society is profound:
and development to future-proof the use transport, communications, nutrition, housing,
of forensic science. This would support the energy and security could not be what they are
continuation of three vital objectives: without generations of dedicated scientists and
• Re-positioning the UK at the forefront of support from those who believed in, and funded,
(forensic) scientific development their innovations.
• Enabling the best use of scientific innovation The diversity, utility and powerful impact on
and scientific methodologies in the future society that forensic science now offers must
• Preserving confidence in the legal system and come with a corollary duty to ensure that it
the Rule of Law. is properly used, properly understood and
properly funded well into the future. At the very
To achieve this, we must learn the lessons least, a just society depends on good science
from the past, from other people who have being used for the benefit of all.
considered the same issues at length. Perhaps
23
THE FORENSIC SCIENCE LANDSCAPE

CHAPTER 2

FORENSIC SCIENCE IN PRACTICE


GARY PUGH, Director Forensic science is highly successful at solving crimes, eliminating the innocent from
of Forensic Services investigations, and bringing offenders to justice. But there is a growing need for ‘real-
at the Metropolitan time forensics’, providing accurate and reliable evidence in minutes rather than days.
Police Service The underlying technology is already emerging, but bringing that vision to fruition will
require better coordination between research organisations, forensic service providers,
law enforcement officials and the Criminal Justice System, underpinned by a robust and

F
deliverable forensic science strategy.

orensic science is one of the most widely contribution, allowing forensic science to play a
known and least understood areas of significant role in identifying potential suspects
scientific endeavour. The interaction where there are no investigative leads has a match
between criminal investigation, justice rate of over 60% with DNA profiles obtained from
and science is a complex dynamic with its own samples taken from a crime scene or victim1. With
unique set of challenges, but it offers one of the a shift to cybercrime and the dramatic proliferation
strongest safeguards in the Criminal Justice System of digital devices, the relatively new area of digital
against false allegation and wrongful conviction. forensics is now becoming an integral part of many
Although the end user of forensic science in the investigations and prosecutions (see Chapter 7).
Criminal Justice System is ultimately the courts – However, the core forensic process of assessment,
or indeed the jury – the vast majority of forensic retrieval, analysis, interpretation and presentation of
24 science activity takes place much earlier in the expert evidence is essentially the same for digital
criminal investigation process. forensics as it is for traditional forensics. If there is
From the initial report or allegation of a crime, one constant in the practice of forensic science,
forensic practitioners are engaged in gathering it is that it is changing and evolving in response to
evidence and establishing whether a crime has different challenges and opportunities. These are
been committed. Throughout an investigation, examined in more detail in three case studies in
forensic science will be used to establish the this chapter, which outline the different perspectives
sequence of events, validate the accounts of of commercial forensic service providers (see p29),
witnesses and victims, eliminate and identify academia (see p30) and policymakers (see p27).
potential suspects and provide the basis for a
criminal charge. Once an individual has been CHALLENGES IN FORENSIC SCIENCE
charged with a criminal offence, the forensic Some branches of forensic science – such as the
practitioner will consider alternative scenarios, identification of illegal drugs or the classification
and will also be the subject of close scrutiny and of a firearm – are obligatory, and limited law
challenge within our adversarial criminal justice enforcement activity could occur without
system. There are, of course, a large number of them. Moreover, the information gathered from
crimes in which forensic science does not feature identifying illegal firearms and drugs has an
(such as minor theft). But crimes where there important role in informing our understanding of
is a significant physical interaction between the this criminality, helping to frame legislation aimed
suspect and the crime scene or victim can provide at deterring or reducing crime and minimising
the greatest opportunity for forensic science its impact on society. The challenge for law
to solve the crime, eliminate the innocent from enforcement is to ensure that forensic science is
investigations, and bring offenders to justice. focused on those crimes and opportunities for
In cases involving serious violence, sexually- detection that will provide a useful outcome, given
motivated crimes, and acquisitive crime such as the current climate of limited and reducing funding.
burglary or vehicle crime, forensic science has As powerful as DNA profiling has become in its
made a long-standing and significant contribution. sensitivity and power to discriminate individuals,
The introduction of forensic databases of the major challenge today is to identify the DNA
fingerprints and DNA profiles has enhanced this of the criminal against a background of DNA from
FORENSIC SCIENCE IN PRACTICE

the victim, or a range of other individuals who may IF THERE IS ONE CONSTANT IN THE
have visited the location of the crime. If the DNA
cannot be associated with a particular body fluid
PRACTICE OF FORENSIC SCIENCE,
or cell type, or cannot be related to a particular IT IS THAT IT IS CHANGING AND
activity, then the best DNA science in the world
will have little relevance to the investigation of a
EVOLVING IN RESPONSE TO DIFFERENT
crime by law enforcement agencies. CHALLENGES AND OPPORTUNITIES.
As well as providing a useful outcome for law
enforcement, the challenge for forensic science
practitioners is to produce results in minutes and
hours, rather than days or weeks. The sooner provision of forensic science within a wider strategy.
an offender is identified and apprehended, the This is needed not only to manage risk, but to
less opportunity they have to commit more exploit the agility and access to innovation that
crime; earlier intervention may also reduce future is available from the private sector. However, the
offending or divert individuals from a career of commercial relationships between police forces
crime. The most recent advances in Automated and commercial providers are not mature, and
Fingerprint Identification Systems (AFIS), rapid are based on transaction rather than partnership.
DNA profiling devices, drugs analysers and digital- This is the result of a procurement framework
device data-recovery kiosks provide the prospect based on standardised products that do not allow
of ‘real-time forensics’ that will change not only for innovation or integration between public and
the forensic operating model but the policing and private providers. To ensure a sustainable forensic
investigative models. science provision, it is important that commercial
providers are viable and successful businesses:
COMMERCIAL CONSIDERATIONS consequently, the commercial sector needs to have 25
The UK is the only country in the world to have long-term clarity about the demand and capabilities
introduced the commercial provision of forensic required by the police service and Criminal Justice
science. This can be traced back to April 1991, System in order to make investment decisions.
when two keys changes were made: the formation Real-time forensics will require close
of the Forensic Science Service as an executive collaboration with commercial companies
agency of the Home Office, combining the six and relationships that are based on long-term
Home Office Forensic Science Laboratories and a partnerships. The current provider base will need
Home Office Central Research Establishment into to change fundamentally, reducing its reliance on
one organisation; and the introduction of direct conventional DNA profiling as a revenue stream
charging for forensic science services. in favour of a different business model based on
The advent of direct charging followed a period service integration and on-site or remote testing
of crisis in the late 1980s where staff shortages and analysis. This change will need to be managed
and backlogs led to forensic examinations taking with the commercial sector as partners, but with
many months to complete. Prior to being given a clearly-defined role and purpose that allows for
agency status, forensic science was funded on the major structural change within forensic science to
basis of capitation i.e. the number of police officers realise the benefits and reduce costs.
or establishment. The move to direct charging
was not to introduce a market, but to change the EXPERT EVIDENCE
basis of funding so that police forces would be free There has been keen interest from senior judges
to spend more on forensic science, allowing for in the progress of forensic science, not least from
capacity to increase. the Lord Chief Justice; the admissibility of expert
So the commercialisation of forensic science was evidence was the subject of a very thorough and
by accident rather than design, and the formation detailed review by the Law Commission2 . The
of a stable and sustainable commercial forensic judiciary and forensic practitioners have a common
provision is not an end in itself. While commercial purpose in delivering accurate and reliable expert
companies will have an important role to play in evidence, with quality being non-negotiable. The
forensic science delivery and improvement, there establishment of an independent Forensic Science
needs to be a clear purpose for the commercial Regulator in the UK – the first in the world – is a
THE FORENSIC SCIENCE LANDSCAPE

THE JUDICIARY AND FORENSIC provision of forensic expert evidence. Organisations


cannot give evidence, but they do provide the
PRACTITIONERS HAVE A COMMON framework within which expert evidence is
PURPOSE IN DELIVERING ACCURATE delivered in most areas of forensic science.

AND RELIABLE EXPERT EVIDENCE, WITH COMMUNICATING FORENSIC


QUALITY BEING NON-NEGOTIABLE. RESULTS
Despite these frameworks, there still remains the
challenge of evaluating and communicating the
significance of forensic results, particularly where
strong signal of commitment to ensure the accuracy they are the product of statistical or probabilistic
and reliability of expert forensic evidence. The interpretation (see Chapter 4 case study p50).
Forensic Science Regulator has developed the Over the past twenty years, much thought
Codes of Practice and Conduct3, which provide has been given to the evaluation of forensic
the quality-standards framework for the delivery evidence, drawing on the Bayesian inference (see
of forensic services to the Criminal Justice System Annexe 1) and seeking to ensure that expert
– these apply to all individuals and organisations opinion is robust, logical, objective and based
who undertake forensic examinations. The on sound reasoning. The introduction of a
regulatory framework is important because it puts probabilistic approach to DNA expert evidence,
responsibilities on organisations as well as individuals. using match probabilities such as ‘1 in a billion’,
This is a significant and far-reaching change because has caused some difficulty in the courts. In a
it introduces accountability on senior leaders landmark ruling in 1997 in Regina v Doheny &
(Directors and Chief Officers) to ensure that Adams the judge stated6:
26 accurate and reliable expert forensic evidence is put “… to introduce Bayes’ Theorem, or any similar
before the courts. method, into a criminal trial plunges the jury into
Alongside the development of the forensic inappropriate and unnecessary realms of theory
regulatory framework, the criminal justice system and complexity deflecting them from their
has defined the duty of an expert witness and proper task”
how expert evidence should be provided to Forensic practitioners and lawyers have a long
the courts as set out in Rule 19 of the Criminal way to go to reach a common understanding and
Procedure Rules3. An expert must help the court to a unified approach to the evaluation of forensic
achieve the overriding objective of justice by giving evidence. After all, what does the average jury
an opinion that is objective and unbiased. Justice member understand by the difference between 1
includes acquitting the innocent and convicting the in a million and 1 in a billion?
guilty: it is not the role of forensic staff to support The UK was at the forefront of developing
the prosecution or the defence. Rule 19 has been a framework for evaluative reporting of the
further supported and enhanced by the Criminal results of forensic examination, analysis and
Practice Direction5, published in July 2014, which interpretation. This is based on the principles of
incorporates many of the recommendations of balance, logic, robustness and transparency, as set
the Law Commission review on the admissibility of out in the recently published European Network
expert evidence in criminal proceedings. of Forensic Science Institutes (ENFSI) Guideline
While considerable thought and effort has gone for Evaluative Reporting in Forensic Science7.
into developing the forensic regulatory framework This framework is based on identifying at least
and the provision of expert evidence, these two two competing propositions, representing the
important frameworks for ensuring the accuracy and prosecution and defence positions. The forensic
reliability of forensic evidence have been developed practitioner evaluates the forensic results at
in isolation of each other. There needs to be some source and activity level.
acknowledgement within the Criminal Procedure • Source level would apply to the results of DNA
Rules of the forensic regulatory framework; of profiling or a fingerprint comparison, and relate
organisational responsibilities; and of the need to to propositions such as the claim that a person
achieve accreditation. Accreditation demonstrates was not inside a premises. The competing
a level of control, commitment and rigour in the propositions could be that “the bloodstain came
FORENSIC SCIENCE IN PRACTICE

CASE STUDY

THE POLICYMAKER’S
PERSPECTIVE

T
AMANDA COOPER, SRO Digital Policing and Science, Home Office

he Home Office is responsible for glass. A kitchen window and an internal glass door had
policymaking and legislation for been broken and computer equipment and phones
the use of forensic science in law stolen, along with the keys to the family car. When a
enforcement. We advise ministers crime scene investigator (CSI) attended the scene
of the risks and opportunities in this area, as well as they identified that the offender had cut themselves
running the national DNA and fingerprint databas- and left blood on the internal door.
es. In that context, we see our role as setting the The blood from the internal door was deemed
strategic direction rather than influencing operation- suitable for processing using RapidHIT® and a result
al policing directly. was obtained from a speculative search of the DNA
For example, we support and encourage police Database within a few hours. The search matched
to make the most of the opportunities offered with a suspect already being held in custody, but who
by the Police Innovation Fund (PIF). Worth £70 was denying any involvement in the crime. Once the
million for 2015/16, the PIF is designed to incentivise potential forensic evidence obtained from RapidHIT® 27
collaboration, support improved police ICT and was put to the suspect he admitted to the burglary.
digital working and enable Police and Crime As a result of this, the police were able to recover the
Commissioners to invest in other innovative deliver y majority of the stolen property and return it to the
approaches with the potential to improve policing rightful owner.
and deliver further efficiency in the future. The rapid result enabled the offender to be
All bids are subject to a robust and objective charged and remanded to court the next day,
assessment against the published criteria. This therefore reducing the officer’s investigative time and
involves an initial panel assessment, followed costs, and avoiding the costs of any bail. Overall, the
by further consideration by a senior oversight time from a CSI attending the scene to charging an
group that provides advice to ministers. All of individual was approximately 48 hours.
the successful bids have the potential to improve Alongside ensuring that a new piece of technology
efficiency and contribute to improved value for can be effectively used in the investigation of crimes,
money for the taxpayer. the role for policy is to ensure the wider consideration
For example, Lancashire Constabulary was of areas such as legislation, market impact, regulation,
successful in its bid for innovation funding to pilot and Criminal Justice System (CJS) efficiency and
RapidHIT® DNA profiling. This technology can reforms. All of these areas need appropriate handling,
deliver a DNA profile within 2 hours, which is then and any changes to methodologies across the supply
speculatively searched against the National DNA chain of investigations must be considered in the
Database. If a match is obtained, it is verified by context of systems thinking.
conventional DNA profiling of a duplicate sample. Addressing how aspects of forensic science in the
Lancashire Constabulary is currently in year 2 of CJS are governed and organised is a core element of
their pilot and is using it to process blood stains from current work on the Home Office Forensic Strategy,
crime scenes in cases such as burglary and vehicle particularly the regulation of activities, the early
crime. There have been a number of successful support on experimentation and the introduction of
outcomes using this technology. For example, new technologies and applications. Achieving this in a
RapidHIT® played a pivotal role in the case of a way that keeps pace with technology development
recent residential burglary. The resident had been and with changing crime types and crime modus
asleep but was awoken by the sound of breaking operandi is a key objective.
THE FORENSIC SCIENCE LANDSCAPE

from the defendant” or “the blood stain came operational and business models that is needed to
from an unrelated individual”. deliver significant improvements.
• At activity level, the forensic practitioner There have been major technical advances
addresses more complex interpretative issues in fingerprint search algorithms, next-generation
about the actions of individuals in committing sequencing, facial identification and digital
or being the victim of a crime. This will require forensics. To harness and coordinate research and
knowledge and understanding of persistence, development of these technologies, and to develop
transfer and background levels of forensic contact the real-time forensics capability, there needs to
traces such as body fluids or gun shot residues. be an academic effort that draws together and
This knowledge can be used to evaluate the coordinates universities and research organisations.
evidence, by assigning probabilities to the findings We could also look to international collaboration: for
(given each of the competing propositions) to example, the EU 2020 Horizon programme offers
produce a Likelihood Ratio. This is of greater the opportunity to work with European forensic
value to the courts, but the forensic practitioner agencies.
needs to have a full understanding of the context For policymakers in government, the goal
of the case, and what is alleged by the parties must be to come forward with a coherent
involved. To bring some consistency to the strategy – or at least a strategic framework – for
evaluation and expression of the value or weight the development of forensic science in the UK,
of the forensic evidence, forensic experts can use recognising all of its complexities and challenges.
a verbal scale that is based on a Likelihood Ratios Central to this is the next generation of science
and ranges from “no support”, to “moderate and technology that will deliver rapid results and
support” through to “extremely strong support” offer a wealth of information about criminals
for one proposition over the alternative. It will from the contact traces they leave on the victim
28 take some time for the courts to fully embrace or at the crime scene. This will also bring to the
this approach but in my experience there is fore the importance of ethical and human rights
wide acceptance and support for this across the considerations to the forensic arena (see Chapter
forensic profession. 9 case study p100). The growth of cybercrime
will also see radical changes in the role of forensic
CONCLUSION science and the need to develop new tools and
Forensic science constitutes a relatively small part technologies to apply the traditional forensic
of the overall scientific effort in the UK. As such, it process to the virtual environment (see Chapter 7).
has never sustained a substantial academic research The common theme for policymakers who are
base, instead relying on innovation in other fields (e.g. developing a strategy for forensic science is the
medical, pharmaceutical or semiconductor sectors) need for a consistent and corporate approach to
and then adopting new technologies as they emerge. delivery, development and governance across the
However, this situation has reached a low point forensic science sector. This does not necessarily
in the last five years, with a small and fragmented mean a single organisation, but it does argue
research base in forensic science that does not allow strongly for a means of engaging all of the partners
for the effective development and implementation within a governance and strategic framework
of large-scale innovation and the application of that allows for the delivery and development of
new science8. There is no central government forensic science in a way that sustains the current
organisation that has a track record in delivering capability, improves performance and knowledge
innovation in forensic science and expert evidence sharing, and reduces cost. This will require a much
to the Criminal Justice System. greater degree of government coordination and
Given the range of scientific and technical collaboration between professions to deliver
developments in other fields, the focus for innovation stability, innovation and change. The benefits are
in forensic science should be to take advantage of substantial and achievable – but the risks of failure,
science and technology that already exists or to resulting in the degradation of forensic capability in
develop science that is well advanced (see Chapters England and Wales, are equally substantial and will
16 and 17). What is lacking is an organisation or be much more costly.
structure that will translate this to forensic science
and bring about the transformational change in
FORENSIC SCIENCE IN PRACTICE

CASE STUDY

THE COMMERCIAL
PROVIDERS’ PERSPECTIVE

I
ROGER ROBSON, Managing Director of Forensic Access

t is difficult to accurately determine the cases. It also raises significant concerns about a
revenue generated by the UK commercial growth of unsolved cases in the future.
forensic services industry. As awareness There are also growing questions about how
of the relevance of forensic skills in other much responsibility the police should have for
industries increases, and technology develops, there providing independent, unbiased and objective
is undoubtedly a broader range of customers. scientific evidence. The US National Academy of
This might be expected to result in an increasingly Sciences’ report ‘Strengthening Forensic Science in
buoyant UK commercial forensic market. the United States: A Path Forward’3 recognised this
In some areas that is certainly the case. However, as a problem back in 2009. As I write this case study,
the largest influence on the market is inevitably the UK government is currently drawing up a much-
exerted by its largest customer: the police service. needed strategy for forensic science provision over
Following the closure of the Forensic Science Service the next 5 years.
in 2012, the police rapidly accelerated its in-sourced Meanwhile, the profession remains determined 29
forensics capability and reduced its out-sourced to overcome the current difficulties. The financial
capability1, and it seems likely that this trend will cuts have prompted a sense of urgency for research
continue. and implementation of new technologies. It
This decision, together with a reduction in remains extremely difficult to get funding for basic
recorded crime and further cuts in forensic research into forensic science projects, but this has
spending, has contributed to an increasingly fragile encouraged collaboration between commercial
commercial market. In 2013, this was recognised providers, industrial and academic partners. Apart
as a significant risk by the House of Commons from improving services through competition, the
Science & Technology Committee2, and in my view commercial providers have also formed associations
nothing has happened to change this since then. such as the Association of Forensic Science Providers
While venture capitalists consider their options as and now work in unison on certain projects.
the UK commercial market continues to decline, Markets inevitably change over time, with
those remaining companies in the UK market are provision of services dictated largely by customer
now chasing overseas business to remain profitable. demands. Commercial providers have to respond
Indeed, the Science and Technology Committee2 increasingly quickly to meet the changing trends
and commercial forensic-service providers are asking in crime and counteract new tools used by the
questions about whether the UK market will survive. criminal fraternity. At a time when we have so much
The reduction in market size2 has been new technology to bring to forensic science, we
accompanied by a shift in emphasis between need to remember the importance of a holistic
different forensic disciplines. Traditional areas such approach that helps to ensure that we use the right
fires, firearms and trace evidence (such as paint, glass techniques at the right time in the right sequence
and textile fibres) have dramatically decreased in to ensure reliability, robustness and value for money
favour of DNA and fingerprints, and the exponential from forensics. If these are lost, it would damage our
growth of digital forensics. Consequently, not only Criminal Justice System and public confidence in it.the
is the market much less attractive to potential right time in the right sequence to ensure reliability,
investors, but it may be more difficult to put together robustness and value for money from forensics. If
the elegant scientific investigation strategies that these are lost, it would damage our Criminal Justice
helped to solve some of the UK’s most high profile System and public confidence in it.
THE FORENSIC SCIENCE LANDSCAPE

CASE STUDY

FORENSIC SCIENCE IN
HIGHER EDUCATION

T
GERALDINE FAHY, University of Kent

he Quality Assurance Agency for consist of two groups: generic standards and
Higher Education (QAA) defines area-specific standards3. The problem is that
forensic science as “the application myriad disciplines can combine with the term
of science to serve the purposes ‘forensic’, making it extremely difficult to teach
of the law” . Rapid changes in forensic science
1
‘forensic science’ in a university setting. In reality,
– stemming from policy responses, increased there is no single subject called ‘forensic science’,
commercialisation and the advancement of and attempting to educate students under this
scientific techniques2 – have led to an increase in umbrella term produces a lot of people with
undergraduate and graduate courses in overview knowledge of different subjects, but
forensic science at UK universities. But these with insufficient detailed practical experience in
courses suffer from a mismatch between what any of them.
is taught and what the industry actually requires, For example, the only career path that
30 which urgently needs to be addressed. Given utilises the majority of focus areas covered in an
that tomorrow’s forensic scientists are those we undergraduate forensic science course is that
train today, it is paramount that we get these of a Scene of Crime Officer (SOCO). However,
academic courses right. even this job requires further training that is
Universities are businesses, and often use specific to the police force you work for, and
a degree in forensic science as a selling point in some cases a degree may not be necessary
to help feed the constant demand to increase to get a SOCO position. As a result, most
student numbers. Courses with a ‘forensic’ prefix universities try to ensure that their graduates
appear more attractive and are often easier have learned transferable skills that increase their
to market than chemistry or biology courses. chances of gaining employment, often outside
At undergraduate level, these courses offer an forensic science.
overview of a wide range of laboratory and The rapid rise in forensic science
field techniques such as microscopy, analytical undergraduate courses across the UK means
chemistry, DNA analysis, ballistics, fire and that increased learning and teaching quality
explosives, trace evidence, incident investigation is vital, particularly at a time when so much
and expert witness training. Some undergraduate attention is paid to accountability in teaching
courses, and many postgraduate courses, also across UK universities3. Courses already need
provide an opportunity to learn more specialised to be accredited by The Chartered Society of
disciplines such as forensic anthropology, Forensic Sciences (CSFS), using standards that
archaeology, botany, entomology, odontology, cover the main aspects of incident investigation
podiatry, digital forensics, and so on. and digital forensics4. However, the applicability of
Yet there are currently no requirements these standards and their correspondence with
for both A-level biology and chemistry for the the QAA forensic science benchmark criteria are
majority of UK forensic science undergraduate not always clear-cut. For example, while digital
courses. Consequently, a large amount of the forensics is an area that has grown rapidly in
first year at university is spent training students recent years, and is itself an area of accreditation
in basic laboratory skills. QAA benchmark under the CSFS, it is only touched upon briefly
standards for forensic science education at in the QAA guidelines and remains a small part
undergraduate and graduate levels essentially of most general forensic science undergraduate
FORENSIC SCIENCE IN PRACTICE

COURSES SUFFER FROM A MISMATCH BETWEEN WHAT


IS TAUGHT AND WHAT THE INDUSTRY ACTUALLY
REQUIRES, WHICH URGENTLY NEEDS TO BE ADDRESSED.
GIVEN THAT TOMORROW’S FORENSIC SCIENTISTS
ARE THOSE WE TRAIN TODAY, IT IS PARAMOUNT
THAT WE GET THESE ACADEMIC COURSES RIGHT.

courses. That makes it virtually impossible for lack of job opportunities (even unpaid) and
an undergraduate student on a forensic science the associated high cost to either a student or 31
course to fully grasp this technologically complex a university, this is unlikely to be feasible. The
sub-discipline without completing a specific second option is to do away with courses
digital forensics course. with the generic title ‘forensic science’ and
At the heart of the problem with forensic focus more on subject-specific forensics at
science courses is a distinct lack of understanding undergraduate level: forensic DNA analysis,
between educators and course developers, and forensic anthropology, forensic toxicology, and so
the forensic science industry. While more and on. Retaining the ‘forensic’ prefix should ensure
more universities and programme convenors that courses remain attractive, but offer a much
have links to industry, and ask for input towards greater depth of training and experience.
course design, many develop courses based
on programme outlines of similar courses in
other universities, or using the QAA Forensic
Science benchmark standards, none of which
address real-life needs of forensic science
providers. Additionally, resources and course
learning outcomes required by universities
can sometimes limit the amount of practical
training that undergraduates receive. The ethos
of forensic science is that no two scenes or
incidents are the same and should be viewed
without preconception. However, many forensic
science role-play activities in universities concern
standard ‘common’ scenes and incidents.
There are two ways forward. Firstly, if the
content of forensic science undergraduate
courses remains the same then a year in
professional practice must be included as a
standard component. However, given the distinct
THE FORENSIC SCIENCE LANDSCAPE

CHAPTER 3

ASSURANCE –
STANDARDS,VALIDATION
AND ACCREDITATION
JOSEPHINE BUNCH, Quality assurance (QA) demonstrates that methods are fit for purpose before they are
National Physical implemented, and ensures that they remain so during use. This is underpinned by an
Laboratory increasingly well-defined quality system, overseen by the Forensic Science Regulator (FSR).
Additional confidence could be realised by awarding statutory powers to the FSR, as well as

Q
implementing further regulation to assure the skills of practitioners and providers.

uality assurance (QA) refers to selection, instruction and use of experts. Recent
the range of practices employed updates to the criminal justice procedure rules
to ensure that measurements provide guidance around the validation of
and evidence are reliable, methods used by witnesses1.
including internal and external quality control. The importance of quality assurance
QA demonstrates that analytical methods are procedures in forensic science is now well
fit for purpose before they are implemented – recognised, and confidence in forensic science
32 this involves an assessment of the equipment, and forensic science providers is underpinned
standard operating procedures and the provision via an increasingly well-defined quality system,
of trained staff who make judgements about overseen by the Forensic Science Regulator
their findings. QA also provides ongoing (FSR). Forensic quality standards in the UK
evidence that the methods remain fit for comprise two international standards (ISO17025
purpose. for accreditation of laboratory activities2 and
For all laboratory-based methods, assurance ISO17020 for scene of crime analysis3) and
procedures should be based on a system of the FSR Codes of Practice and Conduct, which
standards, validation and accreditation. Where detail the requirements of forensic service
required, measurement traceability ensures that providers at organisational, technical and
all steps in a procedure can be queried and practitioner levels. Expert witnesses are bound
validated by reference to documented results, by the Criminal Procedure Rules and Criminal
calibrations and standards, through an unbroken Practice Directions4, which work alongside the
chain of comparisons that all have stated FSR Codes of Practice and Conduct to increase
measurement uncertainties. Forensic science the overall assurance of forensic science quality.
laboratories or providers have a significant This framework provides a mechanism to
role in providing reliable and credible evidence objectively demonstrate the reliability, accuracy
that may be presented as part of a criminal and limitations of methods, and the competence
investigation or a trial. of the organisations supplying forensic science.
Forensic science providers may be private
companies, government agencies, public THE FORENSIC SCIENCE
organisations, academic research departments REGULATOR
and law enforcement agencies, based in the The post of FSR was established in 2007 and is
UK or internationally. The majority of expert currently held by Dr Gillian Tully. The Regulator
witnesses for forensic science are engaged by the is a public appointee, sponsored by the Home
police at the investigative stage of a criminal case. Office, who ensures that the provision of
However guidance from the Crown Prosecution forensic science services across the Criminal
Service (CPS) also provides prosecutors with Justice System (CJS) is subject to an appropriate
practical guidelines on issues relating to the regime of scientific quality standards. The
ASSURANCE – STANDARDS, VALIDATION AND ACCREDITATION

Regulator has jurisdiction throughout England CONFIDENCE IN FORENSIC SCIENCE


and Wales; the Scottish and Northern Irish
authorities follow the Regulator’s standards on AND FORENSIC SCIENCE PROVIDERS IS
a voluntary basis5. The Regulator does not have UNDERPINNED VIA AN INCREASINGLY
statutory powers to enforce compliance, and the
government has undertaken a consultation on WELL-DEFINED QUALITY SYSTEM.
whether this should be the case6.
The Regulator’s priorities and aims5 are to
see that forensic science services are delivered
to appropriate standards and that they are carrying out laboratory activities mandated that
tailored to meet the needs of the CJS. To FSPs hold ISO 17025 accreditation with respect
achieve this, the FSR recommends certain to all DNA profiling and fingerprint enhancement
aspects of quality and working practice, typically work. The UK opted out of these EU criminal
by requiring providers to work in accordance justice measures, removing the legal obligation to
with internationally recognised quality standards. comply with the ISO standards. However, national
Forensic service providers are then subject to policing leads have independently agreed that all
independent assessments to ensure that these police facilities undertaking these services would,
requirements are met. The FSR collaborates in fact, comply with the stated requirements on a
with the authorities in Scotland and Northern voluntary basis.
Ireland to achieve UK-wide quality standards. An
important role of the FSR is to represent the UK ISO STANDARDS AND FORENSIC
in European and international quality initiatives. SCIENCE
The Forensic Science Advisory Council (FSAC)7 ISO is the world’s largest developer of voluntary
advises and supports the regulator, giving advice international standards, providing specifications 33
on many issues, including monitoring compliance for products, services and good practice, with
with laboratory quality standards, standards the aim of helping to make industry more
relating to national databases, and validation of efficient and effective10. ISO standards are
new technologies. developed through an international consensus
The Regulator requires that forensic science and can be can be normative (specifying what
providers (FSPs), whether in the private sector or must be done e.g. a particular test method) or
within policing, academia or public sector, operate informative (providing information). Standards
under accreditation to a suitable international help to ensure that technology and methods
standard; and that their laboratory activities are developed and made available for use by
comply with the Regulator’s Codes of Practice practitioners in an open and robust manner.
and Conduct by October 2017. The ‘Codes The ISO/IEC 17025:2005 standard2 specifies
of Practice and Conduct for forensic science general requirements for the competence of
providers and practitioners in the Criminal Justice testing and calibration laboratories. The ISO
System’8 outlines the quality requirements for accreditation document covers the provision of
providers of forensic science services into the opinions and interpretation of evidence, while
CJS. It is a firm requirement within the codes the UK Accreditation Service (UKAS) provides
that all providers of accredited services shall be additional guidance on the assessment of
compliant with ISO/IEC 17025:2005 (ref. 2), and evidence11.
for scene work to ISO/IEC 17020:2012 (ref. 3). ISO/IEC 17025 is most easily applied to
However, accreditation rules are not consistent objective tests: for example, the determination
across all areas of forensic science. Some of drug concentration or blood alcohol level.
disciplines have stand-alone codes of practice, In these cases, the measurement method
and pathologists, for example, are regulated employed is documented and validated such
through a different system. that all appropriately trained staff will obtain
Accreditation is also approached on a results with the same stated uncertainties within
voluntary basis with respect to EU regulations9. defined, numerical limits. Equipment used to
The EU Framework Decision on the make the measurements must be maintained
accreditation of forensic service providers and calibrated. Visual inspection, qualitative
THE FORENSIC SCIENCE LANDSCAPE

CASE STUDY

UKAS ACCREDITATION:
PROVIDING CONFIDENCE IN
FORENSIC SCIENCE

F
MALCOLM HYND, External Affairs Manager, UK Accreditation Service

orensic science plays an essential of staff, the validity of the techniques used,
role in the effectiveness of the the suitability of the equipment and the
Criminal Justice System (CJS). To appropriateness of the environment where
sustain confidence in that forensic examinations are performed.
information, it is important to consider how it These standards are not used exclusively for
is produced: not only in terms of its scientific forensic science, so UKAS uses an additional
accuracy, but also to show that samples are guidance document3 (ILAC G19) that details
handled appropriately to avoid contamination, further expectations in the forensics area. If
and to demonstrate the impartiality and in- the organisation demonstrates that it meets
34 tegrity of the staff undertaking the work. This all the relevant criteria then it will be granted
assessment of organisations offering forensic accreditation for specific activities. However,
science services is known as accreditation. accreditation is an on-going process that
However, the term ‘forensic science’ covers requires annual surveillance visits and a full
a multitude of different fields, ranging from reassessment every four years.
the conventional analytical techniques used in UKAS is a signatory to international mutual
the identification of drugs through to more recognition agreements with accreditation
interpretive examinations of handwriting or bodies in other countries, so there is assurance
blood pattern analysis. It also covers new and that the forensic science services delivered
constantly developing areas such as digital by UK-accredited organisations would also
forensics and cybercrime. The challenge for be recognised overseas. In the same way,
those involved in accreditation is to define the accreditation bodies in other economies use
expectations that must be met by such diverse the same standards and guidance documents,
and evolving areas, while offering the same so the results provided by laboratories
confidence in the delivered outcome. accredited by them can be equally well-trusted
As the UK’s sole national accreditation body, here. This becomes ever more important
the UK Accreditation Service (UKAS) visits as crime, particularly cybercrime, transcends
organisations that undertake forensic work to international boundaries.
assess and evaluate their compliance against Indeed, the fast-moving developments in
the internationally recognised standards ISO/ cybercrime present particular challenges for
SO/IEC 17025 for laboratories1, and ISO/IEC forensic laboratories and accreditation. For
17020 for scene of crime2. These standards the laboratories, data that can be stored
include requirements to implement an anywhere in the world is increasingly difficult
appropriate management system, including to identify and access, and ever more complex
policies and procedures for internal auditing, encryption methods need to be circumvented.
control of documents, management of Accreditation assessments similarly need to
complaints and the definition of key roles and keep up with technological developments, and
responsibilities. They also include technical suitable technical expertise secured, to ensure
requirements relating to the competence that assessments can be carried out from a
ASSURANCE – STANDARDS, VALIDATION AND ACCREDITATION

STANDARDS HELP TO ENSURE THAT


TECHNOLOGY AND METHODS ARE
DEVELOPED AND MADE AVAILABLE
FOR USE BY PRACTITIONERS IN AN
OPEN AND ROBUST MANNER.

examinations and computer simulations are


included in the definition of an objective test12.
However the standard may also be employed in
more subjective analyses, such as the verification
position of knowledge. of practitioner skill in fingerprint or footwear
In the UK, a mixture of private and mark comparison. These activities, while largely
public sector organisations provide forensic subjective in nature, can (with the right training
science services. As such, the government and assessment) produce consistent outcomes
appointed a Forensic Science Regulator between different forensic practitioners.
(FSR) to ensure that all these services Guidance on evaluative interpretation of scientific
were subject to an appropriate regime of evidence is also in preparation by the FSR.
quality standards. The FSR has, through The FSR’s supplementary information in
their Codes of Practice and Conduct4, the Codes of Practice and Conduct provides
identified accreditation as a mechanism to additional relevance and significantly extends 35
demonstrate the application of appropriate the usefulness and scope of ISO standards
quality standards and has defined clear for use in forensic sciences. Nonetheless, the
expectations with respect to accreditation standard covers many important aspects of
for all organisations providing forensic assurance, including validating the method is fit
services to the Criminal Justice System. for purpose; evaluating the qualifications, training
These expectations include deadlines and experience of the staff; maintenance and
for gaining accreditation against the core calibration of equipment; sampling practices;
forensic disciplines, including body fluid testing procedures; traceability of measurements;
recovery, fingerprint enhancement, digital and accurate reporting. As such, it is clearly an
forensics, fingerprint comparison, and crime important quality standard for many forensic
scene examination. assessments.
Accreditation provides an effective A traceable calibration is an unbroken chain
framework for providers of forensic of calibration back to a national measurement
science services to develop and improve lab and the International System of Units (SI
their systems – this results in greater units) of measurement. Through reference
consistency, both internally and with to the internationally-agreed definition of
their peers. The ongoing assessment by an SI unit, traceable measurements establish
UKAS provides independent confirmation confidence in measurement data by ensuring
of continued compliance, and has also consistency of measurements. They also enable
promoted greater transparency by meaningful comparison with other instruments
encouraging organisations to report any or measurement methods, and are essential
quality issues. This prompts demonstrable requirements of quality assurance procedures
and appropriate actions to deliver further for the highest-level assurance of methods within
improvements in their services. the ISO/IEC 17025:2005 standard.
While traceable calibration is important for
a range of analytical methods (e.g. analysis of
drugs, measurement of sample toxicity and
DNA analysis), many forensic science activities
THE FORENSIC SCIENCE LANDSCAPE

rely on reference data produced internally to from calibration certificates, manufacturer’s


the forensic laboratory or within the forensic specifications, from calculations or from
community. These may include comparison published information).
against reference samples, or determination of When it is not possible to fully quantify
inherent physical properties, for example. The measurement uncertainty, ISO17025 allows
validation and traceability of data contained for the identification of sources of uncertainty,
within these databases is of critical importance while requiring efforts to minimise these effects.
if they are to be used successfully by experts The resulting limitations of measurement must
within a court of law in assessing the significance then be disclosed to the customer; effective
of forensic evidence. To this end, more could be communication within this matter is crucial
done to promote open data policies, increase to promote good public understanding of
data transparency between organisations, and the probabilities and uncertainties of forensic
enable knowledge sharing. In promoting this measurement, and how the presented
activity, it is important to develop and enforce measurements translate into a reliable verdict
clear standards for the format of data within when considered with all other evidence.
forensic databases, including definitions of The majority of international accreditation
measured quantities, declaration of measurement bodies have now adopted ISO/IEC 17025 as
units, and standardisation of any required the basis for accrediting testing and calibration
metadata (i.e. those data describing the laboratories. This international adoption
conditions of measurement). allows countries to establish agreements
ISO/IEC17025:2005 requires that “testing among themselves. These Mutual Recognition
laboratories shall have and apply procedures for Arrangements (MRAs) are crucial in enabling test
estimating uncertainty of measurement” when data to be accepted between these countries
36 carrying out analytical measurements. The UKAS and vital to transnational working within an
publication M3003 (2012)13 recognises “the accredited framework. Of particular importance
present state of development and application is a multi-lateral mutual recognition arrangement
of uncertainties in testing activities is not as called the International Laboratory Accreditation
comprehensive as in the calibration fields”. Cooperation (ILAC) Arrangement. ILAC is the
However, it states that the “laboratory should primary international authority on laboratory
use documented procedures for the evaluation, accreditation and has produced comprehensive
treatment and reporting of the uncertainty”. guidelines for forensic science laboratories15.
Additional commentary on the uncertainty of In recognition of the interdependence of
measurement is provided within guidance from accreditation and metrology, and a need to
the FSR (Laboratory accreditation (FSR-G-201 coordinate the actions of the Bureau International
Guidance: Validation (2014)14). des Poids et Mesures (BIPM) and ILAC in tasks
Assessing measurement uncertainty is an relating to national and international measurement
integral part of laboratory quality valuation infrastructure, the International Committee for
because every measurement is subject to Weights and Measures (CIPM) and ILAC signed
some uncertainty, which should be expressed a Memorandum of Understanding (MoU) in
as the quantified doubt about the result of November 2001 (reaffirmed in 2012)16. A Joint
a measurement. There are many possible CIPM/ILAC17 Working Group consisting of BIPM
sources of uncertainty, including the measuring and ILAC members was established in view of the
instrument (e.g. bias, drift, noise), ‘imported’ CIPM-ILAC MoU.
uncertainties (e.g. calibration uncertainty, ISO/IEC 17020:2012 (ref. 3), the
operator skill, sampling issues) and the international standard relating to crime scene
laboratory environment (e.g. temperature examinations, should be read in conjunction
and air pressure). Methods for evaluating with ‘IAF/ILAC-A4:2004 Guidance on the
uncertainty from individual components include Application of ISO/IEC 17020’ (ref. 15) and
uncertainty estimates using statistics (usually ‘EA-5/03 Guidance for the Implementation
from repeated readings), and uncertainty of ISO/IEC 17020 in the field of crime scene
estimates from any other information (e.g. investigation’18. Several other ISO documents
from past experience of the measurements, contain relevant guidance for aspects of digital
ASSURANCE – STANDARDS, VALIDATION AND ACCREDITATION

forensics, such as ISO/IEC 27037:2012 (ref. 19), The five key requirements are:
which provides guidelines for specific activities 1 To comply with the Codes of Conduct and
in the identification, collection, acquisition and Practice set down by the independent Forensic
preservation of potential digital evidence. It Science Regulator
should be noted that this is only a guidance 2 To ensure that Quality Standards and
document and not an accreditation standard. A Assurance processes are applied, which are
Digital Forensics Validation Guidance document nationally consistent and compliant with
is in preparation by the FSR, due for release appropriate ISO standards, UKAS accreditation,
this year. EU directives and clear development and
validation processes
VALIDATION AND REQUIREMENTS 3 To provide clear communication and
OF THE CROWN PROSECUTION interpretation of scientific processes,
SERVICE procedures, strengths, weaknesses and meaning
The FSR requires FSPs to ensure that 4 To engage with Streamlined Forensic
all methods routinely employed within Reporting (SFR) process associated with
the Criminal Justice System, whether for proportionate prosecution requirements
intelligence or evidential use, will be validated 5 To be fully aware and compliant with Criminal
prior to each use on live casework material. Procedure and Investigations Act Disclosure
Validation is a critical aspect of quality and Expert Witness obligations, including
assurance, and is defined by the FSR as the disclosure of details or algorithms and
“confirmation, through the assessment statistical analysis.
of existing objective evidence or through
experiment that a method, process or device ASSURANCE IN R&D AND
is fit (or remains fit) for the specific purpose INNOVATION IN FORENSIC 37
intended. The provider must demonstrate the SCIENCE
reliability of the procedure in-house against Future progress in academic and commercial
any documented performance characteristics research, and the development of new methods
of that procedure”. Establishing the intended for forensic science applications, will require
use and limitations of a developed method are new standards to be developed. It is the FSR’s
important aspects of validation. A validation role to assist with these activities. The typical
exercise should establish key performance development of new ISO standards involves:
indicators such as accuracy, precision and 1 Research leading to peer reviewed publication
limitation (see Figure 1). 2 Experimental validation via international inter-
The responsibility for validation rests with laboratory studies to establish (i) Repeatability
the forensic science provider, not the FSR, and of measurements made by the same method,
will be reviewed as part of any accreditation by the same laboratory, by the same operator,
assessment by the accreditation body, normally on the same equipment within a short
UKAS24 (see case study p34). The Regulator period using identical test material and (ii)
should only be informed of the intention to Reproducibility of measurements made by
implement a new method if the introduction the same method, but carried out by different
of a scientific method has not previously been laboratories, different operators and different
employed within forensic science in the UK, or equipment, using identical test material. Inter-
where analysis of the impact to the Criminal laboratory studies are used to develop a
Justice System suggests a significant change in protocol, which forms the basis of the new
capabilities. standard
Additional quality assurance is provided by 3 Submission of new work item proposal to ISO
the CPS, which requires compliance with the 4 Various ballots in ISO, development of an
FSR’s Codes of Practice and with international international consensus and progression of
standards. The CPS has provided a paper draft to published standard
outlining the core foundation principles that
must inform any providers of forensic science Accreditation of new methodologies can
analysis for use in the Criminal Justice System25. be a long and expensive process. The
Figure 1: Outline of the validation process for forensic science methods

Determine end-user requirements and specification

Undertake risk assesment of method

Set agreed specification and measurable acceptance criteria

Generate validation plan

Perform validation exercises & establish reliability of the method

Assessment of acceptance criteria compliance

Production of validation report and record of approval


38

Issue statement of validation completion

Pilot testing

Live use on casework material

First CPS case management test


Multi-
agency
review
First court case

2011 Home Office ‘Report on Research overcome these challenges by bringing together
and Development in Forensic Science’20 those with potential solutions and those who
identified the forensic research landscape as have identified the challenges”. In setting up
fragmented, and recommended increases in formal collaborative activity, the SiG is helping
linkage and communication between forensics address traditional innovation challenges such as
R&D stakeholders, in order to drive forward ownership of intellectual property.
innovation more effectively. The Forensic Science Changes to existing governance processes in
Special Interest Group (SiG) at Innovate UK forensic service procurement might also help
has identified a series of sector challenges, and to standardise the approaches undertaken by
has set up a Forensic Science UK Innovation different FSPs, and bring new techniques to
Database21 to encourage “collaboration to market. The Forensic Market Management
ASSURANCE – STANDARDS, VALIDATION AND ACCREDITATION

Team (FMMT) within the Home Office runs varying degrees of conformity depending on the
the National Forensics Framework, which allows requirements of the end user (the CJS at one end,
the police to purchase forensic services from and perhaps consumer protection at the other).
private sector suppliers22. Forensic services
are categorised into 13 product types (e.g. CONCLUSION
DNA, drugs, footwear, and toxicology) and sold The five requirements from the CPS, together
with details on the precise nature and level of with the FSR’s Codes of Practice and insistence
service required, timescales for delivery, and the that providers adhere to internationally
quality and reporting standards to be met. The recognised standards, form the basis of an
introduction of the FMMT procurement process increasingly well-developed forensic quality
resulted in substantial reductions in the price of system in the UK. International mutual
services23. recognition agreements between international
In addition, due to the non-statutory nature of bodies of accreditation and measurement
the Regulator, in-house forensic services within committees help to ensure that this quality
individual police services do not have to follow infrastructure is fit for purpose on a global scale.
the same procurement framework as private- The forensics landscape is clearly challenging
sector FSPs. Private sector FSPs have raised a from the perspective of assurance, requiring
concern that this may result in some in-house guidance for objective and subjective
laboratories being able to offer cheaper services assessments, delivered to wide ranging end-
by delaying the significant investments required users. An additional layer of confidence in this
to meet and maintain the relevant ISO standards, framework will likely be realised through the
as it is seen as a cost burden to comply22. If found award of statutory powers to the FSR, essential
to be the case, the net result would be market if the FSR is to effectively force providers to
distortion unfavourable to the private-sector FSPs, comply with expected quality standards. 39
who would have to squeeze margins to compete Further regulation is also required to
on price terms, resulting in a loss of profit available improve the assurance of the quality of skills of
to channel back into research and development. practitioners and providers. The UK and Ireland
Research and development is a necessarily Association of Forensic Toxicologists (UKIAFT)
risky endeavour; the presence of large fixed recommends roles and responsibilities that
costs around accreditation of new technologies should be covered by personnel within a forensic
can therefore be a barrier to innovation. Forensic science laboratory, and provides some suggested
science has parallels to other sectors, such as guideline about the qualifications and experience
aerospace and pharmaceutical development, they would expect for staff at different levels,
where simple deregulation is not an option due but minimum requirements should also be
to safety concerns. In an increasingly litigious and demanded by the FSR. Several organisations
risk-averse society, the regulations in these areas offer staff development opportunities: a series
tend to become more stringent. At the same of qualifications, as well as other continuing
time, this must be balanced by need to drive professional development (CPD) opportunities,
technological change for better social outcomes are provided regularly by The Chartered Society
in these sectors, which requires streamlining of Forensic Sciences, and The Forensic Science
of regulation. In forensic science, it is the goal Society has recently developed a number of
of ensuring that justice is served, rather than Certificates of Competence26.
maintaining physical safety, that drives the need These provide a mechanism by which
for accurate and fail-safe process. individuals can demonstrate their competency,
Regardless, there may be significant but to date these have not been widely adopted
opportunities for the forensic science community or required by the regulator. Transparent
in looking to other sectors that have similar recommendation from the FSR of the minimum
high-cost-of-failure markets, to analyse their expected formal qualifications, training and
approach to quality and assurance in order to experience of staff within FSPs, and accredited
share best practice. For instance, accreditation programmes of training and development, will
need not necessarily be a binary factor: one could help further improve the quality of forensic
envisage an operating spectrum of assurance with sciences in the UK.
THE FORENSIC SCIENCE LANDSCAPE

CHAPTER 4

COGNITIVE AND
HUMAN FACTORS
ITIEL DROR, University Even with major advances in forensic science, the human examiner will
College London (UCL) continue to play an important role in most forensic decision-making.
& Cognitive Consultants Forensic work often involves interpretation and subjectivity, and hence
International (CCI-HQ) cognitive and human factors are important to ensure high-quality
forensic decisions. To maximise objectivity and decision quality, forensic
examiners should receive cognitive bias training and should evaluate only

T
contextually relevant information.

he human examiner plays a critical • Selective attention is a fundamental cognitive


role in many forensic domains mechanism that allows the brain to focus on
(often it is the human examiner some information while ignoring the rest
who is the ‘instrument of analysis’). • Chunking information together reduces the
Forensic work often involves human perception, cognitive load by changing how information is
interpretation, evaluation, judgment and decision- encoded and represented
making. Therefore forensic work is shaped by, and • The brain is active in processing information:
depends on, cognitive and human factors. These it is not only driven by the data, but uses
40 underpin most aspects of forensic work: from conceptually-driven information processing. In
the initial collection and evaluation of data (e.g. at cognitive terms, ‘bottom up’ information (what
the crime scene, in determining where and what comes in from the world) is driven by ‘top
to look for, and whether the data is of sufficient down’ information (what is already in the brain).
value to send to the laboratory); throughout the Top-down information, such as past experience
work in the forensic laboratory, where evidence and expectations, governs what information is
is interpreted and conclusions are reached; to processed and how it is processed.
the presentation in court and to other end users
who are the customers of forensic work (e.g. how These, and many other cognitive processes1,2,
they understand and integrate the information). enable the brain to function efficiently and
Maximising the use and benefit of forensic effectively even though it has limited resources.
science, while minimising cognitive bias within The use of such cognitive processes is a
forensic work, requires educating practitioners characteristic of human intelligence and develops
and implementing cognitive best practices. with experience and expertise.
The implications of how the brain processes
HUMAN COGNITION information are far reaching. We do not ‘see’
The cognitive system underpins much of what the world as it is (naïve realism): instead, it is
we do. How information is perceived, mentally mediated by how the brain processes it, which
represented, compared, evaluated, and how we is a function of complex cognitive architecture.
reach decisions are just a few of the cognitive Take, for example, Figure 1 – count how many
operations carried out in the brain. One of the ‘F’s are in the box (try it).
fundamentals in human cognition is that our This illustrates that the human mind is
brain and cognitive system has limited resources. not a camera: it does not passively process
In simple terms, the amount of information information, it uses past experiences and
input for processing exceeds the computational expectations to guide information processing. In
recourses of the brain. other words, it is intelligent. As we learn more
The brain and cognitive system have adapted and have more experience – as we become
to this challenge by developing a variety of experts – we develop, use and rely more
mechanisms, including: and more on such processes4 (e.g. selective
COGNITIVE AND HUMAN FACTORS

FORENSIC SCIENCE
FINISHED FILES ARE THE RE Forensic science consists of many different
SULT OF YEARS OF SCIENTI domains that utilise different types of evidence.
FIC STUDY COMBINED WITH However, in many forensic domains it is the human
THE EXPERIENCE OF YEARS… examiner that is central to the forensic work (this
is true in the UK, the US, as well as anywhere
Figure 1: Count how many ‘F’s are in the box
above (please try before continuing). Most people else that forensic work is carried out). The main
see 3 or 4, some 5, but people rarely see all of the reason for this is that there are many subjective
Fs: there are actually 6 of them. The reason that judgements that underpin forensic work.
many people miss some of the Fs is because we are During initial evidence gathering at the crime
experts in reading. Our base-rate experience tells
us (via our unconscious brain) that words such as scene, the crime scene investigation (CSI) examiner
‘of’, ‘the’, and ‘a’ do not carry much meaning and is required to make many decisions, most of which
weight, and therefore, based on our expectation, are subjective. First, they need to decide where to
we tend to automatically ignore them3. look for evidence, and what kind of evidence they
will look for. The CSI is guided by their experience
and expectation. Second, as they look for evidence,
attention, chunking information and reliance on they need to determine whether what they have
top-down information). It is important to note found is actual data (a ‘signal’ such as blood) or just
that these processes occur without awareness: it an artefact (‘noise’ such as dirt). Third, if what they
is a cognitive bias, not an intentional bias. find is actual data, then they need to subjectively
Although such cognitive processes are effective assess the quality and quantity of the evidence
and efficient, they also can lead us astray. By relying to determine if there is sufficient information to
on shortcuts, such as using our expectations warrant its collection and sending it to the forensic
and past experiences to selectively attend to laboratory (e.g. shoe prints found at the crime 41
some information while ignoring the rest, we are scene can be of such low quality and quantity
cognitively biased5. These biases are widespread of information that they do not merit collection,
and have many forms5, and only increase with documentation, and having the forensic laboratory
expertise4: as we have more experience, we are examine them further). Such decisions are critical,
more driven by top-down, conceptually-driven as evidence not collected and sent to the forensic
cognitive processes. These processes and biases laboratory is often lost forever.
are especially powerful when subjective decisions Once evidence is received in the forensic
are involved or when the data is low quality, laboratory, then examiners have to analyse it.
ambiguous, and difficult to determine (as is often Often that process is subjective. Fingerprints,
the case in forensic evidence). for example, are defined mainly by their minutia
Another example of bias is base-rate – the characteristics in the flow of the friction
expectation. When experience provides a clear ridge (see Figure 2).
expectation of the outcome, then that base-
rate expectancy drives our conclusion, even in
the face of contradictory data. If X-ray security Figure 2: Different characteristics (minutia)
screeners in airports do not encounter bombs, present in the friction ridge of fingerprints (e.g.
then they develop an expectation to not find when a ridge divides or ends).
bombs, and are therefore more likely not to find
a bomb even when it is present in the X-ray. Ridge Ending
Similarly, when medical monitors in intensive
care units (ICU) sound false alarms very often,
Enclosure
then the medical staff are likely to ignore
them6. The reason for these biases is that, with
experience, the brain has picked up regularities Bifurcation
in the information it receives and then uses them
to guide future information processing. This is
effective, but it biases how new information is Island

processed.
THE FORENSIC SCIENCE LANDSCAPE

Table 1: The inter-reliability of fingerprinting. Different latent fingerprint examiners looking at the same fingerprints
(A to J) lack consistency in the number of minutia they observe7.

Latent Fingerprint

A B C D E F G H I J

Examiner 1 22 9 15 8 9 3 22 11 7 10

Examiner 2 21 11 25 7 10 9 9 10 6 5

Examiner 3 19 9 18 10 7 9 15 19 6 6

Examiner 4 21 21 29 14 12 9 8 9 4 8

Examiner 5 17 16 15 11 16 9 7 12 5 5

Examiner 6 20 14 22 9 10 7 13 18 7 9

Examiner 7 22 17 15 10 10 8 11 24 8 11

Examiner 8 9 9 19 6 9 8 18 16 9 10

Examiner 9 30 15 25 10 12 12 19 22 12 17

Examiner 10 25 13 18 13 12 10 13 15 7 10

MIN 9 9 15 6 7 3 7 9 4 5

MAX 30 21 29 14 16 12 19 24 12 17

SD 5.49 4.01 4.93 2.49 2.45 2.32 4.25 5.15 2.23 3.54

range 21 12 14 8 9 9 12 15 8 12
42

These minutiae play a critical role in forensic conclude that they were fired from the same
fingerprinting. However, their presence is gun, or whether two fingerprints are ‘sufficiently
subjectively determined. This is evident by similar’ to conclude that they are from the
the lack of reliability and consistency among same person, etc. The subjective nature of such
fingerprint examiners (see Table 1)7. forensic decisions arises from the lack of criteria
The subjectivity in determining the or definition of what constitutes ‘sufficiently
fingerprint characteristic is further apparent similar’.
when examining the lack of consistency of With such subjective decision-making, it is
expert’s judgements with themselves, i.e. their not surprising that different forensic examiners
intra-reliability. Not only are examiners not can reach different conclusions. This pertains to
consistent with one another, but the same many forensic domains, including mixture DNA
forensic fingerprint examiner looking at the (even when identical procedures are used)9,
same print is not always consistent with their and even when statistical tools are used10.
own judgment (see Table 2)7. In fact, in about 10% of the time, the same
The subjectivity underpinning forensic fingerprint expert, examining the same pair of
work is not limited to the perception of fingerprints, will reach different conclusions11.
the evidence, but also to the actual forensic Subjective decisions do not only underpin
conclusions. In many forensic domains, forensic the comparative forensic domains (where
examiners need to decide whether two evidence from the crime scene is compared
patterns are ‘sufficiently similar’ to conclude to a suspect), but also include many forensic
that they originate from the same source8: for domains, such as blood spatter analysis, forensic
example, whether two handwriting patterns anthropology and fire investigations. The
are ‘sufficiently similar’ to conclude that they subjective decision-making even sometimes
were written by the same person, or whether pertains to domains such as drug analysis
two bullet cartridges are ‘sufficiently similar’ to (when one needs to determine if a new
COGNITIVE AND HUMAN FACTORS

designer drug is ‘sufficiently similar’ to an to determine the source of a blood pattern, a


established illegal drug). highly complex and subjective cognitive process.
A briefing that it was caused by a gunshot, or a
A PROBLEMATIC CONCOCTION briefing that it was caused by a knife stabbing,
Taken together, the natures of human cognition influences how they perceive and evaluate
and of forensic work produce a problematic the blood spatter. Similarly, if they come to a
concoction. Humans are prone to cognitive crime scene expecting it to be a real burglary,
bias, and that is especially pronounced when or expecting it to be an attempt at insurance
information is of low quality and open to fraud, also affects what evidence is collected
different interpretations (as is often the and how.
case in forensic evidence) and even more
so when subjectivity is involved. That makes 2. At the forensic laboratory
cognitive bias a real issue in forensic science, The human examiner at the forensic laboratory,
as outlined in a recent briefing to the Houses making subjective evaluations and decisions, is
of Parliament12. It is important to note that this often aware of potentially biasing contextual
relates to cognitive biases that occur without irrelevant information (such as whether the
intention or awareness, and that these issues suspect confessed to the crime, if eyewitnesses
pertain to most aspects involved in forensic identified the suspect, whether the detective
work13. Below I discuss the potential of biases believes the suspect is guilty etc). Such
to affect different aspects and stages of forensic information is irrelevant to the actual forensic
work. work, but it is nevertheless highly biasing.
The cognitive biases at the forensic
1. At the crime scene laboratory also arise in many forensic
Before the CSI even arrives at the crime scene, procedures, such as verification. Often forensic 43
before they actually see any evidence, they conclusions are verified, but they suffer from
are briefed. This biases their examination and a number of cognitive weaknesses. First, the
decisions at the crime scene. Take, for example, verifications are not blind: the verifier often
a CSI who arrives at a crime scene and has knows who did the initial examination, what

Table 2: The intra-reliability of fingerprinting. The table presents the difference between the number of minutia that each
expert observes while examining the same fingerprint (A to J) on two separate occasions, i.e. zero indicates consistency7.

Latent Fingerprint

A B C D E F G H I J

Examiner 1 1 1 4 1 1 2 3 2 0 1

Examiner 2 8 3 5 1 1 2 2 5 2 2

Examiner 3 1 3 3 3 6 4 9 9 1 2

Examiner 4 2 3 2 5 0 1 1 0 0 1

Examiner 5 6 2 2 3 4 1 3 3 0 3

Examiner 6 9 4 2 1 4 6 0 5 1 1

Examiner 7 0 4 5 2 4 3 3 7 0 0

Examiner 8 3 1 4 0 6 2 1 4 2 0

Examiner 9 4 3 9 0 4 4 3 1 1 3

Examiner 10 1 0 0 1 4 1 4 1 0 0

Mean 3.5 2.4 3.6 1.7 3.4 2.6 2.9 3.7 0.7 1.3
THE FORENSIC SCIENCE LANDSCAPE

TAKEN TOGETHER, THE NATURES how they integrate it within other lines of
evidence (see case study, p50).
OF HUMAN COGNITION AND
OF FORENSIC WORK PRODUCE A RESEARCH ABOUT COGNITIVE
BIAS IN FORENSIC SCIENCE
PROBLEMATIC CONCOCTION. Until about a decade ago, there was very
little research into the performance of human
forensic examiners. The issue of whether they
can be biased by irrelevant context, as well as
they decided and why. Second, identification their inter – and intra-reliability, had basically
decisions are almost always verified, and hence not been studied in any depth. However,
introduce a base-rate bias (see above). in the past few years we have seen a big
increase in researching this area (both within
3. At court forensic science as well as in other scientific
The presentation of evidence in an adversarial domains19).
legal system is inherently problematic. Although The growing literature includes meta-
the court wants to rely on and use science, analytically quantifying the reliability and
science is often misused and abused in the biasability of forensic experts20, as well
court. Science within the adversarial system as specific research studies showing that
is used by the prosecution to make a case irrelevant contextual information can
that the suspect is guilty, and by the defence bias forensic examination most often.
to make the case that the suspect is innocent. This research includes areas such as face
Although prosecutors’ duty is to do justice, not comparisons21, forensic anthropology22,
44 merely to obtain a conviction (see, for example, bite-marks23, shoe prints24, firearms25,
the US Supreme Court)14, “There is reason fingerprinting26, DNA9, blood spatter analysis27,
to doubt that prosecutors comply with these and fire investigations28. There has even been
obligations fully” (this statement was made research into forensic bias in the courtroom,
by a US federal appellate judge on the Ninth showing an ‘allegiance effect’ whereby forensic
Circuit15), The forensic examiners are often experts’ conclusions depend on which side
recruited to help make these cases, and that hired them29.
biases the presentation of the evidence. 16,17 It is worth noting that the research
The implications for court and the criminal on cognitive bias is complex. First, when
justice system (regardless if it is in the UK, participants in the studies are aware that they
US, or any other country) are that the are taking part in research and that this is not
forensic evidence may be overstated, and real casework, then the contrived contextual
its uncertainties and limitations concealed. information is not as powerful as when they
Although this should come out in cross- really believe it. Second, when participating
examination, in my view that rarely occurs. forensic experts think it is real casework,
First, both sides are rarely equal, because the then it is not practically possible to run many
prosecution often has far more resources than examiners on a fully-controlled study with all
the defence, as well as has better access to the conditions counterbalanced and good control
investigative team. Second, many cases enter a groups. Third, fully-controlled studies are
plea-bargain or a situation whereby suspects possible, but then they are mostly done with
confess to the crime and enter an early guilty students. Fourth, contextual information affects
plea, and hence the forensic (and other) perception and cognitive processing, but it
evidence is never really questioned. does not necessarily determine the decision
The implications of this bias are corrosive outcome. This is dependent on the difficulty of
and affect prosecution decisions, plea- the decision (i.e. how close it is to the decision
bargaining, the actual trial, as well as threshold), and the strength and direction of
subsequent appeals18. Furthermore, at court, the bias. Only when the decision is within the
there are cognitive issues that affect how the ‘bias danger zone’3 can bias shift the decision
juries understand the forensic evidence, and across the threshold and actually determine
COGNITIVE AND HUMAN FACTORS

the decision outcome. Fifth, a null finding that case33. Other cases include the UK High
no bias was found does not mean that bias Court of Justice Court of Appeal (Criminal
was not there – it could have been there Division) quashing a conviction that was based
but was not detected, or it may have been on biasing forensic work34. In this case, the
absent because of ineffective experimental bias forensic expert initially examining the evidence
manipulations. “concluded that there was insufficient detail to
Therefore, although the research literature be able to make a meaningful comparison”, but
most often finds biasing effects in studies after a suspect had been charged the expert
across the different forensic domains, the made a comparison and an identification. This
effects are not always straightforward and type of bias is derived from backward and
present in terms of decision outcomes. It is not circular reasoning, whereby the forensic expert
an easy area to study, and there are a number is biased by the known reference material (i.e.
of inherent obstacles in researching it. the suspect who is the target for comparison).
Research in this area has also investigated Working backwards from the suspect to the
the effects of using technology in forensic evidence in this way is a problem that can be
science. It has shown that technology does not addresses by the Linear Sequential Unmasking
necessarily solve bias, and may even introduce method (see below).
new forms of biases. For example, the use We must remember that forensic evidence
of computerised fingerprint databases has is not always challenged in court because of
introduced clear base-rate expectations about the limited resources of the defence as well
a match30. This base-rate biasing expectation as the prevalent use of plea-bargaining and
affects forensic examiners in a number of early guilty pleas. Furthermore, because we
ways. First, they tend to spend less time never know the ground truth in casework, it
comparing suspects that they do not expect is hard to determine the extent of forensic 45
to match. Second, they are more likely to error. Nevertheless, there is sufficient data to
make false-positive decisions (i.e. erroneous show that forensic bias and error do occur
identifications) when they expect a suspect to within the criminal justice system. From known
match. And third, they are more likely to make miscarriages of justice in the US, 60% included
false-negative decisions (i.e. not make correct flawed forensic evidence35.
identifications) when they expect a suspect not
to match31. SOURCES OF CONTEXTUAL
BIASING INFORMATION
COGNITIVE BIAS IN FORENSIC Bias comes in many forms and guises5, and
CASEWORK it can derive from very different sources.
Do these theoretical analyses and research It is important to classify the different
findings apply to actual forensic casework? sources of contextual biasing information,
The answer is clearly yes, as revealed by as this will enable a better understanding
cases with erroneous forensic identifications of bias in forensic work as well as help to
and miscarriages of justice. For example, in
the US Brandon Mayfield was linked with
the 2004 Madrid train bombings after being Figure 3: A taxonomy of the different levels at which task-
misidentified by a number of independent irrelevant and potentially biasing contextual information may reach
a forensic scientist13, 36.
forensic examiners, who all concluded with
100% certainty that he was the match. Level 5: Organizational & Cultural factors
However, because of unusual circumstances Level 4: ‘Base rate’ expectations
the erroneous identification was revealed and
prompted an investigation that concluded that Level 3: Case information
confirmation bias was a factor in the mistake32. Level 2: Reference materials
The biasing effects on forensic casework
Level 1: Trace evidence
were also revealed in the UK by the public
judicial inquiry by the Rt Hon Sir Anthony
Campbell, who examined the Shirely McKie
THE FORENSIC SCIENCE LANDSCAPE

THE SOLUTIONS ALL SHARE A COMMON GOAL: TO INCREASE THE


INDEPENDENCE OF MIND OF THE FORENSIC EXAMINERS, SO THAT
THEY CAN ACHIEVE THE HIGHEST POSSIBLE QUALITY DECISIONS.

devise solutions. Clearly, some context and evidence – a clear source of bias. Finally, the
information is needed for forensic examiners fifth level relates to larger contextual sources
to do their job, but other contextual of bias: the organisational and cultural factors,
information is extraneous and irrelevant to such as the adversarial legal system and being
their forensic work. part of the police service (see the allegiance
I organise the different sources into a 5-level effect discussed earlier).
taxonomy13, 36 (see Figure 3). First is the actual
evidence, which may include irrelevant biasing SOLUTIONS
context. For example, handwriting analysis may Many of the solutions to the problems raised
involve text that includes irrelevant biasing in this chapter do not require additional funds
information, voice recognition may include and are practical. In fact, some solutions will
tone and content that includes irrelevant enhance forensic decision quality and increase
biasing information, and bite-marks may reveal efficiency at the same time. This is because
irrelevant information about the nature of the the solutions are derived from understanding
crime. human cognition as it applies to forensic work.
The second level is the reference material, These solutions are detailed in a number of
46 the known ‘target’ that the evidence from publications3, 36-38, and many are included in
the crime scene is compared against. This the Forensic Regulator Codes of Practice and
information is relevant and essential: the Conduct guidance on “Cognitive bias effects
forensic examiners cannot do their work relevant to forensic science examinations”39.
without it. However, it may cause backward The solutions all share a common goal: to
and circular reasoning that can bias the increase the independence of mind of the
perception and evaluation of the actual forensic examiners, so that they can do their
evidence. This often occurs when the forensic work without interference and bias, and thus
examiner works from the target suspect to achieve the highest possible quality decisions.
the evidence, rather than from the evidence
to the suspect. When examining and analysing 1. Context management
the evidence from the crime scene, the target Many of the solutions focus on how to
suspect is irrelevant. manage context, providing what I often call the
The third level is the case information. “Context Management Toolbox”36. These tools
There is a whole array of case information and procedures consider what the forensic
that is not relevant to the forensic examination examiner needs and when.
in question, but can bias perception, The first and most basic step is masking
interpretation, judgement and decision-making. irrelevant information from the forensic
Knowing whether eyewitnesses identified the examiners. Hence, information that they do
suspect, whether the suspect has previous not need and that is extraneous to their work
convictions, and whether the detective believes should be masked from them (see the Linear
the suspect is guilty, are all examples of case Sequential Unmasking method below). This
information that is irrelevant to any forensic will not only make sure they focus on the
examination. information relevant to their forensic expertise,
Level four pertains to the base-rate but will also increase efficiency because they
expectations derived from pervious work. will not waste time on irrelevant information.
The forensic examiner has an expectation of In some cases, regardless of the forensic
what they will find and what they will conclude domain, it is easy to determine that some case
before they even see or examine the actual information (see level 3 in Figure 3) is not
COGNITIVE AND HUMAN FACTORS

relevant (e.g. whether the suspect confessed of the suspect.


to the crime). At other times it is not so clear Some aspects of applying LSU are simple
cut: for example, the location of where a gun and straightforward across forensic domains.
is found may be relevant if it was hidden for For example, requiring forensic examiners to
a long time in a wet gutter, because that may first examine the actual evidence from the
impact the patterns of bullet cartridges fired crime scene without being exposed to the
from it. ‘target’ suspect is very easy to implement
Sometimes irrelevant biasing information without cost or effort, and will enhance
is not easily masked, such as those originating forensic decision making by minimising
from within the evidence itself (see level 1 backward and circular reasoning.
in Figure 3). In such cases (e.g. handwriting Other aspects of applying LSU are
and voice analysis) the context is engrained dependent on the specific forensic domain. For
within the actual evidence and cannot be example, the analysis and documentation of
(easily) removed. However, in other cases (e.g. the evidence is different in DNA analysis (e.g.
fingerprints) much of the context is irrelevant, peaks) than in fingerprinting (e.g. minutiae).
so the forensic examiner must focus their The complexity and effort in documenting the
decision on the actual fingerprint patterns. analysis will therefore also vary. Some forensic
Although some contextual information is still domains and certain aspects may be very easy
needed – such as the material from which to document, whereas other may be more
the prints were lifted, or the method used challenging.
to develop the print off the surface – such The final aspect of LSU that needs to be
information is mostly not biasing. considered before implementation is the
The second step is sequencing the restriction on changes to the evidence post-
information. In cases where biasing exposure to the target suspect. LSU suggests 47
information is necessary to conduct the a number of approaches to achieve a balance
forensic examination, it is recommended between not allowing any such changes versus
that such information will be provided to the permitting unrestricted changes. For example,
forensic examiner only when it is needed. For changes may be allowed as a function of
example, the ‘target’ reference material (see confidence during the initial analysis, so that
level 2 in Figure 3) should only be provided things which were clear during the initial
after the analysis of the evidence from the analysis cannot be changed later, whereas
crime scene, hence ensuring that the forensic things that were ambiguous can be changed
examiner works from the evidence to the (but these changes should be documented).
‘target’ suspect, rather than from the suspect Each forensic domain can determine how and
to the evidence. The US Federal Bureau of to what extent such changes are permitted.
Investigation (FBI) recognised that backward The LSU involves (sometimes temporary)
and circular reasoning from the evidence is blinding to information in the forensic
a source of bias and have implemented a comparative process, but other types of
sequencing of information approach36. (It is not forensic work should also involve blinding of
clear to what extent this, and other anti-biasing
procedures, are currently in use in the UK.)
The Linear Sequential Unmasking (LSU) SOME SOLUTIONS WILL ENHANCE
approach specifies that an examination of
the actual evidence takes place first; that this FORENSIC DECISION QUALITY
analysis is documented; and only then is the AND INCREASE EFFICIENCY AT THE
forensic examiner exposed to the suspect. It
further restricts changes that can be made to SAME TIME. THIS IS BECAUSE THE
the evidence post-exposure to the reference SOLUTIONS ARE DERIVED FROM
materials36. For example, in DNA analysis, the
forensic examiners must first characterise the UNDERSTANDING HUMAN COGNITION
profile from the biological material found at AS IT APPLIES TO FORENSIC WORK.
the crime scene before seeing the DNA profile
THE FORENSIC SCIENCE LANDSCAPE

information. For example, when one forensic verifier to all potentially biasing information,
examiner verifies a forensic conclusion of whereas one may not need to use such blind-
another examiner, the verifying examiner verifying procedures for simple, self-evident
should be blind to various aspects of the first forensic decisions3.
examiner’s decision (e.g. what they decided, Similarly, some cases involve highly-
why, who made the first decision, etc). emotionally biasing information and a variety
Who will do the masking and sequencing of pressures that may influence the forensic
of information? Often, one must know a lot of examiner, whereas other cases may have very
context in order to determine what forensic limited (if any) biasing information. The need
tests need to be done, what information is to have a case manager and to blind case
relevant, etc. This could be carried out by a information (level 3 in Figure 3) may depend
Case Manager3, who will initially communicate on the existence of biasing information. Hence,
with the investigative detective, and know all of a triage approach can determine if and what
the available information about the case. The measures are appropriate3. The triage approach
case manager will then determine what tests to makes implementing the bias countermeasures
run, and what forensic work needs to be done. much simpler and cost-effective.
They will assign those forensic tasks to other
examiners who will only be provided with the 3. Countering base-rate expectations
relevant information they need for those tasks, This is quite easy to achieve by introducing
thus masking the irrelevant information. a few examples that change the base rate.
Furthermore, the case manager will also In airport security, for example, this may
communicate with the police and provide them involve introducing fake bombs into the X-ray
with the forensic results, explaining what they screening procedure, a tactic known as Threat
48 mean and how they may bear on the case. The Image Projection (TIP). In the forensic domain
forensic examiners doing the actual forensic such measures can be implemented in a variety
tests and comparisons will not be part of those of processes. For example, the base rate for
communications, and will focus on their specific verifying identifications is very high, and this can
forensic analysis. Since the case manager role be countered by including a few ‘similar non-
is most interesting, it may be a rotating role matches’ as identifications within the verification
among the examiners. stream3.
Another example is countering the
2. Triage technology base-rate expectation, by including
Another set of solutions involves matching matches in locations that they rarely appear,
resources and effort to the complexity of the or by randomising the positions so that there
forensic work, and depending on whether it are no regularities of where the technology
is within the ‘bias danger zone’3. For example, presents the most likely match3, 30, 31. All of
some forensic decisions are complex and hence these measures aim to make sure that the
more prone to errors than others. In such cases forensic examiner is cognitively engaged and
one may go to the trouble of fully blinding the bases their decision on the actual evidence
rather than base-rate expectations.

IN MOST FORENSIC DOMAINS 4. Training


The best procedures and forensic practices
IT IS THE HUMAN EXAMINER will not help if the forensic examiners do not
WHO PERCEIVES INFORMATION, accept the need to have them and understand
their utility. Since cognitive bias in forensic
INTERPRETS IT, MAKES JUDGMENTS science is a relatively new topic, most forensic
AND REACHES A DECISION. OFTEN examiners have never received training in this
area and have very little (if any) understanding
IT IS THE HUMAN EXAMINER WHO of the underlying cognitive issues. Even the
IS THE ‘INSTRUMENT OF ANALYSIS. forensic trainers themselves – those who
instruct and teach the forensic examiners
COGNITIVE AND HUMAN FACTORS

HOPEFULLY WE WILL WITNESS THE INCREASED POWER


OF FORENSIC SCIENCE TO CONTRIBUTE TO THE CRIMINAL
JUSTICE SYSTEM AND TO SOCIETY AT LARGE.

about these issues – are predominately forensic such training also be provided to a variety of
scientists, not cognitive scientists, and therefore police forces in the United Kingdom.
have little-to-no understanding of the human
cognitive system to address the issues of CONCLUSIONS
cognitive bias (e.g. they often mistake them as In most forensic domains – from the work
ethical issues). at the crime scene to forensic comparisons
Therefore, it is paramount that all forensic at the laboratory – it is the human examiner
and CSI examiners receive proper training who perceives information, interprets it, makes
on the bias and cognitive factors involved in judgments and reaches a decision. Often it is
making forensic decisions. This has started the human examiner who is the ‘instrument of
to take place: for example, Hertfordshire, analysis’. However, until recently the role of the
Bedfordshire and Cambridgeshire Police are human examiner has been relatively neglected.
providing such training to their CSI and forensic For forensic science to increase its positive
examiners. Such training has already had a impact on the Criminal Justice System and
practical impact on the way they carry out beyond, it must ensure that cognitive bias in
forensic work: by removing possible irrelevant forensic work is minimised. Understanding
contextual information, for example, thereby human cognition helps to identify the weak 49
ensuring that forensic decisions are based points and vulnerabilities inherent in forensic
on the relevant forensic evidence and are science, and also to develop and implement
not contaminated and biased by extraneous biasing countermeasures. Without such
information (an aspect of the LSU method). measures, forensic examiners and CSIs will be
Such higher-quality forensic decisions benefit cognitively contaminated and biased in their
the Criminal Justice System and save costs in work. These biases affect others and ultimately
the long run. create a ‘bias snowball effect’37, 38.
It is also important to provide training Taking on board the cognitive and human
to judges, lawyers and jurors, so that they factors involved in forensic science is long
understand the strengths of forensic evidence, overdue, but recent years have seen very
but also its limitations and vulnerabilities to fruitful progress in advancing these issues
cognitive bias. Such training should include within forensic science. Hopefully this trend
the Forensic Regulator Codes of Practice and will continue and increase, and we will witness
Conduct guidance on “Cognitive bias effects the increased power of forensic science to
relevant to forensic science examinations”39. contribute to the Criminal Justice System and
With education in this area, along with to society at large.
cognitive best practices, forensic science
can increase its contribution to the Criminal
Justice System and beyond. However, without
acknowledging these issues and implementing
training and solutions, forensic work may suffer
from a variety of biases. A number of police
forces in a variety of countries are undergoing
such training (e.g. in the United States, the FBI
and Police Departments including those in
New York City, Los Angeles, San Francisco, and
Kansas), have all provided cognitive training to
their forensic/CSI examiners. It is suggested that
THE FORENSIC SCIENCE LANDSCAPE

CASE STUDY

STATISTICS IN COURT

I
DAVID LAGNADO, University College London, with contributions from COLIN AITKEN, University of Edinburgh

magine you are a juror in a criminal trial, probability of the hypothesis of interest.
in which the defendant is charged with The logically correct method for
assault. A key piece of evidence is that incorporating the expert’s evidence into
the defendant’s footprint matches a print a judgment about the probability of the
found at the crime scene. The prosecution hypothesis is to use Bayes’ theorem, an
calls a forensic expert, who testifies that approach that depends on an estimate of the
the probability of seeing such a match if the probability of the hypothesis before considering
defendant was not the source of the footprint the footprint evidence – a concept called ‘prior
is 1 in 1,000. Based on this information alone, probability’.
what is your estimate of the probability that An intuitive way to understand the problem
the defendant left the print? is by casting it in terms of frequencies. Suppose
Many people would be tempted to give a that in the absence of the footprint evidence
high probability, perhaps even quantifying it as there are 10,000 men, including the defendant,
999 in 1,000. But this line of reasoning is logically in the local area that could have committed
flawed – it is an example of the notorious the crime. Given the expert’s statement that
50 ‘prosecutor’s fallacy’, so called because it usually the match probability is 1 in 1,000, we would
overstates the prosecution’s case. expect about 10 of these men to match the
The prosecutor’s fallacy is not just a print. So the footprint evidence has narrowed
reasoning error made by lay people. Legal the number of possible suspects from 10,000
experts such as prosecutors, judges, barristers, to about 11 (10 plus the defendant); this
and forensic scientists are also susceptible, and increases the probability that the defendant
the error often crops up in media coverage of left the print from 1 in 10,000 to about 1 in 11
legal cases. The fallacy has figured in several (see Figure 1).
high profile cases, with convictions being This is a substantial increase, but it is still
quashed due to the misrepresentation of the relatively unlikely that the defendant left the
evidence. The seriousness of the error has print, given that about 10 other men would
been recognised by courts, and instructions also be expected to match. The prosecutor’s
have been formulated to avoid the mistake. fallacy implies that the probability the
Nevertheless it still seems to be a pernicious defendant left the print is 999 in 1,000,
problem, and it arises in many other areas with whereas the correct calculation, incorporating
probabilistic evidence, such as medical diagnosis the prior probability, gives a figure closer to 1
and psychological testing. in 11.
Note that footprints are used here for
WHY IS THIS A FALLACY? illustrative purposes, and are rarely used
The expert has told you the probability that in forensic investigations. However, exactly
the footprints would match, based on the the same logic applies to DNA profiles,
hypothesis that someone else left the footprint. fingerprints, and other kinds of trace evidence
This is calculated from an estimate of how rare that are routinely used in court. Also, in the
the footprint is in some relevant population. forensic context a ‘match’ often amounts to
But this is entirely different to the probability the claim of a correspondence between two
that someone else left the footprint, based on items (to within a specified tolerance), but not
the evidence that the footprints match. to a claim that they are identical. Indeed, even
The former is a statement about the probability two footprints from the same individual will
of the evidence, whereas the latter is about the not be identical.
COGNITIVE AND HUMAN FACTORS

Figure 1. Visual depiction of the suspect population (adapted from ref. 1).

Imagine 10,000 people who could


potentially have committed the crime

One of whom is
the actual source

But about 10 out of


the other 9,999 people
have the matching print

Actual source

Not source but


matching type

Non matching 51
person

WHY IS THE FALLACY HARD TO someone else left the print, given the evidence
AVOID? that the footprints match.
Forensic experts can only tell us how well the
evidence supports a hypothesis. This leaves Base rate neglect: When updating their beliefs,
us with the task of using that information to people often ignore information about how
reach a judgment about the probability of the common something is in the general population
hypotheses – something that is difficult if left to – known as base-rate information – and give
commonsense and intuition alone. too much weight to case-specific evidence. In
Extensive psychological research2, 3 reveals that our case, this is tantamount to ignoring the prior
when people face difficult probability problems probability that the defendant left the print, and
they use ‘cognitive heuristics’ – shortcut focusing just on the match evidence.
solutions that can lead to systematic biases.
The prosecutor’s fallacy is especially tempting Belief bias: People are more likely to accept
because it incorporates several interrelated a fallacious argument if its conclusion fits with
heuristics and biases. what else they know or assume. This means
that the prosecutor’s fallacy can seem more
Attribute substitution: Faced with a difficult acceptable when there are other reasons to
question, people often respond with a readily believe the defendant is guilty.
available but incorrect answer. Thus the expert’s
statement – the probability that the footprint Defaults: People often use default values to
evidence would match if someone other than simplify their reasoning. In the legal case, people
the defendant had left the print (1 in 1,000) – often assume a 50/50 prior probability, but this
is readily taken as the answer to the ultimate assumption is usually unjustified and prejudicial.
question of interest i.e. the probability that
THE FORENSIC SCIENCE LANDSCAPE

CASE STUDY
STUDY

Explanatory scenarios: People usually reason THE INCREASING USE OF FORENSIC


in terms of scenarios and stories rather than
probabilities, and often prefer scenarios that EVIDENCE AND QUANTITATIVE
best explain the evidence, even if these are PROBABILISTIC ANALYSES MAKES
not the most likely explanations. Thus the
fallacy is promoted because the hypothesis that IT ESSENTIAL THAT PROFESSIONAL
the defendant left the print is clearly the best USERS OF EVIDENCE UNDERSTAND
explanation for the match, and yields a more
satisfying story. HOW TO INTERPRET AND
PRESENT THIS INFORMATION.
WHAT CAN WE DO TO ALLEVIATE
THIS FALLACY?
Ideally, everyone involved in a trial should receive
proper training in the probabilistic evaluation However, these approaches are harder to
of evidence. But psychological studies have scale-up to more complex problems, especially
highlighted various approaches that can also help those with multiple pieces of evidence and issues
people to reach better judgments and avoid of evidence reliability. One promising solution
errors like the prosecutor’s fallacy. is to use Bayesian networks5, which build on
likelihood ratios and Bayesian reasoning. These
Frequency formats: Framing the problem in networks provide a graphical representation
terms of frequencies (as we did in the example of the interrelations between hypotheses and
52 above) helps people reach more accurate evidence, and can capture issues of evidence
judgments and avoid the fallacy. reliability and credibility.6
A key question is whether non-experts need
Exemplar cueing: Framing the evidence in to engage with Bayesian computations from first
terms of how many other matches are expected, principles, or whether they can be trained on
rather than just giving a match probability, makes simpler examples and then learn to trust and
people evaluate the evidence more accurately. understand an expert’s explanations in more
complicated cases.
Visual aids: Using diagrams to represent the What is clear is that the increasing use of
relevant populations and show the expected forensic evidence and quantitative probabilistic
numbers of matches (as in Figure 1) also analyses makes it essential that professional users
improves reasoning. of evidence understand how to interpret and
present this information.
Verbal scales: We can calculate a likelihood
ratio (LR), which compares the probability of the
evidence under the prosecution and defence
hypotheses (see Annexe 1). These LR values
can then be converted into a verbal scale4. For
example, an LR of 100–1,000 can be expressed
as providing “moderately strong support” for the
prosecution rather than the defence hypothesis;
an LR of 10,000–1,000,000 as providing “very
strong support”; and so on. This enables
evidential interpretation to satisfy the key
characteristics of balance, logic, transparency and
robustness.
lllllll

SECTION 2:
THE CHANGING NATURE
OF CRIME
THE CHANGING NATURE OF CRIME

THE CHANGING
NATURE OF CRIME
Forensic science has a tendency Foreign legal systems
towards being reactive; the provide the UK with
future for crime reduction is in evidence about crimes,
proactive strategies and policies. accidents and natural
disasters involving Britons,
while the UK is obliged to
help investigate crimes
committed by British
citizens abroad.

Crime no longer has


national boundaries,
54
so international law enforcement
conventions have been adopted
to respond to the
changing nature of crime.

The global cost of cybercrime


is currently more than

$400 billion
per year
In a recent report the
cost to the UK of
cybercrime was
estimated to be The international
exchange of DNA data
£27 billion and fingerprints can
per year identify trends and spatial
features in cross-border
crime and offending.
Forensic science data can
be used to inform crime
prevention strategies.
With a 5% rise between 2013 and 2014,
more than 40% of all criminal cases of
fraud relate to misappropriation of identity.
Its cost to the UK economy runs close to

£3.3 billion a year

UK forensic science makes


important contributions
to international resilience,
demonstrated during the
MH17 disaster victim
identification process.

55
As the complexity of cyberattacks
grows, so does the volume of
evidence that can be collected in
relation to a crime.

The International
Commission on Missing
Persons and Bode Cellmark
Forensics have tested

50,000
bone samples and

30,000
unidentified human remains
from MH17 to date
THE CHANGING NATURE OF CRIME

CHAPTER 5

THE CHANGING NATURE OF CRIME


PETE MERRILL, National and international law enforcement agencies routinely
Head of Science collaborate in tackling cybercrime. Forensic science, in contrast, has failed
& Innovation, National to keep pace. If we are to combat the changing nature of crime, we must

W
Crime Agency work together to develop global science toolkits.

e live in a world where crime sources, transit hubs and destinations,


global crime threats exploiting free trade zones and vulnerabilities
affect everyone, in law enforcement capabilities across different
whether they live in jurisdictions. Now, the greatest threat is non-
a country of supply, trafficking or demand. physical: criminals exploit the internet for
International criminal markets crisscross the economic, cybercrime and sexual exploitation
planet, transcending cultural, social, linguistic purposes. They co-opt legitimate activities for
and geographical borders. These markets criminal purposes, using corruption, coercion
are dynamic, sophisticated, highly profitable and white-collar collaborators and enablers
and able to adapt more quickly than legal in the private and public sectors to commit
counterpar ts. crimes. Their activities threaten national
Crime no longer has national boundaries infrastructures, security and our identities.
and an offender in one country can Law enforcement is not as agile in adapting
simultaneously commit offences against its operational response to combat these
56 victims in other states, meaning that threats, and forensic science capabilities often
national intervention activity often requires lag behind both the investigators’ operational
investigators to look beyond their own tempo and public expectations, which impacts
borders to protect their sovereignties and confidence and social wellbeing. Although
citizens from harm. national and international law enforcement
Acting alone to counter crime has become agencies routinely collaborate in tackling the
unworkable and, in response, international law growing phenomenon of cybercrime, forensic
enforcement conventions have been adopted science has failed to keep pace: it has not
to collectively respond to the changing nature embraced the same collective responsibility,
of crime, to strengthen security and the rule of giving rise to missed oppor tunities. If we
law, disrupt criminal markets and to strengthen are to combat the changing nature of crime,
integrity and anti-corruption activities. we have no choice but to work together to
Meanwhile, criminals have diversified develop global science toolkits.
and use new ways to carry out the same While law enforcement is striving to
crimes, with technology playing a key role. adapt its effor ts and capacities to these
Traditionally, global crime was physical: it new challenges, forensic science also
came in the form of trafficking, starting in needs to transform to keep up with the
one continent and ending in another, but changing nature of crime. It should do so by
routed through others to disguise its true maintaining and developing its core business,
source. Criminals have always chosen the as well as suppor ting and embracing new
safest method of operating, by identifying new ways of working.

NATIONALLY-COORDINATED FORENSIC SCIENCE WOULD BE MORE


PROACTIVE IN TACKLING EMERGING CRIME THREATS, AND ABLE
TO PROVIDE A MORE DYNAMIC RESPONSE TO LOCAL, NATIONAL
AND INTERNATIONAL THREATS, SUCH AS CRIME IN ACTION.
THE CHANGING NATURE OF CRIME

CRIME MOVES FROM THE PUBLIC THE INCREASED MOBILITY AND


SPACE TO THE HOME
The new environment in which criminals now ADOPTION OF TECHNOLOGY
operate – cyberspace – is without borders. GLOBALLY, DRIVEN BY ITS WIDER
The principle that ‘every contact leaves a
trace’ still applies within the digital and online AVAILABILITY AND FALLING COSTS,
cyber world, but the technologies used to MEANS THAT THE NUMBER OF
commit, enable and detect crime are not easily
transferable within the traditional forensic
POTENTIAL VICTIMS OF CYBERCRIME
sciences. CAN ONLY INCREASE.
The increased mobility and adoption
of technology globally, driven by its wider
availability and falling costs, means that the
number of potential victims of cybercrime expectations of investigators and the public.
can only increase. For example, a criminal We live in a digital age, in which technologies
anywhere in the world with internet access and applications change almost daily.
can pay to watch and direct child abuse via the Investigators expect to have the same level of
internet in live-time. This demonstrates that mobile technology available to them in their
law enforcement agencies must collectively professional life as they do in their private lives,
investigate ‘crime in action’ across geographical and are frustrated when they do not. The
and legal territories. The need for collective public can also experience this frustration when
responsibility for the forensic analysis of viewing forensic evidence presented in court.
technologies and networks is also imperative. Law enforcement alone will not be able to
Victim vulnerability, despite enhanced tackle the problem. Corporations, agencies, 57
cybersecurity features and applications, is still government departments, industries and
a real threat. Increased web interconnectivity, academics – who all have digital and cyber
greater dependency on technology by the expertise but are not necessarily engaged in
public and business, the perception that the criminal prosecutions – have a significant role
home is a safe environment and that security to play in keeping the public safe.
applications will always work – these all aid the
criminals. WHAT NEW THREATS DOES THE
The ‘Dark Web’ provides a resource where CRIMINAL JUSTICE SYSTEM FACE?
criminals can access web-based tutorials, Forensic science faces additional challenges in
where they can buy instructions, watch digital and cybercrime investigations. Exhibits
tutorials and purchase the necessary tools to could have been deliberately damaged
hack computers and commit crime, in virtual in an attempt to destroy evidence. They
anonymity. This cyberspace can create a are often security-locked, and data can be
mental disconnect between the criminal, the obfuscated legitimately for security reasons
crime and the real world, because the victims by manufacturers or by individuals using ‘off
are faceless and no direct violence is used. You the shelf ’ privacy protection and disk cleaning
no longer need a gang, guns and a get-away tools. Criminals can also remotely counter law
car to rob a bank; an individual can commit the enforcement activity by deleting or creating
crime from their bedroom with nothing more false data logs. If done effectively, it is sometimes
than a laptop. impossible to recover any evidence of illegal
Forensic science faces a considerable activity. Even when it is possible, it requires a
challenge in supporting investigations into difficult and lengthy process which increases the
technology-enabled crimes in dealing with time between an offence being committed and it
the evidential material within cyberspace: the being resolved in a criminal court.
physical devices, networks, and embedded Moore’s law states that, over time, computing
digital systems. Collection, analysing and power grows at an exponential rate. Yet, while
presenting this evidence is difficult enough, the manufacturers of goods and services exploit
but it is exacerbated by the technology these technological advances, the forensic tools
THE CHANGING NATURE OF CRIME

Table 1: Technology Readiness Levels (TRLs) are a technology management tool that provides
a measurement to assess the maturity of evolving technology.

TRL 1 Basic principles observed and reported.

TRL 2 Technology concept and/or application formulated.

TRL 3 Analytical and experimental critical function and/or characteristic proof-of-concept.

TRL 4 Technology basic validation in a laboratory environment.

TRL 5 Technology basic validation in a relevant environment.

TRL 6 Technology model or prototype demonstration in a relevant environment.

TRL 7 Technology prototype demonstration in an operational environment.

TRL 8 Actual Technology completed and qualified through test and demonstration.
58

TRL 9 Actual Technology qualified through successful mission operations.

required to investigate their misuse are not mandated with judicial end-user requirements
being developed in concert. Meanwhile, the that include accredited laboratories, along with
forensic professional’s ability to act as an expert training and application by competent staff – in
witness is being narrowed down to specific other words, that these technologies should be
fields of activity, which are so complex that ‘fit for court’. But mandating these complex and
judges and jurors have little or no concept of costly end-user requirements at such an early
the subject matter. stage of technology development can deter
innovators. This narrows the field of available
HOW CAN SCIENCE KEEP PACE expertise, creates perceived boundaries and
WITH THE CHANGES IN CRIME stifles engagement.
AND TECHNOLOGY? Although the developers of these tools need
The accelerating rate of change of forensic to be cognisant of the requirements of the
technology stands in stark contrast to the Criminal Procedure Rules that their technologies
pace of the traditional forensic sciences. New would eventually have to meet in the criminal
products and services to support forensic justice system, innovators working at the lower
science capability go through a lengthy end-to- Technology Readiness Levels (TRLs) 1–5 (see
end quality and validation processes before being Table 1) should be allowed to focus on the
used within the Criminal Justice System. But this technical requirements of their systems. Mandating
process is not agile enough to match the speed costly base requirements (such as accredited
at which new forensic technologies are needed. laboratories) does not incentivise the science and
This is most keenly felt at the basic research technology community to provide rapid solutions
or proof-of-concept stages. Even at these for development. Instead, it should be sufficient for
preliminary stages, funded projects are often them to disclose their basic validation processes
THE CHANGING NATURE OF CRIME

before a new method is deemed ready for UNDERSTANDING THE FORENSIC


demonstration and operational evaluation for use
within the Criminal Justice System. SCIENCE CHALLENGES REQUIRES
To keep pace with the changing criminal BOTH A DYNAMIC SHORT-TERM
threat, we need a nationally-coordinated
governance framework across the forensic
APPROACH TO TACKLE CURRENT
science community. It should lead an innovation AND EMERGING THREATS, ALONG
centre, a knowledge exchange network, and
undertake horizon scanning. It should manage
WITH A MORE AGILE APPROACH TO
the relationship with funding bodies, Innovate LONG-TERM RESEARCH INITIATIVES.
UK, higher education, research councils, users
and service providers to ensure that they adopt
a holistic approach to forensic science.
Nationally-coordinated forensic science would convictions, it may not reduce the supply of
be more proactive in tackling emerging crime illegal commodities, the number of trafficking
threats, and able to provide a more dynamic victims, or curb online exploitation.
response to local, national and international Criminals may come and go, but the criminal
threats, such as crime in action. It would make markets and the factors that cause crimes
better use of available technologies, develop remain. A disruption-only crime-fighting model
specialist solutions that meet the standards of will not solve the crime problem. Instead,
the Criminal Justice System, recruit specialist understanding the crime landscape will help
expertise for national use, and support the agencies to focus on the activities of significant
development and training of national capabilities. impact, especially where they span multiple
The UK also needs to be better positioned threat areas where intervention will have a more 59
within global forensics. This is a considerable sustainable impact.
challenge, because UK forensic science is principally Calls for research in forensic science often
focused on the requirements of the UK’s threats, focus on the natural sciences, rather than on
its control strategies, and local policing plans. studies of the social and behavioural drivers of
European crime and global threats are not seen as crime. These social science questions – which
a key driver for UK forensic science – as a result, seek to understand crime markets, entities,
the benefits of influence, collaboration and access structures and how they operate – are not seen
to funding are not realised. as a high priority. Likewise, the effectiveness
Understanding the forensic science challenges of forensic activity on public confidence,
requires both a dynamic short-term approach to their understanding of the topic, and their
tackle current and emerging threats, along with expectations are vital issues that we need to
a more agile approach to long-term research understand in order to be more effective (see:
initiatives. This will only be achieved through a The big questions in crime research, overleaf).
single forensic science gateway that can connect The current system of funding forensic
practitioners from the diverse forensic science science research is clearly biased towards the
disciplines and facilitate their collaboration to natural sciences. To be successful in a funding
ensure corporate engagement bid, applications must be driven by an expected
output of results and benefits. Projects are
COULD FORENSIC SCIENCE BE therefore risk adverse, with little or no flexibility
BETTER APPLIED TO TACKLING THE to extend or change their scope. Proof-of-
FACTORS THAT CAUSE CRIME? concept bids and social or knowledge-building
Forensic science is designed to support the initiatives are rarely funded. Funding is often
Criminal Justice System, and to deal with for too short a period; bidding formats differ
specific offences committed by specific people. across government departments; and there is a
It does not tackle the factors that cause mismatch between the academic and the funding
crime, an important distinction. This means and commissioning cycles.
that although law enforcement investigate If, as a society, we want to identify and
and prosecute offenders, which can lead to understand the causes of crime, we must have a
THE CHANGING NATURE OF CRIME

THE BIG QUESTIONS IN CRIME SEARCH

UNDERSTANDING ORGANISED CRIME MARKETS,


ENTITIES, STRUCTURES, VALUE AND HOW THEY OPERATE
What are serious organised crime activities?
Where are they located?
Where is their marketplace?
Do they actually cross borders?
What are their connections?
What are their pathways, driveways, motivators and modus operandi?
How do they interact with the grey market and other legitimate networks?
Are they demand driven?
Are there a diverse number of ethnically heterogeneous actors?
Do they have an organisational structure or a party base?
Do they follow traditional or media concepts?
Do we understand what we are up against?
Does offender management work?
Are criminals more agile than law enforcement?
60 What are the enabling tools and trappings that go with the crime types?
Does each crime type have a different network?
What value is given to an individual’s reputation?
Is the nature of violence in serious organised crime changing?
What are the new patterns and crime types?

PUBLIC CONFIDENCE AND EXPECTATIONS


How do we measure success within an environment where public confidence
and perception has such a varied range?
How do we measure confidence, visibility, satisfaction, credibility and reputation?
What is the definition of public confidence?
What are the unspoken expectations?
Where are the boundaries of public acceptance for forensic science techniques?
What is the effect following a disruption on different communities?
Can we define the types of real and virtual communities?
How can we actively engage with community experiments?
How do you change lifestyle and culture?
Can we ‘future proof’ the public against crime?
What does civil engagement look like?
What factors create an environment of trust?
THE CHANGING NATURE OF CRIME

HOW DO WE MEASURE THE EFFECTIVENESS OF LAW


ENFORCEMENT ACTIVITY?
Do we know enough to evaluate the intended consequences of our actions?
Is policy effective?
How do we measure outputs?
How do we measure impact?
What types of disruption work?
How do we measure the impact following a disruption?
How does law enforcement evaluate the threat, balance privacy and morality
and operate in an ethical way?
How do we manage activity outside statutory processes?
How do we identify what is important?
How do we keep the focus on the mission?
What level of energy does it takes to disrupt crime?
Who does it actually affect?
How do we best design interventions?
Is there a place for conflict resolution? 61
How do we measure intangible and tangible benefits?
Can we include measurements from key stakeholders?
Should we focus more on cyber or drugs – which is the bigger threat?

national sponsor for fundamental research into policies, organisational cultures, ethical and
the social and behavioural sciences. We also human rights challenges. This is keenly felt when
need to deconflict the competing priorities it comes to personal data held on national
for funding, and take a long-term approach to databases. The difficulties in accessing and using
providing an environment that will maximise the national crime-fighting data have never been
commercial markets for forensic science, to the satisfactorily resolved. This hampers academic
benefit of both the public and private sectors. research so much that it is often too far
removed from the criminal investigation to be
THE EFFECTS OF CHANGING of value. Better access to crime knowledge and
CULTURAL NORMS ON CRIME data is required to provide qualitative research,
Public confidence in forensic science, and its while still respecting the challenges associated
ability to keep the public safe, are the most with managing confidentiality, security, Criminal
important drivers for innovation within forensic Justice System requirements and commercial
science. It operates within an environment of considerations. It is also vital if we are to reduce
radical uncertainty, where there is greater public the risks of research bias, and to avoid studies
scrutiny around its activities, and a greater simply delivering pre-determined outcomes,
demand for transparency than ever before. rather than producing genuine insights.
As well as being adaptable to the changing All of the examples discussed in this chapter
nature of crime, forensic science has to be demonstrate that forensic science needs to
flexible enough to cope with the changing adapt more quickly to the changing nature of
requirements of the law, political agendas and crime if it to remain relevant, trusted and useful.
THE CHANGING NATURE OF CRIME

CASE STUDY

TROJAN OPENS THE GATES


TO COMPANY CASH

I
OLIVER SMITH, PwC Cyber Threat Operations

magine the following scenario. Police additional information and where necessary
are poised to arrest an employee on redirect the victims to bogus sites. Once
suspicion of misappropriating company executed, the malware was able to operate
funds when an investigative interview undetected, intercepting key information
with the suspect reveals a sequence of intended for the banking site. The victim’s
strange events. Upon closer examination, it banking credentials were transmitted to the
transpires that a sophisticated and targeted attackers, giving them access to the company’s
attack by cybercriminals had succeeded in bank account.
siphoning off close to £250,000 to bank The employee was then presented with an
accounts held in Cyprus, Ukraine and the onscreen message stating that his card reader
United States. – a device designed to provide an additional
Just days before – after star ting a new layer of security around the authorisation
62 role in the finance team of a manufacturing of transactions – was required in order
company – the employee had received to complete the logon process. Given the
an email purpor tedly from the company’s employee’s unfamiliarity with the new banking
bank. This email seemed entirely innocuous, system, he was not suspicious and followed
and was one of many other emails that the the instructions. However, rather than being a
employee had received from the bank as par t step in the legitimate account access process,
of the process for setting up their access. the employee had inadver tently provided an
However, the email was in fact spoofed, and authentication code authorising a payment to
had been sent by a cybercrime group – a a new account.
form of cyberattack called ‘phishing’. Targeted The employee was presented with an error
phishing emails (i.e. those that may refer message that asked him to try again, and this
to the target by name, or contain other process was repeated a number of times in
information that may resonate with the shor t succession until the employee gave
target) are referred to as ‘spear phishing’. up trying to gain access to the account. The
The email contained a piece of malicious attackers then proceeded to call the victim
software (malware) intended to infect at his office masquerading as legitimate bank
the employee’s computer with a carefully employees, which resulted in additional bogus
crafted program known as a banking Trojan. transfers being authorised (this process is
This malware, which is called a ‘Man in known as voice phishing, or ‘vishing’). Although
the Browser’ attack, allows the attacker to the bank eventually blocked fur ther payments,
not only track and exploit the information it had missed several red flags, including that
being entered by a user, but also to ask for the company never made direct foreign

REGARDLESS OF HOW ROBUST A COMPANY’S CYBER DEFENCES ARE,


HUMAN ERROR IS OFTEN A KEY ROUTE FOR CYBER CRIMINALS TO GAIN
ACCESS TO INTERNAL COMPANY NETWORKS OR SENSITIVE DATA.
THE CHANGING NATURE OF CRIME

exchange payments, and always used the


same intermediary to process any such
payments.
Cases such as this demonstrate that
regardless of how robust a company’s
cyber defences are, human error is often a
key route for cybercriminals to gain access
to internal company networks or sensitive
data – and this form of crime is on the rise.
PwC’s 2015 Information Security Breaches
Survey technical repor t found that
inadver tent human error had caused half
of the single worst security breaches for all 63
survey respondents in 2015, an increase of
over 60% on 2014 (ref. 1).
In this instance, by capitalising on the
employee’s unfamiliarity with the bank’s
authentication procedures – and his
all-encompassing social media profile,
which contained his position and contact
details – the criminals were able to steal
a significant sum of money and even
threaten the innocent employee’s liber ty.
With the benefit of hindsight it was clear
that the logon process was different, but
at the time it all seemed very normal. As
such, employee training and awareness
of techniques such as spear phishing and
vishing should be seen as crucial elements
of any information security and risk
management policy.
THE CHANGING NATURE OF CRIME

CHAPTER 6

IDENTITY AND IDENTIFICATION


SUE BLACK, Centre Identity is a cornerstone of our modern society, and its influence as a central tenet of
for Anatomy and our culture will only increase and consolidate as citizens willingly surrender parts of their
Human Identification, identity to gain, for example, access to commercial products. The expansive ecosystem
University of Dundee of government, science, justice, industry and society must find a way to work together to
strike a workable balance between an escalating public demand for security and a laissez

I
faire approach that may expedite identity theft.

dentity and identification are two sides of by the full focus of legislative, judicial, scientific
the same coin, but they are, ironically, not and investigative capabilities.
identical. Heated philosophical debates
on this matter have existed for centuries, ‘POSSIBLY’ IS NOT A HELPFUL
and perhaps even from the evolutionary ANSWER
watershed when the most narcissistic of all The philosophical concept of identity was
species – humans – first discerned a sense of first addressed within the much-debated
self1. From then onward, people have sought to three classical laws of logic: the law of identity,
guard their identity jealously from others who the law of non-contradiction and the law
might wish to steal it; they have also learned to of excluded middle. Of course, in the ideal
wield it as a powerful tool for both good and situation identity would follow the simplicity
bad, and to raise it as a shield for protection. and pleasing symmetry of Aristotle’s law of
64 There is an inherent need within structured identity (A=A) but this provides no space
societies for citizens to be able to prove who for extraneous factors including change in
they say they are, and for others to be willing to the predicate (as recognised by Heraclitus)
accept that their claim is not only accurate, but or uncertainty in the tools available to the
that it reflects who they have always been and evaluator to establish unequivocal exactness
will continue to be. If there is any doubt in this (as evidenced by the concept of three-valued
concept, then we must attempt to resolve it by logic). Bivalent logic only provides for ‘true’ or
presenting and evaluating evidence. ‘false’ values, whereas three-value logic permits
The level of trust in this agreement has a third, indeterminate value that occupies the
changed over time, and in today’s high-security middle ground between the two finite points
world it is probably at its most extreme. Yet at the end of an identity continuum (match or
society has always been fascinated by the exclusion). Therefore, while these exquisite
concept of identity, of being able to acquire and bimodal philosophical concepts might represent
manipulate it, and as a result confuse and fool the holy grail of standards for modern day
the unsuspecting. Alexandre Dumas’ 1846 book identification, such rigid inflexibility, which relies
‘The Two Dianas’ was adapted from the real life on certainty or indeed uniqueness, cannot be
16th-century case of identity theft associated achieved realistically. The degree of confidence
with a peasant, Martin Guerre, and his that we have in our ability to assign identity
subsequent trial and execution. It is interesting to an individual or to a thing must therefore
to consider that in today’s world of forensic be predicated on probability and whether
science this case would have been solved very the likelihood is closer to confirmation or
quickly: and this illustrates that the field is not rejection of identity. Identity as it pertains to
static but that it is ever evolving, and one could an individual must therefore, by definition, be a
argue that it is now progressing at its fastest rigid bimodal concept (each person is unique);
pace. Indeed, the flexibility and manoeuvrability but identification, which is the process by which
of identity continues to inspire creative minds, certainty of identity is assessed, occupies the
not only in literature and the media but also middle ground of the third value. This conflict
those intent on nefarious purposes. Such comes into focus through provision of false
criminal tendencies need to be countermanded rejection rates, false acceptance rates and the
IDENTITY AND IDENTIFICATION

bimodal requirement of the Criminal Justice BIOMETRICS BOOM


System: is it him, or is it not? Under such Identification is a natural and necessary process
circumstances, ‘possibly’ is not a helpful answer. for many forms of social interaction, from
Identification must also be able to withstand productive enterprise to personal security,
variation not only in time (as an individual ages) but only relatively recently has it become the
but in space (identical twins) and therefore subject of articulated government policies. In
the complexity with which we not only the wake of events such as 9/11, the London
express identity but the mechanisms whereby 7/7 bombings and other security threats, an
we detect, recognise, compare, evaluate and increasingly security-conscious society demands
communicate it, are complex2. There can be higher standards from our technologies and
no doubt that some of the indicators of our our underpinning scientific robustness3, 4. Today,
identity are more readily accepted and more this is most commonly achieved through
familiar than others, and many have stood biometric analysis and the matching of source,
an incredible test of time. However, current intelligence or crime scene data with stored
pressures on data security, privacy laws and the reference data5. In an early patent application
almost insatiable fervour to capture information for a personal biometric system, Yong Zhu and
about identity mean that this has become a colleagues defined a biometric as “a measurable,
challenging and fluid environment where our physical characteristic or personal behavioural
wish to protect our identity comes into daily trait used to recognise the identity, or verify the
conflict with society’s demands for us to reveal claimed identity, of an enrolee”6. The important
and relinquish it. word here for security purposes is ‘enrolee’,
While the forensic aspect of identification as it requires there to be a stored set of data
has very much focused on its role in the against which a comparison may be made to
Criminal Justice System, it has perhaps missed a establish a match7. This is not always the case for 65
prime opportunity to influence the commercial those in the forensic field, who must interpret
market through collaborative innovation and the evidence from a different investigative
enterprise. There is a strong value proposition perspective where the owner of the biometric
in the forensic approach to identity because it is not known to the investigator. Therefore we
offers a degree of scientific, grass-roots rigour have two communities approaching the same
that industry might capitalise upon if it is to problem from very different angles. Such an
weather the brewing storms of the consumer’s interdisciplinary congruence is a rich ground for
ebb and flow in confidence and trust. Early innovation, enterprise and entrepreneurism.
discourse, and a trusting environment that But how protective is the consumer of their
facilitates collaborative and honest dealings identity and how willing are they to sacrifice
from the outset, would stand this relationship it? To gain access to the latest mobile phone,
in good stead and prepare it for future criticism for example, one may have to surrender their
or adversarial conflict, civil or criminal, in the fingerprint biometric. Should the consumer
courts. The need to obviate and manage be okay with that? The ‘Biometrics Market
such risk is core to both a robust commercial and Industry Report 2004-2008’ from the
marketplace and to the enduring legacy of International Biometric Group (IBG)8 suggested
government policymaking, and it is fundamental that fingerprint, face, hand and iris recognition
to the principles of citizens’ trust and faith. accounted for almost 80% of the biometric

WHILE THE FORENSIC ASPECT OF IDENTIFICATION HAS VERY MUCH


FOCUSED ON ITS ROLE IN THE CRIMINAL JUSTICE SYSTEM, IT HAS
PERHAPS MISSED A PRIME OPPORTUNITY TO INFLUENCE THE
COMMERCIAL MARKET THROUGH COLLABORATIVE INNOVATION
AND ENTERPRISE.
THE CHANGING NATURE OF CRIME

market in 2006. “It was predicted that by the end extraction, the pattern is represented as a binary
of 2013, Automated Fingerprint Identification (black and white) image that can be utilised for
Services (AFIS) technology would dominate pattern comparison purposes. According to the
the biometric marketplace with around 33% of IBG, vascular pattern recognition constituted
the market share but by the end of 2015 this approximately 3% of the overall biometric
is closer to 50%, driven by large identification commercial market in 2006 (ref. 8). However,
programmes and accessible and affordable the IBG correctly predicted a 300% growth
personal security demands.”9. in the use of vein recognition technology by
While it is true that fingerprint recognition 2012 (refs 16, 17) and current market share is
continues to dominate the biometrics industry, approximately 10%. Like fingerprint biometrics,
it is important to realise that it also dominated vein pattern analysis has translated successfully
the field of forensic investigation for nearly 100 into the forensic field as an emerging science,
years10 until it was eventually relegated into and particularly in the identification of hands
second place by DNA analysis11. Both DNA from perpetrators of sexual crime, but more
and fingerprint analysis have largely weathered specifically child sexual abuse18, 19 (see case study
the adversarial interrogation of the courtroom, on p80) . The legal admissibility of this evidence
although fingerprint evidence was recently was granted on the basis that the expert was
downgraded from a biometric of ‘fact’ to one of a trained human anatomist who understood
‘opinion’ following the public enquiry into the human variation18. Therefore, vein pattern analysis
Shirley McKie case12, and aspects of DNA analysis has successfully crossed from the scientific/
are also coming under greater scrutiny. Biometrics medical world into the commercial marketplace
that are not only able to operate successfully as a largely unnoticed conduit, and is now
within the security market but can also meet the translating onto the forensic arena with significant
66 criteria of evidential admissibility, are extremely impact. Capturing this sometimes unexpected
important and potentially powerful tools for the flow of knowledge and influence between
analysis and determination of identity in both disciplines is challenging but offers fertile ground
the forensic and the security related contexts13, for innovation. The Law Commission report
14, 15
. This border interface between forensic on ‘Expert Evidence in Criminal Proceedings
science and the security market is a powerful in England and Wales’20 clearly provides room
translational scientific portal where a paradigm within the UK Criminal Justice System for the
shift may be accelerated through the unrestricted utilisation and introduction of novel or emerging
bi-directional traffic of knowledge transfer and sciences in the courtroom, but it is also clear on
collaborative strategic alliances. The development the extent to which opinions and inferences may
of new biometrics, and the support of emerging be made in such circumstances.
ones, would be greatly enhanced by a strategic First generation (e.g. fingerprints) and
working alliance of forensic science experts with second generation (e.g. DNA) forensic-based
colleagues in the security industries. identification techniques have a track record in
Vascular pattern recognition is a less well terms of evidential admissibility11 that emergent
known biometric, but it is predicted to gain technologies must acquire. Developing a strong
significant market share after years of being ethical framework is also a critical component to
viewed as little more than a niche player. This ensure the success of an approach, both in the
approach relies on the infra-red image capture Criminal Justice System and in the commercial
of the arborescent (tree-like) pattern of the sector19, 21. Biometrics that can cross between
superficial veins, commonly in a finger, the palm both fields raise different issues in the different
or on the dorsum of a hand. Through algorithmic locations, but the interchange offers tremendous

WE HAVE TWO COMMUNITIES APPROACHING THE SAME PROBLEM FROM


VERY DIFFERENT ANGLES. SUCH AN INTERDISCIPLINARY CONGRUENCE IS A
RICH GROUND FOR INNOVATION, ENTERPRISE AND ENTREPRENEURISM.
IDENTITY AND IDENTIFICATION

opportunity for robust and impactful research. THE DEVELOPMENT OF NEW


Although this is currently little exploited, it is
likely to prove a fertile ground for emerging
BIOMETRICS, AND THE SUPPORT
technologies and new approaches if a productive OF EMERGING ONES, WOULD BE
environment can be created and supported.
This interface of multidisciplinarity requires
GREATLY ENHANCED BY A STRATEGIC
freedom to explore opportunities, but its impact WORKING ALLIANCE OF FORENSIC
for policy makers through emerging technologies
and economic growth is largely unaddressed and
SCIENCE EXPERTS WITH COLLEAGUES
untapped. The emergence of new technology will IN THE SECURITY INDUSTRIES.
not only be useful in the detection and capture of
identity, but also in improving the accuracy of our
comparative abilities, the solidity of our evaluation
and the ease of its communication. Of course the and two years to resolve24. Understandably, there
value may not only lie in the use of identity but is a major commercial and governmental drive
also in its protection, and if we are to continue to to protect identity, to make theft more difficult,
exploit biometrics then we must also think about and to reduce the financial burden on the
how to develop a means to protect our identity – economy. This will only increase in importance
even if we are prepared to surrender it for goods and prominence as citizens prepare to trade their
and services. The opportunities are limited only biometrics, and therefore their identity, as a token.
by imagination, but they must be prepared for The commercial answer to increasing security
with sound policy and governance. is for the customer to give up their biometrics,
but that introduces an element of vulnerability
REACTIVE OR PROACTIVE? that has largely either been ignored or poorly 67
Given that identity has a value not only to the understood to date. Investment of resources
rightful holder but also to the criminal acquirer, needs to focus on prevention as a longer-term
it is inevitable that a black market culture will strategy for this escalating crime.
thrive unless prevention and strong gatekeeping A growing global sense of fear and self-
also become a focus. Forensic science has a protection has catalysed the evolution of,
tendency towards being reactive to the needs and dependence on, biometrics in all aspects
of the investigative agencies, whereas the future of our daily lives5 such that it is now forms a
for crime reduction must surely lie in proactive very lucrative, buoyant and therefore highly
strategies and policies. CIFAS, the UK’s fraud competitive, commercial market. In recent years
prevention service, has reported that identity it has started to move away from the traditional
theft and identity fraud are among the fastest approach of utilising a token or something that
rising crimes of modern times22. With a 5% rise is known (e.g. a PIN number), and towards the
between 2013 and 2014, over 40% of all criminal exploitation of biometrics, which are viewed as
cases of fraud relate to misappropriation of offering greater security and confidence. The
identity. Not surprisingly, there is a larger incidence most common biometrics to be utilised in this
in urban compared to rural areas, and major way are fingerprints and facial recognition, and
cities including London, Manchester, Birmingham, it is of great concern how readily the public
Leicester, Leeds and Glasgow have been identified are prepared to surrender a biometric to gain
as hotspots for such theft23. The major purpose access to the latest commercial product. A
of identity fraud is to illegally obtain goods and recent survey of CIFAS members revealed that
services in the name of an innocent person, and over two-thirds claimed to own an electronic
it is believed that the cost to the economy runs device with a biometric security step installed,
close to £3.3 billion per year for the UK. It is showing a dramatic rise from the previous year
also no longer a crime that can be attributed to where only half responded that their mobiles,
a specific demographic in respect of sex, age or laptops, tablets etc required biometric (usually
geographical location, and the cost of repair and face or fingerprint) access mechanisms. If this
restitution following identity theft is extensive for is the way forward for identification then it is
the victim, typically taking between six months imperative that informed discussions occur to
THE CHANGING NATURE OF CRIME

CASE STUDY

SUPERIDENTITY

M
SARAH STEVENAGE, University of Southampton

odern technology provides hand being amongst the emerging biometric


a myriad of ways to reveal measures under scrutiny (see Figure 1).
identity, reflecting both Although the team was at pains to
the capabilities of current demonstrate the reliability of each measure
devices and the options that individuals have as a cue to identity, using both human and
to manage their identity. However, threats to automated processing, the real power of the
communities, coupled with the price of mistaken SuperIdentity project lay in the fusion of these
identifications, make it ever more important that measures. This enabled identification decisions
our decisions about identity and identification to be boosted in terms of both reliability and
are accurate. The SuperIdentity project was confidence – put simply, the more measures that
designed to respond to this need by using novel converge to signal identity, the more confident
combinations of information. The result is the one can be in the resultant identification.
capacity to make robust identification decisions, Information fusion also enabled the intelligent
knowing both the confidence in a decision and use of measures in a different way, allowing
the means to increase that confidence. previously unknown information to be predicted
68 Funded by the Engineering and Physical from what was known. This critical shift from
Sciences Research Council (EPSRC), the information combination to information
SuperIdentity project ran from 2011 to 2015 prediction heralds a powerful new approach
and represented a multi-disciplinary endeavour for scientists, with clear benefits in diverse
bringing together scientists from the universities fields such as legal investigations, advertising,
of Bath, Dundee, Kent, Leicester, Oxford, marketing and more subjective judgements such
Southampton and the Pacific Northwest as whether we trust someone.
National Laboratories in the US. Its aim was The second notable advance provided by
to explore identity and identification through the SuperIdentity project was its consideration
traditional and modern measures, with the iris, of measures from both online and physical
the voice and particular characteristics of the contexts. In an era when we live our lives as

Figure 1: The hand offers one of the most valuable new biometrics under scrutiny. After measuring hand geometry (left),
infrared light reveals the hand veins in much greater detail than is possible under natural light (centre).Viewing the hand
under natural light, with veins superimposed, allows both geometry and vein analysis for matching purposes (right).
IDENTITY AND IDENTIFICATION

protect the rights of the individual, the needs


of the commercial sector, and the vision for
government policy and its enduring legacy.
How certain are we of the security of our
fingerprint as it is recorded on our mobile
device? The research firm Acuity claimed
that 2014 was a “bumper year” for the
biometrics industry in the run up to Christmas
THE MORE MEASURES as shoppers capitalised on mobile payment
facilities25. Indeed, research by Visa Europe
THAT CONVERGE TO indicated that three-quarters of 16–24 year
SIGNAL IDENTITY, THE olds in the UK would feel comfortable using
fingerprint scans, facial recognition or retinal
MORE CONFIDENT ONE scanning in place of traditional passcodes to
CAN BE IN THE RESULTANT overcome the ‘inconvenience’ of having to
remember information. This was supported
IDENTIFICATION by a recent CSC survey where it was pointed
out that the willingness to release security is
not a ‘generational’ issue but one of ‘age’ and
much online as offline, there is a clear need so this must remain an issue for the industry
to be able to identify an individual in either as the views of a population change with
context; and, at times, in being able to link an time. Next-generation passwords are also
online individual to their offline counterpart. under development with a recent US military
The SuperIdentity team have explored the project to develop ‘cognitive passwords’. This 69
reliability of making these links by analysing Application Programme Interface (API) is based
the finger gestures used when interacting on the emerging field of behavioural-based
with a smartphone, and avatar-user biometrics using algorithms to identify how a
resemblances. Links between these measures person accesses their desktop or mobile device
and key characteristics such as personality, age (see case study on p68 for more on how the
or sex may critically help to narrow a field of relationship between two different forms of
search when making an identification. our identity, physical and cyber, may be bridged).
The final advance provided by the Behavioural biometrics, as opposed to biological
SuperIdentity project was the capacity to biometrics, will always pose a problem for both
create a framework to support identification. the commercial and the forensic markets due to
The greater the accuracy when identifying the inherent ability to necessitate compensation
an individual from any particular measure, for change, and so these are more likely to
the more valuable that measure becomes. remain in the realm of ‘intelligence’ related
Equally, it also becomes more important information rather than evidence.
to protect that piece of information As the ecosystem grows more complex,
from unwanted disclosure. Mindful of the there is a move away from accepting single
prominence of privacy protection and biometrics as being sufficient to meet the
data security, this element of our work needs of heightened security, and the market
reflects on both intelligence needs when has geared up towards multimodal biometrics
gathering information, and citizens’ needs platforms. The intention is to raise confidence
when protecting information. As such, the in the security measures, but unfortunately
project reinforces the need to balance our there is also a cost impact26. Increasing
technological capabilities alongside individuals’ complexity gives a perception of increased
attitudes, concerns and rights to privacy. confidence, and this is largely achieved not only
through more robust statistics for matching but
Courtesy of Richard Guest, University of Kent, also through the complexities required to spoof
and Helen Meadows, University of Dundee the systems, making multimodal approaches less
susceptible to attack27. If multimodal biometric
THE CHANGING NATURE OF CRIME

access becomes the norm, is the consumer vital that the policy makers, industry, scientists,
aware of what proportion of their physical investigative forces and the judiciary work
identity they may have to sacrifice in the future together not only to encourage development
simply to continue to function in the modern but also to manage and monitor the inevitable
world? outcomes associated with a fast paced world.
At the core of all aspects of modern
PRIVACY IMPLICATIONS identity and identification lies the requirement
There is considerable debate at present for an unshakeable certainty of continuity
within the different security and biometric of information, and confidence in verifiable
communities with regards to the right to robust data. In times past, proof of identity
privacy and the security of state-collected lay in document-based evidence: producing a
and stored data, and the case study on p71 birth certificate was sufficient to satisfy most
considers the importance of this area for needs. However, UNICEF reported in 2000
enlightened and honest debate. The current that approximately 40% of all births were
media furore relates to the legitimacy of covert not officially recorded, which may represent
capture of faces through recognition software upwards of 50 million babies in a single year.
programmes. As we become increasingly On a rolling basis, this is a large number of
security conscious, the importance of the individuals who potentially have no officially
right to remain anonymous is likely to gain recorded identity. This lack of documentation
momentum and will require redress by data may not present as a problem if the individual
security and privacy legislation, a matter that remains within the confines of a community
was raised in the House of Commons Select where that approach is accepted, but when
Committee on 20 November 2014. There is an they move outwith those boundaries – perhaps
70 urgent need to consider and debate the right because of displacement following war or
to privacy over the need to manage a secure famine, fleeing from persecution as refugees,
society. Are we sure that the Data Protection or as illegal economic migrants – their lack
Act is strong enough to withstand the strains, of corroborating identification can become a
both internal and external, that manifest as major issue for border controls, immigration
our identity comes under ever closer scrutiny? and ultimately the civil courts (when human
As we continue to increase our dependence rights are being addressed) or the criminal
on biometrics, their security and their legal courts (should the individual either present as a
robustness will become a troublesome issue for victim or an accused).
public confidence. If we lose our bank card or A birth certificate, whether original or legally
our PIN number then new ones can be issued, issued, is a ‘breeder document’ that can be
but if our biometrics are stolen then we cannot used to obtain other forms of verification of
change our fingerprints – consequently, it identity. As such it carries an inherent value, and
becomes much more challenging to prove our consequently a black market demand. However,
innocence of a crime in the face of compelling the misappropriation and falsification of such
biometric evidence. And if our multimodal documents has gradually eroded the confidence
biometrics are stolen, at what point are we no of authorities to accept them without question,
longer able to retrieve our identity from the specifically for high-risk activities such as
hands of fraudsters and regain control? There crossing borders, opening bank accounts etc. In
are many significant challenges ahead for which an attempt to eradicate the need for traditional
we are perhaps not yet fully prepared and it is paper-based documents and replace them with

AS WE BECOME INCREASINGLY SECURITY CONSCIOUS, THE


IMPORTANCE OF THE RIGHT TO REMAIN ANONYMOUS IS LIKELY TO
GAIN MOMENTUM AND WILL REQUIRE REDRESS BY DATA SECURITY
AND PRIVACY LEGISLATION,
IDENTITY AND IDENTIFICATION

CASE STUDY

MANAGING BIOMETRICS

T
ISABELLE MOELLER, Chief Executive, Biometrics Institute

he use of biometrics has become giving due consideration to privacy and data
an important tool in the discussion protection when they are considering, designing,
around security and identity man- implementing and managing biometric-based
agement. Biometric authentication projects.
has the potential to ease the burden of security, The Biometrics Institute has therefore
thanks to its simplicity and usability. developed several best-practice documents
The Biometrics Institute Industry Survey to help guide members along the way: the
confirmed in 2013 that biometrics are at Biometrics Institute Privacy Awareness Checklist
a crossroads. They are moving from large- and Biometrics Privacy Guideline (available from
scale government use to everyday consumer www.biometricsinstitute.org).
applications. Only the responsible use of We are also working on a proposal to create
biometrics will lead to successful applications. If a Trust Mark to give consumers confidence in
implemented responsibly, biometrics are certainly the responsible use of an identity product or
a privacy enhancing technology. service that incorporates biometrics. This will
When we provide a biometric or other give biometric solutions providers and operators
sensitive personal data, we ask questions about a tool to demonstrate that due consideration 71
trust and control. Governments are typically has been given to privacy and trust during
required to put very robust trust models in place planning and implementation.
to ensure that end-to-end security is provided,
through government accredited networks,
compliance processes for privacy, and record-
BIOMETRICS ARE AT A CROSSROADS,
keeping legislation – all assurance mechanisms MOVING FROM LARGE-SCALE
that involve partnerships and processes around
access to data. But in other organisations that
GOVERNMENT USE TO EVERYDAY
end-to-end security and assurance might not CONSUMER APPLICATIONS.
exist, an absence that demands far more than
just a technology solution.
Other key questions relate to control and
data retention. What happens to that biometric?
Who looks after it, and when will it be destroyed
– after a person leaves school, or a particular
job? What processes exist for managing any
compromise of identity data, for re-establishing
confidence in identity, for redress?
We have seen many successful
implementations where biometrics have
helped to transform identity management,
privacy protection and identity security.
Electronic passports facilitate a more efficient
and secure travel experience, while large-
scale identity management systems facilitate
the delivery of government services to the
poor and marginalised. But the public requires
assurance that biometric managers are
THE CHANGING NATURE OF CRIME

IDENTITY IS A CORNERSTONE OF OUR set of fingerprints, full face photo and iris scan,
and were linked to name, address, occupation,
MODERN SOCIETY, AND ITS INFLUENCE tribal name and a military grid reference
AS A CENTRAL TENET OF OUR CULTURE for where the individual was processed. A
subsequent Biometric Enabled Watch List
IS ONLY GOING TO INCREASE. (BEWL) collated individuals who had been
determined to be possible threats and linked
them to biometrics-enabled intelligence. These
so-called battlefield biometrics are a new and
an identification card supported by multimodal powerful tool in the war against terrorism, but
biometrics, India has embarked on an ambitious there are also possible societal benefits that may
project to record biometrics in all 1.2 billion emerge. The argument and balance between
of its citizens. Each man, woman and child will invasion of privacy and the greater good is
receive a 12 digit unique identification number one that still requires honest and open debate,
called an ‘aadhar’ as a proof of identity and and it is a brave stance to hold to one without
this will be linked to their name, address and consideration of the other in our modern world.
biometrics including iris scans and fingerprints28.
Care is required here to ensure that biometrics CONCLUSION
collected when the person was 16 are still Identity is a cornerstone of our modern
retrievable and applicable 20, 30 or 60 years society, and its influence as a central tenet
later when they may come into question. of our culture is only going to increase. It
If technology accelerated so much in that influences our feeling of safety and security,
intervening period that the original databases and exposes our feelings of vulnerability. Our
72 could no longer be searched, then the longevity apparent willingness to part with it for the
of the project must be addressed to ensure latest shiny trinket should be of major concern
currency and long term accessibility while to governments and institutions – once a
retaining the flexibility to advance with new biometric becomes a viable route for identity
technology. This is the current problem facing fraud, then the opportunity to recover it
the UK’s National DNA Database. Over 720 and secure it becomes exponentially more
million identification numbers have been issued challenging. When this is extrapolated to
so far in India, and it is expected to exceed 1 multimodal biometrics then the loss of identity
billion by the end of 2015. The cost for the into the hands of the fraudster will result in
upkeep, security and success of such a system serious and possibly irreversible issues for
will make an interesting case study, in terms of law-abiding citizens. This will encroach into the
both risk assessment and its role in criminal domain of the policymaker, who must balance
activities. The process is not without critics, and an escalating public demand for security, a
it is perhaps not surprising that the complex commercial clamour to provide it, and citizens
underpinning legislation is still pending in the who are willing to relinquish aspects of their
Parliament of India. It is a brave move, and only identity, against a backdrop of criminal potential.
time will be the judge of its success and value. A focus on the young and the elderly is
The US military project to record imperative: despite campaigns and warnings,
biometrics in Iraq and Afghanistan has received they are the most susceptible to criminals
considerable criticism from human rights who target the very essence of who we are
supporters. Its aim was to record as many and see a value in our identity that many do
biometrics as possible from much of the Afghan not understand. The expansive ecosystem
population. This information was used to try of government, science, justice, industry and
to understand the movement and complexity society must find a way to work together to
of the insurgent networks, but it has also strike a workable balance. Identity, identification
become an increasingly valuable tool in the and the key players who seek to exploit the
workings of the Afghan judicial system and in differences between the two will be a vital
supporting progressive local and national social driver in defining and regulating the profile of
aid programmes. The biometrics included a full our future society.
IDENTITY AND IDENTIFICATION

CASE STUDY

EMERGING BIOMETRICS
IN THE COURTROOM
LUCINA HACKMAN, CHRIS RYNN AND HELEN MEADOWS,

I
Centre for Anatomy and Human Identification, University of Dundee

n the UK, around 16% of children have differences between the image of the offender’s
experienced sexual abuse by 16 years of hand and images of the suspect’s hands.
age; of these, 95% are abused by someone The anatomical information is based on
they know. When an individual is found to compound analysis of multiple features, such as
be in possession of indecent images that include scars of accidental origin; knuckle crease patterns
instances of the abuse of minors, it is essential to (see Figure 2); superficial vein patterns (which
identify the perpetrator. In many cases, the images develop during embryological development); as
will not contain readily identifiable features such as well as nail bed morphology and freckle patterns,
the face of the perpetrator. But if the perpetrator’s both of which have genetic origins and are also
hands or genitalia are captured in the images, new influenced by environmental factors. Comparison
research has found that these can support the of these features between offender and suspect
identification process. can often provide sufficient information for 73
In addition to well-established biometrics such exclusion of identity.
as the ridge detail of the palmar surfaces of the When defendants are confronted with the
hands (e.g. fingerprints), other anatomical features results of these comparisons, more than 80% of
of the hand are widely accepted as commercial them change their plea. This reduces the time
biometric identifiers that can verify an individual’s and money consumed by a lengthy court case
identity. Such systems utilise fingerprints, palm- and, more importantly, negates the requirement
prints and vascular patterns of the hand (see for vulnerable children to give evidence in court,
Figure 1) to facilitate access to secure facilities where they would have to face their abuser and
or bank accounts. This information might also relive their experiences.
be available to investigators who are trying to
compare suspects to the perpetrators pictured in
indecent images. Figure 1:
When our team from the Centre for Anatomy Superficial vein
patterning on
and Human Identification (CAHID) investigated
the dorsum of
the first case of this type in 2007, little research a hand
had been undertaken into the individuality or
uniqueness of certain anatomical features, in terms
of their reliability for forensic human identification.
But the knowledge gained from centuries of study
into human anatomy suggested that these features
were highly variable between individuals. The Figure 2:
University of Dundee compiled a database of hand Knuckle
creases, nail
images, and subsequent studies have created a
bed morpholo-
core of research investigating the use of such data gy and scars
in forensic comparison for identification purposes1.
This facilitated methods to make forensic
comparisons of anatomical features in suspect
and offender images, detailing the similarities and
THE CHANGING NATURE OF CRIME

CHAPTER 7

CYBERFORENSICS
ANDREW BLYTH, Cybercrime costs the UK an estimated £27 billion per year. The growth in
University of South Wales internet use, data storage capacity, cloud computing and encryption all pose
MATT JOHNSON, major challenges for cyberforensics. But along with innovations such as block
Chief Technology Officer, chain technology, they also offer opportunities for forensic investigators – if
Guardtime they are backed by suitable policy and legal frameworks.

O ver the past ten years, the number


of people connected to the
internet has grown to 3.2 billion.
This has enabled a boom in
cybercrime – a range of activities that exploit
vulnerabilities in the use of the internet and
software available from Apple’s App Store.
Consequently, Apple has had to remove up to
300 applications from the App Store.
• In June 2015, the US Office of Personnel
Management (OPM) announced that it had
been the target of a data breach involving
other electronic systems to illicitly access or the records of as many as 18 million people.
attack information and services used by citizens, Information targeted in the breach included
business and governments. personally identifiable information such as
The global cost of cybercrime is currently Social Security numbers, as well as names,
in excess of $400 billion per year. The cost of dates, places of birth, and addresses.
cybercrime is difficult to measure, however, in a • Silk Road was an online black market launched
74 recent report, the cost to the UK of cybercrime in February 2011, and the first modern ‘dark
was estimated to be £27 billion per year1. The net’ market. In 2013, the Federal Bureau of
growth in cybercrime has led to an increase Investigation (FBI) shut down the website and
in the volume of data, and the number of arrested Ross William Ulbricht under charges
cyberforensic analyses, involved in investigating of being the site’s pseudonymous founder,
a case. In addition, the transnational nature of Dread Pirate Roberts.
the internet can hinder the process of acquiring
evidence and bringing a criminal to justice. Cybercriminals can range from foreign
Recent prosecutions in the UK and US have intelligence services and large organised
highlighted the fact that hackers continue to crime groups, to disreputable (but otherwise
target credit card details and intellectual property. legitimate) companies and individuals or small
In September 2015, Vladimir Drinkman, a 34-year- groups of opportunists. Elements of cybercrime
old hacker who hails from Russia, confessed to include:
committing cybercrimes before a New Jersey • Extortion (using techniques such as ‘ransom-
federal court. His felonies, which cost businesses ware’ and ‘denial-of-service’ attacks)
hundreds of millions of dollars in losses, involved • Child exploitation, such as sharing and
breaching the corporate networks of major producing illegal images (see case study p80)
organizations such as Nasdaq, Dow Jones, • Theft of intellectual property, such as trade
Heartland Payment Systems, and JetBlue, among secrets and patents
at least a dozen others, according to the US • Copyright infringement, such as illicit file
Department of Justice. The initial entry was often sharing and forging of software
gained using an ‘SQL injection attack’, a simple and • Malicious misuse (including hacking, worms/
well-documented attack that highlights the poor viruses and botnets)
level of security exhibited by most corporate • Data protection, such as theft of personal data
organisations when connecting to the internet. and credit card details
Other cyberattacks worthy of note include:
• In September 2015, Apple announced The past ten years has also seen the growth
that its development environment XCode of the Dark Web – content hosted on ‘dark
had been subverted to make malicious networks’ that require specific software to
CYBERFORENSICS

access, thus concealing it from most internet THE GROWTH IN CLOUD


users and enabling anonymous browsing and
communication. The Dark Web has become a COMPUTING AND CLOUD
mature supply chain that supports cybercriminal’s STORAGE SOLUTIONS MEANS
activities, selling everything that a cybercriminal
needs to engage in a malicious criminal activity. THAT USERS NOW HAVE THE
Once successful, the same supply chain allows the ABILITY TO SHARE
criminal to sell what they have stolen.
Meanwhile, the Internet of Things (IoT) is INFORMATION AND ACCESS
expected to reach up to 100 billion objects IT ANYWHERE AT ANYTIME.
by 20202. The Internet of Things is the
network of physical objects embedded with
electronics, software, sensors, and network
connectivity, which enable these objects to 1. Acquire
collect and exchange data. The Internet As was seen with the investigation into the 7/7
of Things allows objects to be sensed and bombing in London, the volume of data currently
controlled remotely across existing network required by law enforcement is growing. In fact,
infrastructure, creating opportunities for more this problem can now be viewed as a ‘big data’
direct integration between the physical world problem. Investigators must copy this data bit
and computer-based systems, and resulting in by bit – a process known as imaging – to show
improved efficiency, accuracy and economic that they have not tampered with the evidence.
benefit. From a law enforcement perspective, Then they store the original evidence under lock
the Internet of Things also offers a rich and key, and work with the copy (also known as
environment within which evidence can be the forensics image). 75
gathered and validated. Cybercrime can involve complex supply
The growth in cloud computing and cloud chains spanning the globe (e.g. Silk Road),
storage solutions (such as Dropbox, Google using anonymity technologies (such as Tor
Drive, Amazon Cloud and iCloud) means and the Dark Web) that allow individuals to
that users now have the ability to share purchase everything from malicious software
information and access it anywhere at anytime. kits to time on a botnet. As people make
This has opened up another important target use of digital storage media with ever-larger
for evidence gathering, but it also offers a volumes, it takes much more time to create
useful tool for digital forensics examiners, a forensically-sound image and perform a
who will be able to send commands through triage on the data inside. This is now starting
a cloud environment to other machines, to approach the time available for law
producing faster results with little need to enforcement officials to hold a suspect before
travel to the scene of the crime. charging them. The growth in the number
of devices that make up the IoT (including
THE CYBERFORENSIC PROCESS smart meters, smart grids and industrial
The standard computer forensic process consists
of three basic elements (see Figure 1), each of
which contains their own set of challenges. The Figure 1 – The three elements of cyberforensics
role and function of the forensic process is to
acquire and analyse evidence in such a manner
that it can be presented in a court of law.
This means that the judge, jury and barristers ACQUIRE ATTRIBUTE
must be able to understand and interpret the
evidence, which requires an expert witness to
educate them while presenting evidence. As the
complexity of cyberattacks grows, so too does
the volume of evidence that can be collected in ANALYSE
relation to a crime.
THE CHANGING NATURE OF CRIME

THE VERY DEFINITION OF CYBERCRIME The UK’s capability to address this challenge is
limited to a few academic centres of excellence,
VARIES FROM COUNTRY TO and no law enforcement agencies currently
COUNTRY, AS DOES THE LEGISLATION possess this capability.
The growth of encryption technology also
RELATING TO THE ACQUISITION AND presents a serious technical challenge, with
ANALYSIS OF FORENSIC EVIDENCE. the creation of unbreakable ciphers such as
AES (256-Bit). Modern USB/Flash technology
has adopted encryption as a mechanism to
protect person data. The placement of such
process control systems) will pose significant technologies within smartphones is now making
challenges for this data acquisition process. it virtually impossible to recover data. On 25
September 2014, FBI Director James Comey
2. Analyse criticised Apple and Google for developing
The result of the disclosures made by Edward smartphone encryption so secure that law
Snowden relating to the level of monitoring enforcement officials cannot easily gain access to
and surveillance of people’s activities in information stored on the devices. He said:
cyberspace has resulted in an increased use of “I am a huge believer in the rule of law, but
cryptographic services. These services range I also believe that no one in this country is
from disk encryption and web browsing to beyond the law. … What concerns me about
mobile chat programs. The major challenge for this is companies marketing something expressly
law enforcement in this area lies in recovering to allow people to place themselves beyond the
the cryptographic keys that keep this data law.”
76 secure. One can now purchase encrypting The net effect is that it is getting harder for
hard drives, smart phones and tablets that make law-enforcement and intelligence agencies to
it virtually impossible to recover data without recover digital evidence from encrypted devices.
the presence of the decryption key.
The growth in the use of anonymity services 3. Attribute
to hide ones identity during encrypted browser The rising use of technologies such as virtual
sessions has resulted in the increased need private networks, cryptographic tunneling,
for law enforcement to perform ‘live memory’ proxies and anonymity services (such as
forensics in real time while the machine is torrents and onion routing) have significantly
at the target’s website. With the volume diminished law enforcement’s ability to attribute
of data now available to investigators, the an attack to an individual. Moreover, the very
time and processing capability required is definition of cybercrime varies from country
increasing exponentially. The impact is that law to country, as does the legislation relating
enforcement officials need to perform data to the acquisition and analysis of forensic
mining on ‘big data’ scales of the order of 100 evidence. The net effect is that the burden
billion items. of proof is different in different countries, and
The transnational nature of cybercrime the rules of extradition between countries can
means that various law enforcement agencies, vary. However, there are efforts to harmonise
both within a country and across geographical legislation on cybercrime, such as the Budapest
borders, must share their data or intelligence. Convention on Cybercrime3, which entered
For example, credit card fraud in one area can into force for the UK on 1 September 2011.
be used to pay for cybercriminal or terrorist In 2015, the US government introduced
activities in another. an executive order allowing for sanctions
The major challenge associated with the to be taken against individuals engaged in
analysis of forensic evidence relates to the significant malicious cyber-enabled activities.
identification, collection, acquisition and This executive order aims to give the US the
preservation of large volumes of digital ability to sanction people that are outside its
evidence. The growth of cloud computing jurisdiction, and where the US has little chance
and the IoT will only exacerbate this problem. of extradition, by restricting their resources.
CYBERFORENSICS

DIGITAL EVIDENCE IS OFTEN A KEY FACTOR IN MANY COURT


CASES, GIVEN THE PROLIFERATION OF MOBILE DEVICES, EMAIL, TEXT
MESSAGING, SOCIAL MEDIA APPLICATIONS AND DIGITAL CAMERAS.

According to the US president, it provides bases and validity of many forensic methods”4.
his administration with “a targeted tool for The term “foundation” was used no less than
countering the most significant” threats that thirty times to emphasise that each forensic
could be waged against the nation’s critical discipline must have a scientifically robust and
infrastructure. The UK has no such framework validated basis to its methods, its technologies,
within which to sanction individuals and its process of interpreting data.
In April 2015, the Federal Bureau of
STANDARDS Investigation (FBI) admitted that microscopic
Over the past few years a number of standards hair analysis contained errors in at least 90%
have emerged in the area of cyberforensics. of cases5. Peter Neufeld, Co-Director of the
Current guidance from the forensic regulator Innocence Project, which is affiliated with the
states that: Cardozo School of Law in New York, stated:
“The provider of digital forensic science “While the FBI and DOJ are to be commended
(the provider) shall comply with the Codes for bringing these errors to light and notifying
of Practice and Conduct for Forensic Science many of the people adversely affected, this epic
Providers and Practitioners in the Criminal miscarriage of justice calls for a rigorous review
Justice System (the Codes) and be accredited to to determine how this started almost four 77
BS EN ISO/IEC17020:2012 for any crime scene decades ago and why it took so long to come
activity and BS EN ISO/IEC17025:2005 for any to light.”
laboratory function (such as the recovery or The relatively new discipline of
imaging of electronic data)” cyberforensics certainly needs more
Standards such as ISO/IEC17020:2005 and foundational science. Many question the results
ISO/IEC17025:2005 provide certification of of initial data-breach investigations for failing
the imaging process, while standards such as to identify who or what group was behind
ISO/IEC27037:2012 focus on the identification, the crime. After a large data breach, Chief
collection, acquisition and preservation of Executive Officers grow anxious awaiting an
potential digital evidence. accurate attribution, while a news media frenzy
The above standards focus on identification, lowers stock prices and threatens jobs. The
collection, acquisition and preservation of recent Sony hacking case, with an indication
traditional digital evidence. However, they fail to of North Korean state sponsorship, is just one
address the data requirements in relation to: prominent example.
• The identification, collection, acquisition and Even more shocking is that some
preservation of digital evidence located in the traditionalists fail to recognise digital forensics
cloud, the IoT, and social media as a forensics discipline, leaving computer
• The presentation of digital evidence in the experts out of national committees in this
courtroom important field of criminal justice. Today, digital
evidence is often a key factor in many court
FURTHER CHALLENGES IN cases, given the proliferation of mobile devices,
CYBERFORENSICS email, text messaging, social media applications
In recent years, crime labs have faced criticism and digital cameras. Staying ahead of the cyber
for a ‘lack of validation’ in a variety of forensics technology curve is an important issue for any
disciplines. In January 2015, the US National forensics professional: high-tech apparatus is
Commission on Forensic Science stated there used in all the forensics disciplines and requires
was “a notable dearth of peer-reviewed, data-centric security and integrity to properly
published studies establishing the scientific interpret results.
THE CHANGING NATURE OF CRIME

Yet one should question whether computer signatures to link them together. This approach
forensics has really progressed much since the underlies cryptocurrencies such as Bitcoin, but
late 1990s in terms its foundational approaches it is also finding wider use in various financial
and techniques. There have undoubtedly been services and other sectors (see Chapter 13 case
advances in areas such as triage approaches, study p148).
mobile devices, write-blocking, enterprise Block chain technology has the potential to
forensics to minimize human travel, and internet revolutionize cyberforensics, and can be used to
evidence-finding tools. But producing case results prove with mathematical certainty the lineage
is still very time intensive, with few mathematical of data, chain of custody, and data integrity.
techniques being deployed to aid in accuracy Permissioned block chain solutions such as
and timeliness. Keyless Signature Infrastructure (KSI), which is
First responders still spend a significant used today for cybersecurity applications, focus
amount of time ‘bagging and tagging’ digital media on data integrity and could allow forensics
and making bit-by-bit image copies. Then they examiners to understand the sequential chain
verify this copy through the use of ‘hash values’ – of events faster and with more precision when
a unique number that changes if the evidence is conducting forensics analysis. Proof of integrity
tampered with – to show they are exact replicas. and time from a common block chain (with a
Given this backdrop, what is the next trend that common clock) enables unified timeline analysis,
will modernise cyberforensics? no matter where in the world the data is stored,
signed and verified by KSI. This could change the
BLOCK CHAIN TECHNOLOGY primary way that forensics examiners approach
A block chain is a type of database that gathers their data analysis, producing more accurate and
data into blocks, and then uses cryptographic faster results to help resolve insider data theft or
78

Figure 2: Trends in cyberforensics

TIME POINT DETAILS

“The application of computer science and investigative procedures for a legal purpose
Defining Digital involving the analysis of digital evidence after proper search authority, chain of
2007
Forensics custody, validation with mathematics, use of validated tools, repeatability, reporting,
and possible expert presentation”6

Geo-location and cloud “Examination might require access to computer and network resources involving
2011
forensics expanded scope that may involve more than one venue and geolocation”7

“Employing forensics professionals that hold the credibility of a globally accepted and
Cyberforensics
2012 comprehensive certification … provides a strategic advantage for public and private
certification
organizations”8

Cloud forensics Outlined in US National Institute of Standards and Technology (NIST) Cloud
2013
challenges Computing Forensic Science Challenges9

Hackers at home and Charges against five Chinese military hackers for cyber espionage signal a new era of
2014
abroad prosecutions by the US Department of Justice for theft of intellectual property data9

Use of block chain Growing recognition of the value that block chain-based technology provides for
2015
encryption cybersecurity, data validation and digital forensics.
CYBERFORENSICS

isolate external threats exfiltrating data.


The days of spending time making a copy of
INTERNATIONAL LEADERSHIP
any digital evidence before starting the analysis IS REQUIRED TO CREATE
are waning. Faster and more accurate methods
are now available which include fault-tolerant
INTERNATIONAL CONVENTIONS
and anti-tamper features. KSI offers both of these AND LEGAL FRAMEWORKS THAT WILL
benefits to preserve important digital evidence.
In today’s digital forensics lab, only one
FACILITATE THE DETECTION AND
machine calculates the validation hash; but in PROSECUTION OF CYBERCRIME.
the future, one could use pre-case forensic-
ready data systems to compute and assign hash
values to all data in the system. Not only could
a system have a digital fingerprint for each data System with more transparency of their chain
object or file, it could also have a timestamp of custody. There is public demand for more
with each item afforded a Keyless Signature. transparency regarding police arrests, and for
Keyless Signatures are small and compact (about conclusive results in high-profile data breach
2kB), and are portable and can be imprinted cases. More modernisation that builds on the
with the data or stored separately. With KSI’s progress of the past decade (see Figure 2) to
common clock, one could understand the chain include industrial block chain encryption could
of events better when conducting the forensics cause a leap forward.
analysis – especially when trying to reassemble
system contexts across multiple geographies. CONCLUSION
This supports the mutual auditability of forensic The challenges facing cyberforensics are
investigations, ensuring that all e-discovery efforts substantial and require solutions at the technical, 79
are immutable preserved against evidentiary legal and policy levels. The explosion in the
items. volume of data and data types that are now
Guardtime’s global KSI system is currently available to the forensic analyst poses major
operational in partnership with Ericsson, one of technical challenges, and there are still problems
the world’s largest telecommunication service to solve in acquiring data from some devices
providers. The healthcare industry and the (e.g. IoT), partly due to the volatile nature of
energy sector are also showing interest in this data on such systems.
technology; and the transportation industry Innovations such as block chain technology
(with automobiles, airplanes, ships, and trains can help to meet some of these challenges. But
connected to the internet) has similar data- legal frameworks across the world are struggling
centric security and safety concerns. to cope with the internet, because it recognises
Guardtime plans to have global scale no geographical boundaries. Although recent
cybersecurity and forensics services, and is court cases have seen the US government
working with a major telecommunications attempt to impose its legal framework on all
company to build a global infrastructure for servers owned by US companies, even if located
clients to create pre-case hash values with outside of the US, the Supreme Court has
Keyless Signatures. This data centric security yet to give its final ruling. What is clear is that
system uses Guardtime’s permissioned-based international leadership is required to create
block chain and fault tolerant techniques to international conventions and legal frameworks
ensure the validation of the original files. (such as the law of the sea) that will facilitate the
This technique does not require a client to detection and prosecution of cybercrime.
share the content of the files – they only need
to use the algorithm to create the hash token.
From a cybersecurity standpoint, it can also be
used to ensure certain files were not changed or
deleted, and that no data was added to a volume
without following an agreed rule set.
This may help to create a Criminal Justice
THE CHANGING NATURE OF CRIME

CASE STUDY

CHILD ABUSE IMAGE DATABASE


CHRIS FELTON, Safeguarding Directorate’s Online and Digital Lead, Home Office

T he Child Abuse Image Database


(CAID) is a national UK policing
system that suppor ts law
enforcement in the pursuit of
offenders involved in the sexual exploitation
of children, and in seeking to safeguard the
victims of this crime. The Prime Minister
more promptly. More impor tantly, the saving
in police time allows them to place greater
focus on the search for previously unknown
victims depicted in the abusive images seized.
Confidence in the quality of the CAID
dataset, both by the police and the cour ts, is
absolutely critical to success. An officer must
announced the creation of CAID at the be sure that an image presented as evidence
WePROTECT Summit at Downing Street in meets the legal criteria regarding both the age
December 2014. of the child and the activity depicted, which
Acting on intelligence received, the police can be extremely subjective in some instances.
enter a suspect’s premises and seize digital Therefore CAID has incorporated a voting
devices that may contain illegal images and system for the categorisation of abusive
video. Collectively, the devices seized in a images, which requires an image to receive
single case can hold terabytes of data – the three votes in agreement from different
80 task of searching for illegal abusive material, police forces before it is given a confirmed
and the evidence that will help to identify categorisation.
victims, is daunting. CAID’s database of illegal The search for victims passes through two
image signatures can quickly help investigators stages. The offender may also be a contact
determine which devices are suspect and abuser, in which case it is vital to identify any
should be seized for detailed investigation. images which may have been taken using
In order to bring a successful prosecution the offender’s own camera or in premises
for making, possessing or distributing abusive available to the offender. The local element
images, the police investigator must present of CAID provides the investigator with image
evidence to the cour t about the quantity matching and analysis technology that enables
and severity of the images discovered in them to make a rapid risk assessment. . If the
the suspect’s possession, because this will investigator determines that there are no
significantly affect the sentence in the event local victims depicted, then the images can
of a guilty verdict. To achieve this, the be uploaded to the CAID national database
investigator must sift through many thousands and made immediately available to regional
of images in order to categorise them. This is and national victim identification specialists
both stressful and extremely time consuming. for investigation using CAID’s powerful image
CAID is able to significantly reduce the stress analysis tools. Speed is of the essence in
and workload placed on investigators by using the field of victim identification, and CAID
its database of known abusive images to pre- delivers the means of rapidly sharing images
categorise the contents of the seized devices and related intelligence with the officers best
following the original triage. The investigator equipped to tackle this form of crime.
can quickly divide the thousands of image
files into three groups: known illegal images;
known legal images; and unknown images. The
pre-categorised images found by comparison
with the CAID dataset may be sufficient in
themselves to bring a prosecution, thus saving
police time and bringing offenders to justice
81
THE CHANGING NATURE OF CRIME

CHAPTER 8

THE GLOBAL PERSPECTIVE


TIM WILSON, Rising cross-border crime demands greater international criminal justice
Northumbria Centre cooperation. This presents challenges and opportunities for forensic
for Evidence and science – which include developing common standards for procedures,
Criminal Justice Studies, measurements and databases – to facilitate the efficient sharing of evidence
Northumbria University and information. The principle issue for decision-makers is to ensure that
UK scientists and technologists can fully participate in shaping the global

I
future of forensic science.

ncreased cross-border crime is an INTERNATIONAL CRIMINAL JUSTICE


aspect of global change that affects COOPERATION
everyday life. This is par ticularly true The internationalisation of crime takes
of cyber and financial crime, but many several forms:
other crimes can have an international
dimension. The British diaspora is now 1 Transnational offending: criminal conduct
as large as about 10% of the UK resident by an individual in a country that is not their
population2, which means that forensic country of birth. All the forensic science
evidence or information is increasingly evidence will be recovered in the country
received from foreign legal systems, in where the offence or disaster took place,
connection with crimes, accidents and natural but forensically-acquired information (e.g.
82 disasters involving Britons. DNA profiles and fingerprints) may be
The ethical and pragmatic reasons for available in other jurisdictions. These will
par ticipating in international criminal justice usually be obtained through cooperation
cooperation can be seen in the development between national police forces, directly
of UK law and policy on extradition from the assisted in a minority of cases by either
19th century onwards. In contrast to many Europol or Interpol, but invariably using secure
other jurisdictions, British citizens were not communication channels provided by those
allowed to hide behind its borders to evade organisations.
justice for crimes committed abroad. The
rationale for this approach was restated in 2 Transnational crime: an offence where the
the Scott Baker Review of Extradition3: judicially-relevant locations (e.g. crime scenes)
“Extradition operates on the basis of are in more than one country. International
mutual benefit and obligations. Given the cooperation in such cases is likely to also
ease of movement of people throughout involve judicial officials (e.g. prosecutors,
the world, the United Kingdom needs the investigating magistrates and extradition
help of the international community to fight judges) and in some cases this may be
serious crime within its borders, just as much facilitated through Europol and Eurojust.
as other states need the assistance of the There will be similar judicial involvement
United Kingdom to deal with crime affecting (e.g. coroners, in England and Wales) in the
their interests.” identification and repatriation of the dead
Such cooperation is not simply a matter following a natural disaster.
of mutual advantage. The deontological
and retributive (legal, moral and social) 3 International crime: an offence that may
significance of the criminal law gives rise to have been committed in one country, from
an obligation to assist in the investigation of which the forensic science evidence must be
crimes committed by British citizens abroad, obtained, but which can only be prosecuted
and in effor ts to bring them to account. elsewhere (e.g. crimes by a state against
As such, forensic science is an increasingly its own citizens, which are triable at the
international exercise. International Criminal Court (ICC)).
THE GLOBAL PERSPECTIVE

With the increase in international criminal justice UK FORENSIC SCIENCE MAKES


cooperation, it has become more important
to standardise how information is collected, IMPORTANT CONTRIBUTIONS TO
analysed, stored and exchanged. Greater cost- INTERNATIONAL RESILIENCE.
effectiveness and enhanced legal clarity are
also essential when information and evidence
crosses borders. For example, highly-standardised
information that is already held on police forensic been forged or tampered with) assisted the
biometric databases (such as fingerprints and Swedish government with the design of new
DNA profiles) can be exchanged quickly and at passports and national identity cards. Their
comparatively little additional cost. detailed knowledge of how criminals have
Even when an alleged offence has no created counterfeit documents, or altered
connection with the UK’s jurisdiction, UK genuine documents, was used to create a new
forensic scientists and clinicians may still be set of identity documents with greatly enhanced
commissioned to analyse evidence or review security features. This not only contributes to
the work of other scientists. This might be due Sweden’s security – it enhances global security,
to the reputational standing of UK experts, or it especially relating to international travel.
may reflect global shortages in disciplines such The nature of the legal framework for
as forensic pathology4. Indeed, no country will cooperation is a key factor in determining
necessarily have sufficient expertise to deal with its cost. The EU legal instruments for
the consequences of major natural disasters or international cooperation between member
terrorist incidents on the scale of 9/11 without states (and Schengen Area countries such as
international assistance. Iceland, Norway and Switzerland) are, in the
UK forensic science makes important view of experienced lawyers working in this 83
contributions to international resilience. This field, “infinitely more efficient” than bilateral
was demonstrated, for example, during the arrangements. The latter are “cumbersome,
last stage of the Flight MH17 disaster victim subject to local variation, and often inconsistent;
identification (DVI) work (see case study all of which inevitably causes delay and
p90). Scientists from LGC Forensics were confusion”6. The Lyon-Roma Group within the
called in, alongside colleagues from Bode G7 may sometimes provide a suitable forum for
Cellmark Forensics (USA) and the International creating alternative modes of cooperation using
Commission on Missing Persons (ICMP), to help Interpol secure communication channels with
the Netherlands Forensics Institute to accelerate Canada, Japan and the USA7. The most valuable
the final DNA analyses of the victims’ remains5. G7 contribution to international forensic science
This activity also illustrates how international capability, however, was its decision in 1996 to
requirements have taken the forensic use of create the ICMP to identify missing persons
DNA beyond its origins in civil or administrative from the conflicts in the former Yugoslavia. This
paternity disputes and the investigation of decision funded the creation of the specialist
traditional crimes. The 50,000 bone samples DNA expertise needed to develop highly
and 30,000 unidentified human remains tested reliable DNA analysis techniques and skills for
to date by, respectively, the ICMP and Bode DVI purposes, particularly from bone8.
Cellmark Forensics indicates the scale of activity. The US Government has made a crucial
This exceeds the amount of DNA analysis ever unilateral contribution to international
performed in several EU countries for criminal cooperation, through the free provision of the
justice purposes. Federal Bureau of Investigation’s CODIS software.
Forensic science expertise need not be CODIS (Combined DNA Index System) is used
confined to a reactive role. Knowledge and skills in over 50 countries to identify matches among
acquired in responding to past crimes can be DNA profiles, including during the international
utilised to prevent crime or make communities exchange of DNA data9.
more secure. For instance, Swedish document Over the past two decades, major scientific
examiners (who are experts in identifying and and technological advances such as ten-print
giving evidence about documents that have fingerprint scanning, automated DNA and
THE CHANGING NATURE OF CRIME

THE INTERNATIONAL EXCHANGE OF DNA DATA AND FINGERPRINTS


CAN ADDITIONALLY IDENTIFY TRENDS AND SPATIAL FEATURES IN
CROSS-BORDER CRIME AND OFFENDING.

fingerprint comparisons, and mobile access by the citizens of other EU countries is chiefly
to databases have made the initial stages of relatively low-level acquisitive crime, particularly
international criminal justice cooperation theft from shops. Overall, they account for
significantly faster and more efficient. But costs some 1% of prosecuted offences in the UK
will rise and delays are bound to occur – as they (significantly lower than the proportion of such
do in national investigations – when forensic- residents in the UK population) and appears to
science-derived information is assimilated and be concentrated geographically in the south-
appraised with other information in a case; east, eastern counties and Cumbria, rather than
and when there is formal procuratorial or dispersed nationally14.
judicial international cooperation, particularly Knowledge of these outcomes and trends
if extradition is required. It is not surprising, help to frame our general understanding of the
therefore, that international cooperation is criminological impact of globalisation. They do
predominantly focused on “preventing and not, however, indicate the scale of the challenge
combating organised crime, terrorism and other to the Criminal Justice System created by a
forms of serious crime”10. This is also reflected in significant number of extra offences, some of
the operation of the EU (‘Prüm’) arrangements which will be serious, and potential suspects. Bail
84 for the systematic exchange of forensic and sentencing decisions – in addition to the
biometric data11. conduct of investigations – require information
about criminal careers and real-world identity
THE SCALE AND NATURE OF that can only be obtained through cooperation
TRASNATIONAL OFFENDING AND with other jurisdictions. London exemplifies the
CRIMES increasing internationalisation of British policing.
Although the internationalisation of crime may Foreign-born people (not just from the EU)
increasingly affect UK society, overall crime comprised 37% of the population of central
rates in this country continue to fall. The London and 33% of the outer boroughs in 2013
most reliable data source, the Crime Survey (ref. 15), with foreign citizens accounting for
for England and Wales, last year contained the 25-30% of arrests16 and an estimated 25% of
lowest estimate since it began in 1981 (ref. 12). high-harm offenders (including organised crime
Increased movement and migration does group members and predatory sex offenders)17.
not appear to have had a major impact on In many investigations, sharing forensic biometric
criminal demographics, and the number of data will be either the only or the most efficient
first-time entrants dealt with by English and means of obtaining indispensable information.
Welsh criminal justice agencies has halved since Experience in the Netherlands demonstrates
2007. Where data does exist, crime by EU how the exchange of DNA data has provided
offenders in member states other than their potential investigative leads and unlocked access
own may be much lower than the proportion to criminal back histories (see Table 1).
of such people within the resident population A match between anonymous profiles
(approximately 4% of total crime in the Czech recovered from crime scenes in one or
Republic; 3% in Italy, Germany and Denmark; more countries may have considerable value
2.5% in the Netherlands; 1.5% in Slovakia; and if analysts can link such information with
less than 1% in Austria and Poland)13, 14. other crimes. This may eventually lead to the
There are no comparable national statistics identification of a possible suspect.
for England and Wales, but the most recent The international exchange of DNA data
analysis of available data reveals a picture and fingerprints can additionally identify trends
consistent with the pattern elsewhere: offending and spatial features in cross-border crime and
THE GLOBAL PERSPECTIVE

Table 1: Transnational crime and DNA identifications in the Netherlands (at February 2015)18

OTHER MEMBER STATE NUMBER OF MATCHES


DUTCH DATABASE DATABASES REPORTED TO DUTCH
(PROFILE TYPE MATCHED)
(PROFILE TYPE MATCHED) PROSECUTORS AND POLICE
Anonymous profile
The profile of a
(trace) recovered 3,100
known person
from a crime scene
Anonymous profile Anonymous profile
(trace) recovered (trace) recovered 2,326
from a crime scene from a crime scene
Anonymous profile
The profile of a
(trace) recovered 836
known person
from a crime scene
The profile of a The profile of a
971
known person known person

offending. Used in this way, forensic science go further when committing crimes than offenders
data analysis can also be used to inform crime who have arrived in Belgium from the north. These
prevention strategies at a sub-regional level. For considerations are unlikely, however, to explain the
example, the initial exchanges of DNA data concentration of international offending in two
between Belgium, France and the Netherlands regions (Antwerp and Limburg). There, different
have shown that although all Belgian judicial levels and forms of economic activity may operate 85
districts have cases with an international as pull factors. If so, such considerations may need
dimension, some general trends can be to be covered in the international aspects of crime
discerned (see Figure 1). For instance, matches prevention strategies in those areas.
with France seem to have a greater affinity Such analytical techniques will become even
for southern districts than matches with the more powerful with the help of technological
Netherlands. Nationality cannot be inferred from platforms that integrate different types of forensic
the database from which the Belgian matches information. These might make use of knowledge
came, but there may be some correlation gained from human biological traces, the chemical
between the source of matches and the linguistic identification of illicit drugs and large amounts
regions. Generally, criminals travelling north may of digital evidence. Meanwhile, the exchange of

Figure 1: These maps of Belgium show the number and distribution of criminal cases associated with
matches (sometimes multiple matches in a single case) between DNA profiles held on the Dutch (left)
and French (right) databases with DNA profiles on the Belgian database19.
THE CHANGING NATURE OF CRIME

THE DIFFERENCE BETWEEN SCIENTIFIC have confidence in matches between national


databases using different multiplexes.
AND LEGAL CULTURES CAN BE A This convergence has also offered greater
STUMBLING BLOCK FOR THE EFFICIENT discriminating power as national databases grew
larger, and increased the sensitivity of DNA
USE OF FORENSIC EVIDENCE, AND THIS analyses. These developments have enhanced
WILL VARY BETWEEN JURISDICTIONS. the value of forensic science for justice, but
the increased sensitivity has also intensified the
challenges of forensic science. For example,
scientists now need to use enhanced anti-
ten-prints can rapidly identify serial offenders contamination measures, and their reports
engaged in cross-border crime who have been need to be carefully scrutinised, because greater
arrested elsewhere. sensitivity could increase the identification of
DNA traces that have been indirectly transferred
IMPROVING THE INTERNATIONAL to the crime scene from persons unconnected
USE OF SCIENTIFIC EVIDENCE with the offence.
The difference between scientific and legal The development of DNA multiplexes with
cultures can be a stumbling block for the more overlapping loci is an example of how
efficient use of forensic evidence, and this will the international exchange of evidence or
vary between jurisdictions. UK scientists and information provided by forensic science may
informed commentators, including the House bring additional urgency to research. But there
of Commons Select Committee on Science and are many other areas where collaboration and
Technology, have complained about a generally funding are likely to be concentrated in the
86 low level of scientific knowledge among lawyers continuing quest for global best practice.
and judges20. But there is evidence that legal
and scientific thinking is converging. The courts, 1 Human cognition explains the risks from
particularly the Court of Appeal and the Privy cognitive bias (see Chapter 4). Different
Council, are becoming increasingly confident and countries have responded to this issue in
better informed in handling complex scientific various ways, ranging from guidance about
questions21. cognitive bias issued by the Forensic Science
Internationally, though, such convergence Regulator22, to the introduction of ‘contrarian
may be less advanced in some countries, and thinking’ (almost a process of peer review)
can be hampered by the disparate procedures within Dutch police procedures for the
and expectations of both lawyers and investigation of complex and high-impact
scientists. In addition, scientists have sometimes crimes23. The effectiveness of different
reinforced the barriers to efficient and reliable approaches should be carefully researched
communication between jurisdictions by and the results shared internationally in order
adopting different standards and analytical to identify global best practice.
processes, for example. This happened with
DNA multiplexes, designed to assay sets of 2 Technological platforms for integrated
genetic markers – known as loci – to ascribe forensic information. In several countries,
with a high level of confidence unique identity to work is being undertaken to develop
individuals. Earlier tests in countries such as the platforms for the integrated analysis of
UK, other EU member states, the US and China forensic information. Such a system might
often used different markers in their analyses, make use of knowledge gained from human
and moving towards common international biological traces, the chemical identification
standards has been time-consuming and of illicit drugs and large amounts of digital
expensive. This has now been largely resolved, evidence24. When such platforms become
however, and the loci used by these countries fully operational, forensic science institutions
increasingly overlap (see Table 2). This will result are likely to become involved in initiating
in major time and cost savings by avoiding the and managing individual investigations, and
need for confirmatory retesting in order to perhaps even the more general prioritisation
THE GLOBAL PERSPECTIVE

Table 2: The international convergence of DNA multiplexes


YEAR MULTIPLEX NUMBER OF OVERLAP WITH UK OVERLAP OVERLAP
MARKERS MULTIPLEX AT THAT TIME WITH USA WITH CHINA
MULTIPLEX AT MULTIPLEX AT
ENGLAND SCOTLAND THAT TIME THAT TIME
AND WALES

1995 UK SGM 7 N/A N/A N/A

USA ORIGINAL
1998 13 6 N/A N/A
CODIS

1999 UK SGM+ 11 N/A 8 N/A

2010 CHINA SINOFILER 15 9 11 N/A

UK (ENGLAND AND
2014 17 N/A 11 8 10
WALES) DNA-17
UK (SCOTLAND)
2015 24 17 N/A 13 14
DNA-24
USA CODIS CORE
2017 20 15 20 N/A 14
LOCI

of non-scientific criminal justice resources. reliability, repeatability and reproducibility of 87


The automatic processing of combinations the conclusions offered by fingerprint experts26.
of data in this way will also severely test the Similarly, higher-resolution CCTV images are
adaptability and resilience of data protection enabling the standardisation of facial recognition
regulations and the ability to adequately information, which is emerging as an equally
address ethical issues (see Chapter 9 case important priority for multi-national research: for
study p100). In this respect, England and example, in a project involving forensic scientists
Wales offers a global template for national from the Netherlands, Sweden and Switzerland
governance, with the appointment of the that is investigating the calculation of likelihood
Forensic Biometrics Commissioner and the ratios when using such images27.
National DNA Database’s independent
Ethics Group, in addition to the Information 4 Human and microbial genetics. It is likely
Commissioner or equivalent data supervisors that forensic genetic analyses will continue to
who are to be found in all EU and Prüm consume a large proportion of forensic science
member states. research and operational budgets, and pose
new ethical and probative challenges. The global
3 Individualisation. One of the major forecast for the biometrics market – including
challenges faced globally in forensic science commercial and security applications, as well as
research includes the development of criminal justice – is an estimated growth from $8.7
statistical models for the assessment of billion in 2013 to nearly $27.5 billion by 2019,
fingerprint comparisons, and in translating the but many of the new applications arriving on this
results of such research to crime scene and market have been criticised as being based on
courtroom. Indeed, some of the strongest “minimal scientific grounding”28. Faced with such
criticism in the US National Academy multi-national market pressures, there should be
of Sciences’ 2009 report ‘Strengthening more international collaboration in determining
Forensic Science in the United States: A research priorities, and a greater sharing of the
Path Forward’25 was directed at fingerprint research burden. Significant local or regional
analysis. Since then, however, there have been socio-economic factors will, however, continue
advances in the measurement of the accuracy, to shape distinctively national scientific priorities.
THE CHANGING NATURE OF CRIME

The demands on forensic scientists or


ANALYTICAL TECHNIQUES WILL clinicians also vary between countries
BECOME EVEN MORE POWERFUL depending on whether their judicial systems
WITH THE HELP OF TECHNOLOGICAL are inquisitorial (a continuing investigation, with
the trial as a public verification of its findings)
PLATFORMS THAT INTEGRATE or adversarial (in which parties set out two
DIFFERENT TYPES OF FORENSIC conflicting sets of arguments). For example, an
adversarial system traditionally confers a more
INFORMATION. proactive role on such expert witnesses.
But criminal law is evolving in such a way
that the distinctions between adversarial and
inquisitorial systems are less clear cut, and
For example, China has more drowning deaths standardised scientific expertise is becoming
than anywhere else in the world29, and it is the more portable across international borders.
leading cause of accidental death for children Under either system, the accused should know
under the age of 14 (ref. 30). China’s scientists, the nature of the forensic evidence to be
therefore, have a major incentive for improving brought by the prosecution, receive effective
the reliability of techniques for the diagnosis advice about its likely validity and how it
of drowning. For deaths associated with water, might be challenged, and be told about any
pathologists often face a difficult diagnostic alternative views on what it might signify. In
challenge in distinguishing accidents from those recent years, however, these principles have
attributable to suspicious causes. One promising been reinforced in the European Union by
initiative is the development of in China of new directives to improve defence rights. The UK
88 DNA barcoding techniques for the detection government has, with the exception of the
and analysis of microscopic algae found in the Legal Aid Directive, opted into these measures,
victim’s body31. Success in this work would be which include the timely disclosure of the case
of great value globally, contributing to accident against a suspect and the right of access to
prevention as well criminal justice. legal advice34.
These changes have come at a time when
5 Standardisation of evidential reporting, professional outlooks in both the scientific and
laboratory processes and governance legal communities have undergone remarkable
(including data protection). Standardisation progress. This is partly a result of the testing
should not only apply to the methods used in of the epistemological foundations of DNA
the forensic laboratory; it is equally applicable evidence. This legal scrutiny has transformed
to the governance of the institutions in which the notion of transparency in forensic science,
the work takes place, and how the use of data achieving a high level of consensus about the
is regulated. The Prüm biometric exchange need for “clarity about how the probative value
arrangements require that all participating of the evidence is derived from recognised
countries only exchange DNA and fingerprint scientific procedures”35. This change in how
data that is produced in units accredited scientific evidence is regarded also reflects
to EN ISO/IEC 17025 (ref. 32). All Prüm the influence of Case Assessment and
participating states must also observe specified Interpretation (CAI) that was pioneered by
data protection principles. The international the former Forensic Science Service36, and the
exchange of forensic biometric data must be traditional disclosure duties on the prosecution
authorised under a national law that provides under English law37.
a means for citizens to check the lawfulness The effects of these trends could be seen
of the processing of their data, the recording at the most recent European forensic science
of data exchanges, and random compliance meeting, the 7th European Academy of
checks by national supervisory bodies. These Forensic Science triennial conference, held in
data protection arrangements have to be in September 2015. Events at that conference
place before the exchange of data (other than included debate about proposals for a pan-
for pilot testing) may commence33. European initiative for standardising scientific
THE GLOBAL PERSPECTIVE

Table 3: The evolution of admissibility rules

Frye (1923)39 (still binding in many Daubert (1993)40 and the US Federal Reliability limb of the common
US state jurisdictions) Rules of Evidence law admissibility test, informed
by Criminal Procedure Rules and
related Criminal Practice Direction
in England and Wales (2014)

Has the underlying scientific principle Is the underlying reasoning or Is there a sufficiently reliable scientific
gained general acceptance in the methodology scientifically valid and can basis for the evidence to be admitted?
relevant scientific community? it properly be applied to the facts?

Can the underlying theory or technique


be tested and has it been tested?

Has the underling theory or technique Whether material on which the opinion
been subjected to peer review and is based has been reviewed by others
publication in refereed journals? (e.g. peer reviewed) and, if so, what the
views of those others were

Has the underlying theory or technique If there is a range of expert opinion in


attracted widespread support in a relation to the relevant matter, where
relevant scientific community or the expert’s opinion lies and whether
communities? the expert has properly explained his
or her preference 89

Whether the expert’s methods


followed established practice and, if not,
whether the expert properly explained
the reason for divergence
Known or potential error rate and the The extent and quality of the data on
existence and maintenance of standards which the opinion based and the validity
of methods that were used to obtain it

Whether the opinion takes account of


matters such as the degree of precision
or the margin of uncertainty (where it
relies on the results of methods such as
tests or measurements).
Whether the opinion properly explains
how safe or unsafe an inference from
findings on which it relies is (if it relies
on such an inference)

Whether the information which was


available to the expert was complete
and whether the expert took all
relevant information into account

The extent to which the opinion is


based on material which falls outside the
expert’s field of expertise
THE CHANGING NATURE OF CRIME

CASE STUDY

DISASTER VICTIM
IDENTIFICATION: MH17
JEN WILLIAMS, National Civil Contingencies and Disaster Victim Identification Coordinator, National Police Chiefs

O
Council (NPCC)

n 17 July 2014, a passenger plane of the victims, and how, where and when they
from Malaysian Airlines MH17 was died, meets the Interpol identification standards
shot down over eastern Ukraine and provides the additional required information.
by a missile. The flight was from Scotland and Northern Ireland have other rules,
Amsterdam to Kuala Lumpur and there were although the integrity of the investigation is
298 people on board. equally important.
The bodies landed in Shakhtarsk Region in a Interpol identification standards require
war zone with the area controlled by a militia of scientific identification by one of the primary
pro-Russian rebels. Human remains and debris identifiers: odontology, ridgeology (fingerprints
were spread over 34 square kilometres. Access and footprints) and DNA. DVI itself involves
was restricted and controlled by the rebels, matching ante mortem samples with post
90 and the human remains were collected by local mortem samples to provide a conclusive
farmers and miners. Of the 298 people killed in identification. This means working with the
this incident, 283 were passengers and 15 were family of the deceased to identify sources for
crew members. The nationalities encompassed primary identifiers from the family, home and
10 different countries with the majority being medical sources such as dentists and doctors.
from the Netherlands (193). Ten passengers The Dutch lead for the identification
were travelling on a British passport; 6 people processes invited colleagues from the Interpol
under the age of 21 were British dual nationals DVI Steering Group to assist with the
travelling on their other passport. management of the operation. The UK provided
The initial proposal was for the victims’ a DVI manager; a team for the mortuary
remains to be taken by train to Kharkiv, a that included an odontologist, a CT scanner
city controlled by Ukrainian authorities, for and radiography expertise; and a team for
the identification process. Following political reconciliation and identification files. Forensic and
negotiations it was agreed that the bodies intelligence collection within the UK and 3 other
would be flown to the Netherlands for the countries (Netherlands, New Zealand and South
identification processes. The first remains arrived Africa) provided the ante mortem samples for
in Kharkiv on 22 July, and the first flight to the the British Nationals.
Netherlands took place on 23 July. This was The challenge was immense, due to both the
unusual, as recovery and identification would collection methods and the disruption to the
normally take place in the country where the bodies, some of which were mere fragments.
incident occurred. However, the Netherlands Victims were identified by odontology (119),
is respected for its disaster victim identification fingerprints (64) and DNA (130), with some
(DVI) and is a member of the Interpol DVI having more than one primary identifier.
Steering Group. Secondary and supporting evidence was also
When UK citizens are killed abroad in sought in each case. There were 730 initial
suspicious circumstances and the remains post mortems, which increased to over 5000
returned to England or Wales, a coroner’s after DNA investigations on co-mingled human
investigation must be held. Therefore it is remains. To date, 296 of 298 victims have been
important that the investigation into the identity identified, and after the process was extended
THE GLOBAL PERSPECTIVE

practice in all key subject areas, thus improving


the ability of judges and prosecutors to assess
the probative value of scientific evidence; and
training for forensic scientists, irrespective
of procedural differences between their
jurisdictions, in evaluative reporting.
A principle of English law that has been
developing in recent years is that forensic
science evidence may not be admitted if it is
not sufficiently reliable to be put before a jury.
Until recently, however, the English threshold
for accepting scientific evidence was low
to try to find remains for the final 2 victims it compared with US criminal procedure based
was finally closed at the end of August 2015. on the Daubert decision and the Federal
In order to improve future international Rules of Evidence. Last year, the Court of
DVI investigations, the Interpol DVI Steering Appeal indicated that following changes in the
Group has been working to provide Criminal Procedure Rules, “a new and more
standardised practices and has recently rigorous approach on the part of advocates
reviewed both the Interpol DVI forms and and the courts to the handling of expert
guidance to simplify the DVI process. The UK evidence must be adopted”38. The evolution
has designed recovery booklets to assist with of admissibility rules in Anglo-American
a coordinated recovery process, and these jurisprudence is summarised in Table 3.
have now been endorsed by Interpol. The With the 2014 rule changes, the English
European Police College (CEPOL) is creating judiciary has attempted to achieve a new 91
a DVI training course, supported by the balance in the admission of scientific evidence.
Interpol DVI Steering Group, to standardise This is intended to combine a more rigorous
processes across EU member states and or critical approach by advocates and the
support international interoperability. courts to such evidence38, with continued
access to “the advantages to be gained
from new techniques and new advances in
science”41. The reforms are being supported
INTERPOL IDENTIFICATION by training organised by the Advocacy Training
STANDARDS REQUIRE Council (ATC) “to support advocates in
making an informed assessment as to the
SCIENTIFIC IDENTIFICATION reliability of experts”42.
BY ONE OF THE PRIMARY Yet when viewed in the light of international
perspectives, two questions arise. First, the
IDENTIFIERS: ODONTOLOGY, promising dialogue now seen in this country
RIDGEOLOGY between law and science – with senior judges
attending a recent Royal Society meeting (see
(FINGERPRINTS AND Chapter 1 case study p20) – is personal and
FOOTPRINTS) AND DNA. has not been institutionalised. For example,
there is no formal link between the Forensic
DVI ITSELF INVOLVES Science Regulator and the judicial rule-making
MATCHING ANTE MORTEM bodies. A substantial risk of errors remains
because of the random nature by which
SAMPLES WITH POST probative issues come before the Court of
MORTEM SAMPLES TO Appeal, and the absence of any provision for
judicially appointed scientific experts. Secondly,
PROVIDE A CONCLUSIVE as the authors of the 2009 US National
IDENTIFICATION. Academy of Sciences report put it, whether
judicial review alone can cure “the infirmities
THE CHANGING NATURE OF CRIME

CASE STUDY

FORENSIC ANALYSIS OF
CHEMICAL WEAPONS IN SYRIA

T
CERYS REES, Head of Chemical and Biological Analysis and Attribution, Defence Science and Technology Laboratory (Dstl)

hroughout the summer of casualties showing symptoms consistent


2013, the world watched as with nerve agent poisoning revealed
pictures and videos emerged markers characteristic of exposure to sarin.
from Syria suggesting that the The analysis – of three separate sample
use of chemical weapons should be added to types from the same individual – provided
the repor ts of other atrocities taking place compelling evidence that this could not
in that country. Even before these pictures have been a ‘spoofed’ exposure, but could
emerged, the chemical and biological analysis only have occurred following an attack with
and attribution capability (CBAAC) at Dstl sarin. This proved to be the first laborator y
had been analysing physiological samples confirmation that chemical warfare agents
from victims and environmental samples had been used in Syria. Our highly specialised
from the areas that were repor tedly af- analytical work also revealed traces of sarin
92 fected. This analysis aimed to provide the and/or its characteristic breakdown products
highest levels of government – in the UK in associated environmental samples such
and internationally – with empirical evidence as soil, wood and wire. Fur ther detailed
of whether this was indeed the first use of analysis of the environmental samples
nerve agents in more than 25 years; and to identified indicators of how the sarin had
augment the broader analysis of the situation been produced. When the data from the
that was already being provided by Ministry physiological and environmental samples (and
of Defence’s (MOD) Defence Intelligence their sourcing) was evaluated in conjunction
Assessment Staff. with the rich intelligence picture, the
The MOD and the Home Office had resulting all-source assessment provided UK
already recognised that the UK needed the government with high confidence information
capability to analyse samples for the presence that the chemical weapon sarin had been
of chemical and biological agents to the used on numerous occasions.
highest possible standards. Consequently, When considered in light of The Review
much of Dstl’s analysis was accredited to of Intelligence of Weapons of Mass
the international standard ISO 17025:2005, Destruction (Butler review, 2004), which
which is the standard applicable to forensic stated that “more weight had been placed on
laboratories. In addition, the Dstl maintained intelligence than intelligence could bear”, the
a chain of custody for each sample to high-confidence information from laborator y
demonstrate that they could not have been analysis of samples to a ‘forensic’ standard
tampered with, or altered in any way, while in has now been shown to be highly beneficial
the laboratory. (Based on these procedures, for decision makers at the most senior levels
the laboratory has since been successfully of government, when combined with other
reviewed against International Laboratory sources of information.
Accreditation Cooperation G19 – Modules Research within CBAAC is now focussed
in a Forensic Science Process and the UK on developing techniques to provide
Forensic Science Regulator’s Codes of attribution information such as: the origins
Conduct). of precursor chemicals used to make the
Our analysis of blood, hair and urine from sarin; when the chemical agent was produced;
THE GLOBAL PERSPECTIVE

of the forensic science community”25. It is likely


that this central test facing forensic science
internationally will only be resolved through
systematic and extensive research, and that
will require significant and sustained funding.
This year, $8.5 million of the US National
Institute of Standards and Technology (NIST)
budget will be devoted to forensic science
research, and an additional $4 million has
been provided to NIST to fund external
research in a Centre of Excellence (COE). In
the previous year, the US National Institute
THE HIGH-CONFIDENCE of Justice disbursed more than $20 million in
INFORMATION FROM research grants into forensic science. Based
an equivalent proportion of GDP, matching
LABORATORY ANALYSIS the US government sponsorship of forensic
OF SAMPLES TO A science research would require targeted
budgets of about $5.5 million in the UK, within
‘FORENSIC’ STANDARD an aggregate investment of some $34.4 million
HAS NOW BEEN SHOWN by the entire European Union43.
TO BE HIGHLY BENEFICIAL CONCLUSION
FOR DECISION MAKERS The insights of earlier generations of UK
scientists in applying fingerprint comparisons
AT THE MOST SENIOR and DNA analysis have fundamentally
93
LEVELS OF GOVERNMENT. shaped contemporary conceptions of
criminal investigation. Pioneering work on
the standardisation of laboratory procedures
and biometric databases; the use of such
and the identity of specific individuals techniques in tackling high-volume crime; and
responsible for both the production and the assessment and interpretation of scientific
use of this type of weapon. Although it evidence; have all provided benchmarks that
is challenging to acquire this information, have been adopted in other countries or
it could have a profound effect on UK incorporated into international standards.
foreign policy, and help to deter states The principle issue for decision-makers today
and terrorist organisations from pursuing is how to most effectively and efficiently
weapons of this nature in the future. ensure that UK scientists and technologists
can participate in the globally-collaborative
enterprise of shaping the future of forensic
science, and benefit from the knowledge,
expertise and ideas to be found in the
international community. Achieving those
goals would contribute to the resilience of
both science in general, and criminal justice in
particular, in the UK.
THE CHANGING NATURE OF CRIME

CASE STUDY

WILDLIFE CRIME

T
LUCY WEBSTER, Wildlife Forensic Scientist, Science and Advice for Scottish Agriculture (SASA)

he illegal wildlife trade is one of a range of specialist disciplines including non-


the most significant transnation- human DNA analysis, veterinary pathology,
al organised crimes, generating morphological examination and specialist
billions of dollars each year for chemical analysis4, 5. Outside the mainstream
those involved1. These crimes impact the of forensic science provision, and yet providing
populations of animals and plants persecuted, evidence for criminal investigations, the
including many critically endangered species, as development of standards in these specialist
well as the communities where these species fields has been driven from within the wildlife
are found. forensic community6, 7, 8. The Society for Wildlife
For some endangered species, limited trade Forensic Science (SWFS) was established in
is permitted by CITES (the Convention on 2009 to facilitate the development of this
International Trade in Endangered Species of field and the standards required8. In addition
Wild Fauna and Flora2). Permitted trade is to provision of proficiency testing, the society
strictly controlled, and export and import launched a certification scheme in 2012
permits are required from the relevant CITES for individual practitioners. The standards
94 management authorities to move specimens issued by SWFS are overseen by the Forensic
internationally. This system for cross-border Science Standards Board in the USA9, although
movement has, however, been abused. For they were written to be applicable at an
example, legally hunted rhinoceros horn international level.
trophies are known to have disappeared after SWFS has members representing more
import to the hunter’s home country. than 60 laboratories across 15 countries. This
One such case involved a hunter in network of wildlife forensic scientists can help
the Czech Republic, who had imported a to answer investigative questions regarding the
rhinoceros trophy from South Africa. At an origin of seized specimens, making a substantial
inspection visit by the local CITES Enforcement contribution to combat the illegal wildlife trade.
Authority, no rhinoceros horn trophy was
present. The hunter claimed to have had the
horn carved into small cups, but the CITES
Enforcement Authority were not convinced
by this story. To establish whether the cups
were rhinoceros horn in origin or not, a
sample of a cup was sent to the Wildlife DNA
Forensic unit at SASA3 for DNA analysis. A
DNA test to identify the species of origin from
the cup sample was applied, identifying the
carving as originating from a cow (Bos taurus)
contradicting the hunter’s claim. This case has
not yet been concluded, but it is likely that this
rhinoceros horn has become part of the illegal
wildlife trade.
The need for specialist wildlife forensic
services is clear – without DNA testing, it may
have been impossible to refute the hunter’s
claim. Wildlife forensic science encompasses
95
THE CHANGING NATURE OF CRIME

CHAPTER 9

DESIGNING OUT CRIME


NICK ROSS, Chairman Forensic science has long focused on crimes that have already occurred.
UCL Jill Dando Institute But there is untapped opportunity for the insights and methodologies of

F
of Crime Science science to prevent crimes from happening in the first place.

orensic science (FS) has contributed itself more relevant to the judicial system.
greatly to the evidence-base of But there may be even greater prospects for it
criminal investigations. It has beyond the confines of criminal justice. Since
triumphed in exposing miscarriages the inception of modern FS, which began with
of justice. It has evolved from a supporting role fingerprinting in the 19th century, it has been
to become a front-line analytic tool, often enlisted to help win a war that, ideally, would
directing the efforts of investigators. The vast have been averted in the first place. Traditionally
majority of serious cases, and a significant a criminal investigation follows in the wake of
proportion of all Crown Court cases, now victimisation; a key question for forensic science
include presentation of one or more types of is the extent to which science could pre-empt
forensic evidence, and public confidence in FS is the crime. Indeed, it is a remarkable that FS has
so robust that the Lord Chief Justice of England thus far mostly seen its role as downstream of
and Wales has wondered aloud about whether offending: finding someone to blame has had
such faith is justified1. more importance than finding a solution to
Many scientists share those doubts, as Itiel future crime.
96 Dror observes in Chapter 4. The US National Blame plainly has its merits. Catching and
Academy of Sciences concluded in 2009 that, convicting wrongdoers can create a triple-
“with the exception of DNA analysis, no forensic whammy: providing a much-needed sense of
method has been rigorously shown to have the justice, in some cases removing the wrongdoer’s
capacity to consistently, and with a high degree freedom to cause more harm, and, ideally,
of certainty, demonstrate a connection between deterring future crime.
evidence and a specific individual or source.”2 But court dispositions seem to have had
There are other legitimate concerns about disappointingly little influence on the ebb and
the use of FS in court, not least those of critics flow of offending. In Britain, this pattern was
like Dror who warn that FS may help legitimise obscured because of a reliance on data recorded
deep-seated weaknesses in court processes. by the police, which capture less than half of
These include a reliance on adversarial methods crime revealed by other methods3, 4 (see Figure
and on precedent, strict rules which exclude 1) and can be vulnerable to recording error
evidence from being aired, and a demand for a and deliberate obfuscation – so much so that in
binary outcome. No other questions that relate 2014 the UK Statistics Authority suspended their
to public safety are now judged in this way. designation as National Statistics. At least one
There is also the matter of cost. The chief constable has described them as “dead in
criminal law is facing a financial crisis. Against a the water”5.
trend in which many goods and services have Victims surveys such as the Crime Survey
experienced price deflation, the expense and for England and Wales (CSEW)3 have become
length of court cases has been rising steadily for the preferred method for measuring trends
a century. It is far from clear whether, on balance, in all but the rarest of crimes. Mark Bangs,
FS makes the Criminal Justice System nimbler senior statistician in the Office for National
and more cost-effective (see Chapter 2 case Statistics’ Crime Statistics and Analysis Team,
study p29). says: “The CSEW provides a better reflection
of the extent of crime than police recorded
PRE-EMPTING CRIME figures, as the survey asks about crimes that
There are major opportunities for FS to refine are not reported to or recorded by the police.
its techniques, be more economical, and make The survey is also unaffected by changes in
DESIGNING OUT CRIME

Figure 1: Trends in police-recorded crime for England and Wales, compared with Crime Survey for England and Wales3, 4

20,000

Police recorded crime - old counting rules


18,000
Police recorded crime - new counting rules
Number of offences (000s) Police recorded crime - post NCRS
16,000
Police recorded crime - post NCRS year ending June

14,000 CSEW estimate


X CSEW estimate years ending June

12,000

10,000

8,000

X
6,000
X

4,000

2,000 97

0
2000/01

2002/03

2004/05

2006/07

2010/11

Yr end Jun 14
Yr end Jun 15
1981
1982
1983
1984
1985
1986
1987
1988
1989
1990
1991
1992
1993
1994
1995
1996
1997

1998/99

1999/00

2001/02

2003/04

2005/06

2007/08
2008/09
2009/10

2011/12

Figure 2: Trends in crime: average of one-year prevalence rates (the number of people who have experienced that crime)
for selected property thefts in 15 Western countries7.

4
Theft from a car
Bicycle theft
Burglary
Attempted burglary
2
Theft of a car
Theft of a motorcycle

1988 1991 1995 1999 2003/04


THE CHANGING NATURE OF CRIME

WHEREAS SOMETIMES CRIME IS SIMPLY designing a response. Moreover it is harder (and


usually ethically more challenging) to change
DISPLACED FROM ONE TARGET people than it is to change the circumstances in
TO ANOTHER, MORE FREQUENTLY which they find themselves.
The disconnect between courts and crime
THERE IS A HALO EFFECT WHEREBY becomes more starkly apparent when checked
FEWER PEOPLE ARE RECRUITED against individual crime types. Crime, like illness,
is really a collection of many different malaises.
TO ANTISOCIAL BEHAVIOUR. While individual trajectories can contribute to
a common pattern, there can be contrasting
undercurrents below the troughs and waves. Yet
examination of almost any category of offending
police recording practices or levels of public has shown little correlation with what happened
reporting to the police, so it provides a more in courts. For example, homicide in Britain
consistent measure over time.” Victim surveys swelled alarmingly after the abolition of capital
are also less susceptible to classification error or punishment, but it was already rising before that
manipulation6 than police records. event, and has fallen dramatically since. Car crime
Given this standardised metric there is now rocketed despite little change in penal tariffs
overwhelming consensus among statisticians and and has subsequently dropped by about three-
senior police that crime surged from the 1960s quarters (see case study p105), again with no
to the 1990s and then fell faster than it had risen. dramatic change in court disposals. The same
This pattern was broadly common across the is true of burglary and most other traditional
industrialised world and the trend was similar in physical and contact crimes.
98 countries with punitive or liberal penal policies The steep falls in offending, and particularly
(see Figure 2)7. blue-collar crime, show that we can reduce
In other words, catching people is a necessary crime through better preventative measures,
response to crime but the Criminal Justice and can do so on a dramatic scale. High-
System has rarely been proven to dictate, or quality research has also shown that whereas
even largely influence, rates of victimisation. This sometimes crime is simply displaced from one
is not to say that there is no role for deterrence target to another, more frequently there is a halo
and incarceration, but that their impact is not effect whereby fewer people are recruited to
always conspicuous. Accordingly, it might be antisocial behaviour8. (Typically the pattern seems
useful for scientists to apply themselves to the to be that growth in opportunities for acquisitive
factors that are at least closely correlated with crime leads eventually to a rise in violent crime,
the rise and fall of crime. but that removing temptations for physical theft
We do not have to look far. It has long been causes fewer people to graduate into more
known that protective measures can enhance serious crime.)
security. This is why early people dwelt in caves
and later built castles and city walls. It is why we DESIGNING OUT CRIME
have locks and PIN numbers for our credit cards. Designing out crime is in many ways little
There is truth in the old saw that opportunity different from designing out accidents. Cars
makes the thief. provide an obvious example: for many decades
Of course there is more to crime than manufacturers blamed motorists for road
opportunity alone. There has to be a person casualties, thereby absolving themselves of the
or population predisposed to cutting corners need to engineer solutions, until campaigners
or being downright antisocial, and there needs like Ralph Nader turned the tide of public
to be temptation (which lawyers call a motive). opinion. Similarly the industry denied its own
That gives us several angles for potential responsibility for car theft until vehicle crime
intervention. But to assume that crime is simply became so ubiquitous that the government
caused by criminals is rather like saying illness is called business leaders to account and published
caused by patients, or that driving is caused by ‘lists of shame’ identifying models most likely
motorists. It is tautological rather than useful in to be stolen. It might just be coincidence but
DESIGNING OUT CRIME

recorded offences halved within eight years and whom bullying has always been a problem (see
have continued to plummet. case study p102). The link between opportunity
There are dozens of similar stories where and violence is less clear-cut than in acquisitive
thoughtless innovation led to surges in crime and crime, but correlations like those between
where sensible interventions led to precipitous knife-carrying and wounding in Scotland suggests
drops. Within a few years of the replacement of that opportunity makes the killer as well as the
shop counters in favour of self-service checkouts thief. There are also many theories about the
there was, perhaps inevitably, a surge in falling rates of violent crime – from abortion
shoplifting9, one in which prominent middle-class leading to fewer unwanted male children, to
people were caught up along with those whom declining alcohol and drug use, or even a drop
conventional criminology might have predicted in atmospheric lead concentrations – all showing
to be criminals. When prosecutions failed to some degree of persuasive correlation, though
stem the losses, retailers began to introduce an none consistently. The simplest reason – the
array of surrogate shop counters in the form Occam’s Razor answer – might be that physical
of RF readers, dummy display packaging, CCTV theft acts as a recruiting sergeant to more
and security guards. Similarly, as consumerism serious offending, so that as stealing declines
took off and ordinary homes became filled so, eventually, will assault. There are probably
with tempting products such as TVs and video many factors working in tandem, some much
recorders, domestic burglary surged until in more important than others. On the other hand
1989 the Association of Chief Police Officers, there are unequivocal connections between
endorsed by the Home Office and the circumstance and many types of offending.
insurance industry, introduced new standards for Among these are internet-enabled crimes, such
new and refurbished properties called Secured as spamming, scamming, identity theft, child
By Design. As deadlocks, double-glazing, and sexual exploitation and fraud; ill-conceived 99
intruder alarms became widespread, the rate of expense-claim systems like those that ensnared
burglaries fell emphatically and consistently for so many otherwise honourable MPs; or the
quarter of a century. multi-billion pound tricks and swindles within
Violent crime too has been curbed by poorly supervised financial service industries.
prudent interventions intended to make Just as we have learned to curb blue-collar
circumstances default to safety rather than offences, we have thrown open vulnerabilities
provocation. Segregating rival football fans and to white-collar ones, tempting largely different
penalising clubs for misbehaviour restored populations to offend and demonstrating clearly
respect for British soccer after years of global that the middle-classes are no more immune to
infamy. Redesigning spaces so that drinkers are temptation and opportunity than are the poor –
jostled less, provided with food, or supplied with or for that matter the exceedingly rich.
harmless glassware has had a marked effect on
casualties where alcohol is implicated. Sometimes THE OPPORTUNITIES OF SCIENCE
circumstantial change has on its own fuelled There is ample opportunity here for the insights
or quelled crime waves. The rising popularity and methodologies of science to save us from
of mobile phones and portable electronic future harm. Science uses observable, testable
gadgets propelled a swell of street robberies and repeatable measurements and experiments
until their security measures made mugging to understand how things commonly behave.
increasingly redundant – mobile phone theft is It is a systematic process of evaluating theories
now concentrated mostly between children for through meticulous control of contaminating

IT HAS LONG BEEN KNOWN THAT PROTECTIVE MEASURES CAN


ENHANCE SECURITY. THIS IS WHY EARLY PEOPLE DWELT IN
CAVES AND LATER BUILT CASTLES AND CITY WALLS. IT IS WHY
WE HAVE LOCKS AND PIN NUMBERS FOR OUR CREDIT CARDS.
THE CHANGING NATURE OF CRIME

CASE STUDY

ETHICS IN FORENSIC SCIENCE

T
CHRIS HUGHES, Chair of the National DNA Database Ethics Group

he application of science to the sufficiently understood and testable for a fair


prevention and detection of trial, without unduly compromising the public
crime faces a range of ethical interest in other ways.
issues that set it apart from most A third ethical dimension is of particular
other fields of human endeavour. Those arise significance for genomic and cognate
from the subject matter of the discipline, the investigations. In a forensic investigation, the
purposes for which it is carried out and the key driver is to establish the identity of a
ethical relations of the various parties. person in order to determine whether they
Efforts to prevent crime include the use have committed a criminal offence. They are
of psychological and behavioural economic likely to feel that this amounts to an intrusion
models. These may be applied to ‘design out’ into their privacy without consent. This stands
crime, through techniques such as presenting in sharp contrast to most other biomedical
visual cues to encourage social interaction; or sciences, where investigations aim to treat
to adjust market behaviour, by restricting sales an individual’s medical condition, or require
of some goods or promoting the sales of less informed consent from a research subject,
100 harmful competitors; or to ‘nudge’ pro-social or involve minimal interference through the
behaviour. But these approaches highlight a review of medical records. The countervailing
conflict between the proponents of a minimal ethical arguments, of course, relate to the
state, and those who consider that society victims of crime whose rights have been
should act collectively to prevent suffering and infringed, the duty of society at large to
promote happiness. uphold the criminal law by identifying the
The forensic scientist has an overarching duty perpetrator, and the duty of society to protect
to tell the truth. But they also have a duty to its members from being harmed by undetected
communicate that to judges, juries and lawyers perpetrators.
in a way that they can understand and evaluate The fourth substantive dimension lies
fairly: otherwise, both the accused and the in the large-scale collection and storage of
victim are denied a fair trial. In forensic science, information about individuals. The non-
however, significant aspects of its techniques are consensual collection of fingerprints, samples
either part of the closely-guarded intellectual for DNA profiling and custody photographs
capital of commercial entities, or seen as amounts to an intrusion into the individual’s
sensitive information whose disclosure could privacy. The retention of CCTV footage and
assist criminals or undermine national security. data relating to telephone and internet traffic
The challenge for the scientist and the judge creates a similar possibility of intrusion.
is to ensure that the underlying process is Those setting the boundaries for what is

WITHOUT PUBLIC DEBATE AND SCRUTINY OF INNOVATIONS,


THE ACCEPTABILITY OF FORENSIC PRACTICE MAY BE UNDERMINED.
THIS WOULD POSE A SIGNIFICANT CHALLENGE TO THE LEGITIMACY
OF THE CRIMINAL JUSTICE PROCESS, ALONG WITH COHESION AND
TRUST IN SOCIETY.
DESIGNING OUT CRIME

factors such as bias and chance. It is open to


peer review and public scrutiny and, if true to
itself, regards facts as provisional and subject to
revision in the face of further evidence. Science
has proved uniquely successful in changing our
future for the better (and arguably sometimes
for the worse). Its findings have transformed our
understanding of ourselves and its discoveries
acceptable forensic practice in these areas have been more spectacular than anything
must properly evaluate the harms and imagined by fiction writers or by poets.
benefits that flow from the act of obtaining FS embraces every scientific field from
and using the information – to the individual archaeology to zoology. At its best it is
whose data is gathered, and to other multidisciplinary, embracing biology, chemistry,
individuals who are affected. This must be epidemiology, physics, psychology or any other
balanced against the consequences of not specialty that can help to solve a problem.
acting: both the act and the omission have Science has already been drafted in to tackle
moral consequences. politically-motivated crime – scientists are
Many factors circumscribe acceptable involved in anti-terrorism considerations, for
forensic practice, including the impact example – and it can bring the same skills to
on a fair trial, the interference with an help private or public sector enterprises to
individual’s privacy and family life, and foresee danger and design products, policies or
whether the information was obtained in a services that default to safe. Forensic scientists –
lawful manner. When considering the latest those with a ready-honed interest in crime – are
scientific and technological innovations well placed to colonise this field. 101
of forensic science, however, the norms The enrolment of students in FS has grown
of what society sees as acceptable are strongly in recent years (see Chapter 2 case
uncertain and fluid. The duty of forensic study p30), to the extent that there have been
science in such cases is, above all, to warnings about falling standards, with some
communicate and explain what is proposed courses even described as “softer sciences”10.
and its consequences. Although individuals Many graduates, even the best of them, may find
will ascribe different meanings and values to it hard to get employment in their chosen field.
such actions, providing a clear explanation is There is therefore a push factor, as well as an
the first step towards engaging with society opportunity, for FS to look beyond the realms of
– a process that ultimately determines the catching offenders or of prosecuting or defending
desirability or otherwise of developments in people in the courts.
forensic science. In doing so, forensic scientists will need
International legal instruments (of the to hone their ethical skills and perhaps learn
UN, and Council of Europe) set norms from the model of medicine, which has
for the protection of human rights, but developed strict protocols for research and
they also recognise “the importance of even for resource allocation. Security should
promoting public debate on the questions be emancipating but if it is done badly it can
posed by the application of biology and become intrusive and limit our freedoms and
medicine”, as well as the state’s duty quality of life (see case study p100). Moreover,
to provide public information. Without the very concept of crime can be surprisingly
public debate and scrutiny of innovations elusive, and laws can be capricious or unfair
in forensic science – through the media, as well as subject to revision. What we should
ethics committees, professional bodies and seek is to cut the agony that people suffer
legislatures – the acceptability of forensic unnecessarily. That task, apart from knowledge
practice may be undermined. This would for its own sake, is surely one of the greatest
pose a significant challenge to the legitimacy goals of science, and in particular one of the
of the criminal justice process, along with greatest opportunities for forensic science.
cohesion and trust in society.
THE CHANGING NATURE OF CRIME

CASE STUDY

MOBILE PHONE CRIME

M
NICK ROSS, Chairman, UCL Jill Dando Institute of Crime Science

obile phones exemplify how the displaced elsewhere. Of particular importance


ebb and flow of crime is heavily to the phone companies was that there was
dictated by temptation and no displacement to subscription fraud, where
opportunity. Their emergence accounts are opened in false names. Their
in the 1980s, and the take-up of second- overall losses to fraud tumbled by 80% within
generation technology in the 1990s, spawned an five years.
entirely new category of crime – and went on to Meanwhile, phone handsets themselves
revitalise an old one. created a parallel crime wave. As they became
The new challenge was air-time fraud (i.e. smaller and more ubiquitous, they came
making calls without paying). The old one was to embody all six of the classic criteria for
footpad robbery, which had come to be called theft, which crime scientists call CRAVED
mugging. Had forensic science existed with a (Concealable, easily Removable, widely Available,
remit to prevent crime as well as to detect Valuable, fashionably Enjoyable and Disposable)2.
it, more thought would have been given to In 1993, the government’s crime prevention
designing out the vulnerabilities and provocations committee warned preventative action was
102 of mobile phones, rather than retrofitting them. needed. Nothing was done.
This failure to think ahead cost billions of pounds, By 2001, the Metropolitan Police Service
resulted in significant harm to individuals and estimated that around 40,000 mobile phones
dented public tranquillity. were reported stolen in London each year,
As so often happens in product innovation, accounting for more than half of all street attacks.
manufacturers took care to ensure that the In 2003, the problem had become so worrying
new devices were electrically safe, non-toxic that the government summoned industry
and robust, but the potential to incite crime was leaders to an emergency summit. As a direct
not considered important. As a result, people result, safeguards were introduced to ensure
quickly found ways to mimic the identity of individual handsets could be tracked when they
other people’s phones and thereby steal their made contact with the network. Thereafter,
airtime. In the early 1990s this parasitic fraud phone theft in England and Wales began to fall
grew exponentially, especially in the US where and continued to do so until around 2010, when
handheld scanners became a craze and cell a new generations of smart phones unleashed
phone numbers could easily be cloned. new temptations, especially among the young3.
At first the telecom companies sought to pass (In 2012, two–thirds of handset theft victims
on the costs to subscribers whose handsets had reported to the Metropolitan Police were
been compromised. Only when they themselves between thirteen and sixteen years old.)
became obliged to write down the losses did The actual volume of handset theft has
they introduce defences such as encrypting cell been hard to quantify because police figures
phone serial numbers. The result was a drop in only count cases reported to them. Thus
crime even steeper than had been the rise (see they inevitably undercount crime and are
Figure 1). influenced by many factors, including insurance
Significantly, the demise of air-time fraud did penetration. The most reliable measure, the
not appear to cause a switch to other crimes. one most respected by the Office for National
This is important because classical theories in Statistics, came from a sweep by the Crime
criminology attribute crime to social disaffection Survey for England and Wales in 2013/14 (ref.
known as anomie, with the fatalistic implication 4). Even this must be treated with caution,
that a crime prevented is a merely a crime because an innocently mislaid phone may
DESIGNING OUT CRIME

Figure 1: US air-time fraud in the 1990s (ref. 1).

$500m

$450m
Tumbling & Cloning Losses
$400m Subscription Frauds
$350m

$300m

$250m

$200m

$150m

$100m 103
$50m
Jun ‘95
Jun ‘93
Jun ‘92

Jun ‘94

Jun ‘96

Jun ‘98

Jun ‘99
Jun ‘97
Dec ‘92

Dec ‘93

Dec ‘94

Dec ‘95

Dec ‘96

Dec ‘97

Dec ‘98

Dec ‘99

easily be assumed to have been stolen. But manufacturer, and so bring pressure on suppliers
it provides the best estimate we have, and to make their products, and thus their customers,
suggests a very steep decrease in victimisation more crime-resistant.
over the preceding decade5. It seems likely this The study involved more than 100,000
decline owed much to the fact that trackable mobile phone thefts reported in London
phones have little black market value. A causal between August 2012 and January 20147. As
relationship is hard to prove but there are many with previous research it found evidence to
precedents, including sustained and precipitous suggest that phone theft is disproportionately
falls in vehicle crime after security features targeted at the young. It also revealed that
were improved (see case study p105). There is women were victimised more than men. More
also evidence from phone thieves themselves importantly for crime prevention, BIT was able
who, after all, make essentially rational targeting to build on others’ work8 to produce the first
decisions6. Even so, with an estimated 784,000 official Mobile Phone Theft Ratio. The outcome
victims a year in England and Wales in 2013-4, was striking. Crime surveys had already shown
handset theft is still a significant challenge for that more iPhones were reported stolen
society4. than other handsets, but by comparing thefts
Consequently, the Behavioural Insights Team against volumes of suspected, untargeted
(BIT) worked with the Home Office and the thefts, the researchers showed that this was
Metropolitan Police Service to see if some not merely a reflection of how many were in
handsets provoked more crime than others. circulation. In fact, Apple products were targeted
If so, they could rank phones by type and disproportionately (see Figure 2).
THE CHANGING NATURE OF CRIME

Figure 2: The Mobile Phone Theft Ratio: The top 20 most likely phones to be targeted by thieves between August 2012
and January 2014 (ref. 7). This ratio is derived by dividing the share of thefts of a given model that were plausibly targeted
(e.g. a phone that has been snatched) by the share of thefts of a given model that was unlikely to have been targeted (e.g. a
phone stolen as part of a burglary).

iPhone 6 Plus
iPhone 6
HTC M8
Samsung Galaxy Note 3
BB 9320
LG Nexus 5
iPhone 5s
Samsung Galaxy Note
iPhone 5c
iPhone 5
Samsung Galaxy 3
Samsung Galaxy Note 2
HTC One
Blackberry Z10
Samsung Galaxy Mini
Samsung Galaxy S3
Samsung Galaxy Alpha
iPhone 4s
iPhone 3Gs
Blackberry 9900
104 0.0 0.5 1.0 1.5 2.0

This ratio is derived by dividing the share proposes to update the Theft Ratio and provide
of thefts of a given model that were plausibly comparison websites to inform consumers,
targeted (e.g. a phone that has been snatched) encourage industry innovation and promote
by the share of thefts of a given model that was wider use of existing security features.)
unlikely to have been targeted (e.g. a phone The research adds weight to the already
stolen as part of a burglary). impressive volume of evidence that crime is not
This may reflect that iPhones were expensive, determined by personality or social factors alone
which made it tempting to report thefts in but, perhaps more importantly, by the ease and
order to make insurance claims. Moreover, Apple attractiveness of committing an offence. Since
might protest that its products were especially a proportion of phone theft involves physical
fashionable in this period and so more desirable assault, there is evidence that violent crime as
to thieves. But the analysis also suggested that well as acquisitive crime can be curbed with
suppliers can control crime rates to a great increasing effectiveness.
extent. In September 2013, Apple introduced a Consumers need to be informed about the
new operating system called iOS7 with a ‘Find relative risks they face, and government and
My Phone’ function that could remotely lock other agencies should recognise they have a
the handset. When the feature was announced, role in targeting appropriate and proportionate
reported thefts of Apple phones subsequently pressure on those whose products unwittingly
peaked and then declined markedly, unlike those create crime pollution.
from other manufacturers. Cutting victimisation requires forensic science
Analysis showed that this decline was unique techniques to be applied at the design stage, not
to Apple, and theft rates for other phones after poorly thought-through products, services
did not drop at the same time. In the months or policies have already been subject to misuse.
that followed, as more security features were
embedded in more devices, recorded mobile
phone crime as a whole continued to fall9. (BIT
DESIGNING OUT CRIME

CASE STUDY

TRENDS IN VEHICLE CRIME

T
MIKE BRIGGS, Crime Research Manager at Thatcham Research

he impact of vehicle crime goes reduction in vehicle theft (see Figure 1). The UK
far beyond car theft – it enables branch of the International Association of Auto
many other crimes, from joy Theft Investigators (IAATI UK) now acts as an
riding and fraud to terrorism. important forum for those involved in tackling
Twenty years ago, the rate of vehicle crime was vehicle crime to share information and best
high and getting worse, so the UK government practice.
persuaded the motor insurance industry to set However, vehicle crime rates may now be at
security standards that would counteract this a turning point. When manufacturers bring in
trend. Efforts to tackle criminals in this area, by new technology, so too do organised criminal
undermining their systems and knowledge, are gangs (OCGs). As soon as we find ways to raise
still being led by the United Kingdom. security standards, OCGs find new weaknesses
Those security standards included fitting in those systems. Over the past 4 years, we have
vehicles with an immobiliser and insurance- seen a rise in OCGs attacking vehicles and, in
certificated alarm. But manufacturers could also some cases, removing them more effectively than
take components off the vehicle – reducing the owners could themselves. Indeed, vehicle
the number of door locks, for example – in recovery rates are now at their lowest since 105
order to defend those components at less records begin (see Figure 2), and the costs of the
cost. These changes, based on standards set crimes are rising because younger vehicles are
by Thatcham, started the trend for a dramatic being stolen.

Figure 1: UK domestic vehicle theft has fallen dramatically over the past two decades.

1,200
Theft from vehicle
Counting Rule changes
Theft of vehicle
1,000 Alarm NVSA 3
NVSA 4 Interfering with a
Number of offences (000s)

NCRS motor vehicle

800 NVSA 4a

600

NVSA 5
400

Immobilisation NVSA
200

0
2000/01

2002/03

2004/05

2006/07

2010/11

2012/13
1981
1982
1983
1984
1985
1986
1987
1988
1989
1990
1991
1992
1993
1994
1995
1996
1997
1998/99
1999/00

2001/02

2003/04

2005/06

2007/08
2008/09
2009/10

2011/12

2013/14

1. New Counting Rules for recorded crime were introduced in 1998/99 and the NCRS was introduced in April 2002.
2. Interfering with a motor vehicle became a notifiable offence in 1998/99.
THE CHANGING NATURE OF CRIME

That means my team and I must set security Original equipment manufacturers (OEMs) are
standards that anticipate a thief ’s next move. designing new ways to combat criminal gangs.
But generally it is the aftermarket industry that
We focus on three key areas: fills the gap, as they once did with immobilisers
1 Body security and alarms. Today we see the same happening
• Protecting on-board diagnostic (OBD) with vehicle tracking systems.
systems Tracking and navigation systems allow us to
• Additional locks, including wheel security recover evidence, and we also gain vital data
• Catalyst converter protection from keys and vehicle control units. But the
falling costs of technologies such as fully-keyless
2 Electronic security door unlock and keyless engine start means that
• Alarm Systems criminals can also exploit them to steal vehicles,
• Immobiliser Systems and we are in danger of seeing a fresh surge in
• Tracking systems joy riding.
Beyond that, cybercrime is the next big threat
3. Vehicle identification to tackle. Criminals have been interfering with
• Parts marking, with details recorded in a vehicle software since the late 1990s, but they
database available 24/7 are now able to carry out these attacks much
• Glass etching, with details recorded in a more rapidly: the times required to code a key
database available 24/7 or start the engine have fallen from over 30
• General vehicle identification, through minutes to 6 seconds.
106 security schemes such as CESAR or Further information can be found at
MASTER www.thatcham.org

Figure 2: UK domestic vehicle recovery has declined substantially over the past two decades.

3,500 70%
Number of offences (000s)

3,000 60%

2,500 50%

2,000 40%

1,500 30%

1,000 20%

500 10%

0 0%
VM137

VM065

VM100

VM021

VM140

VM044

VM141

VM035

VM035

VM006

VM015

VM085

VM036

VM147

VM071

STOLEN RECOVERED YES % RECOVERED


SECTION 3:
FORENSIC SCIENCE:
BEYOND THE COURT
FORENSIC SCIENCE: BEYOND THE COURT

FORENSIC SCIENCE:
BEYOND THE COURT

Today, economic
adulteration and
counterfeiting of global
food and consumer WHO’s international Medical Products
products is expected Anti-Counterfeiting Taskforce (IMPACT)
to cost industry estimate that up to
$10 - $15 25% of the total
billion medicine supply
per year in less-developed countries is counterfeit

Microtags are micrometre-sized particles uniquely encoded with multiple layers of security information within
the space of 50-110 micrometres (the size of a speck of dust)

Olive Oil Honey

10
Milk Fish

food products that


Grain are most at risk Spices
of food fraud

Coffee Tea

Organic
Fruit juices food
Currently 713 GPHF-Minilab units
are used globally across 92 countries
to fight the counterfeit drug trade.

In 2009 the OECD reported that the


trade in fake goods was as high as

$250 billion
Larger than the national GDPs of approx.

150 economies

In 2014, over

35 million
fakes were detained at EU
borders. Of these, 25% were
potentially dangerous to the
health and safety of consumers

Around half
of some air pollutants in the UK
come from other parts of Europe
FORENSIC SCIENCE: BEYOND THE COURT

CHAPTER 10

AUTHENTICITY AND PROVENANCE


DEREK CRASTON, New forensic approaches in detection and identification offer potential solutions to
Government Chemist, fraud or product quality issues in many areas of public protection. But they would
LGC benefit from the wider availability of high-quality reference databases, greater use of
anti-counterfeit measures, and more collaboration between policymakers, industry

C
and the measurement community.

onsumers seek a range of desirable can a retailer be sure of the products it provides?
attributes when purchasing goods, Such assurance depends on an understanding and
but some qualities are self- monitoring of risks; and related to this, managing
evidently common across many and auditing product, ingredient and component
product types: safety, provenance, utility and supply chains, as well as production processes.
value for money. The seller is responsible for The aim should be to establish trust in the supply
being honest about what is claimed for their chain, earned by demonstrated (and audited)
goods – either directly or by implication – and competence and integrity; but also backed up by
society expects regulation of legal or quality systems able to secure the supply chain against
standards in associated markets. Subversion of criminal infiltration. Risk assessment is also a
such standards, ranging from cutting corners to critical component of regulatory enforcement
outright criminality is, unfortunately, increasingly strategies. Allied to both enforcement and supply-
common. Indeed, according to reports1,2, the chain management is the need for detection tools
110 annual international global trade in counterfeit that can be deployed in specialised laboratories or
goods alone is measured in the hundreds of in the field to test for conformity.
billions of pounds.
Consumers and businesses place a premium THE DETECTION CHALLENGE
on the authenticity and integrity of goods and Detection involves compositional analysis, to test
services. The converse – involving fraud or poor whether a product contains what is claimed. This
quality standards – jeopardises honest businesses, can uncover the potential substitution, extension
consumer trust and health. Examples include or adulteration of the product with similar but
the horse meat episode3, the dangers associated cheaper ingredients; the presence of undeclared
with trade in counterfeit pharmaceuticals4, the ingredients or components that may be added
economic impact of counterfeit electronics, the to reduce production costs or increase the sale
well recorded morbidity and mortality caused by price; the over-declaration of key or quantitative
counterfeit alcoholic drinks5,6, and risks to people ingredients; and compliance issues such as non-
with food allergies due to inadvertent exposure declaration or false declaration of processes.
to allergens7. The extent and impact of these at Investigators also need tools that can verify claims
a sector level is described in Chapters 11, 12 and about the origins of product ingredients, and
13. the location of production: in other words, who
Consumers rely on retailers and regulators to made it and what did they make it from?
assure the quality and authenticity of goods, and For example, whether a wine or whiskey is of
it is unlikely that emerging technology will change the age and from the location indicated on the
this dependence in the immediate future. So how bottle; or whether clothes or cosmetics were

CONSUMERS AND BUSINESSES PLACE A PREMIUM ON THE


AUTHENTICITY AND INTEGRITY OF GOODS AND SERVICES. THE
CONVERSE – INVOLVING FRAUD OR POOR QUALITY STANDARDS –
JEOPARDISES HONEST BUSINESSES, CONSUMER TRUST AND HEALTH.
AUTHENTICITY AND PROVENANCE

made by the company named on the label. Is THE RANGE OF POTENTIAL ISSUES
it Scottish beef? Or Parma ham? The range of
potential issues is wide and changing, and often IS WIDE AND CHANGING, AND
motivated by the high financial gains that can be OFTEN MOTIVATED BY THE HIGH
made through illegal activity.
The most counterfeited products are
FINANCIAL GAINS THAT CAN BE
those of higher price, by virtue of intellectual MADE THROUGH ILLEGAL ACTIVITY.
property or brand equity, and/or the scarcity
of components or ingredients, or the cost of
complex production or processing. This provides
a degree of predictability that can be built in technology advancement.
to risk assessments, and which enables better This complexity might in future benefit from
targeting of enforcement resources. Prediction developments in ‘big data’ by capturing, combining
of risk forms an important part of the National and analysing multiple and variable information
Intelligence Model8, which is also informed by sources to improve risk assessment and incident
horizon-scanning: using global data feeds of prediction. As yet, there is insufficient information
recalls or incidents, for example, as well as local sharing across multiple interfaces: from agency
information from whistleblowers. Regulatory to agency, and especially between some parts of
bodies monitor incidents and recalls at national, industry and government. Until our intelligence
regional and global levels. For pharmaceuticals, systems improve, it remains highly likely that
national authorities such as the UK’s Medicines incidents and criminal activity will continue to be
and Healthcare products Regulatory Agency detected on a regular basis through health events
(MHRA) post information on local recalls9 (as is still the case for the many deaths caused
while the World Health Organization provides by counterfeit medicines, particularly in the 111
information on counterfeit medicines at a global developing world) or by targeted surveillance by
level10. Similarly in the foods area, EU member Trading Standards and government programmes
states have national systems for reporting non- (as was the case with horse meat). It is also
compliance incidents relating to food and feed worth reflecting that improved intelligence can
that has been inspected on the market or at the only partially mitigate the likelihood of fraud, since
border, and if appropriate these are shared across those involved in related criminal activity have a
geographies through the Rapid Alert System very wide field of opportunity and are normally
for Food and Feed11 operated by the European adept at reacting to intelligence-led activities.
Commission.
Although incidents or recalls report events DEVELOPMENTS IN MEASUREMENT
after they have happened, they provide an insight SCIENCE
into the potential for similar events to occur in Given the challenges of identifying areas of future
the future and are consequently useful data feeds concern, detection technology is needed that can
for organisations that review risk (such as the not only analyse for specific ingredients (‘known
European Food Safety Authority’s Stakeholder knowns’), but also screen for potential adulterants
Group on Emerging Risks, and the EU Food (‘known unknowns’) and ideally for anything that
Fraud Network). However, better prediction of should not be present within the end product
quality or authenticity issues requires complex (‘unknown unknowns’). The later, often termed
interpretation of multiple information sets that ‘untargeted analysis’, creates a major challenge in
include an understanding of influencing factors measurement science and will most likely require
such as price, production cost, supply chain and the flexible application of multiple techniques to
manufacturing complexity, regulatory activity, deliver the necessary range of sensitivities and
ease of ingredient or component substitution, chemical or biological diversity.
likelihood of identification, and ease of detection. Fortunately, developments in measurement
Each of these influencers is subject to change science continue to enhance investigative
in response to macroeconomic factors such capability. The major trends include an increased
as oil price, consumer confidence, materials ability to screen for multiple chemicals or
demand and global outputs (e.g. crop yields) and biological forms; improvements in sensitivity; and
FORENSIC SCIENCE: BEYOND THE COURT

CASE STUDY

NUCLEAR FORENSICS

S
VLADIMÍR ŠUCHA, MARIA BETTI AND KLAUS LÜTZENKIRCHEN, Joint Research Centre, European Commission

ince the early 1990s, the Joint


Research Centre (JRC) of the
NUCLEAR FORENSIC INVESTIGATION
European Commission has assisted USES MANY DIFFERENT ANALYTICAL
government authorities by analysing
nuclear materials intercepted from illicit
TECHNIQUES, SUCH AS GAMMA
trafficking, unauthorised possession and illegal SPECTROMETRY, SEVERAL DIFFERENT
disposals. Nuclear forensic analysis provides TYPES OF MASS SPECTROMETRY, AND
information about where and when the seized
material was produced, as well as its intended ELECTRON MICROSCOPY TECHNIQUES.
use.
Nuclear forensic investigation uses many
different analytical techniques, such as gamma age of the pellets (the uranium used for pellet
spectrometry, several different types of mass production was prepared in November 1990,
spectrometry, and electron microscopy with an uncertainty of three months).
techniques. In recent years it has focused on The knowledge that the JRC gains from
112 characteristic parameters called nuclear forensic its wide experience in case work, and its
signatures, which are found in uranium ore continuous research and development activities,
concentrates and other uranium products from is transferred to national governmental
the nuclear fuel cycle. These signatures include organisations by providing training courses in
the ratios of stable isotopes of elements such as nuclear forensic investigations. This training
sulphur, strontium and neodymium; the relative covers areas including: national response
concentrations of rare earth elements; and the plans; basic training for first responders (e.g. at
ratio of thorium-230 to uranium-234, which can radiological crime scenes); specialised training for
enable investigators to determine the origin and measurement experts; and tailor-made training
the age of the material. courses for laboratory scientists in specific
The following example highlights the potential methods and instruments.
for a nuclear forensic investigation to resolve International cooperation in nuclear forensics
a case of illicit possession of nuclear material. is of the utmost importance, because nuclear
In 2007, several items – presumably pellets security is a border-crossing challenge. Illicit
of nuclear fuel – were seized by the police in trafficking incidents, and the responses of
Northern Germany. The JRC’s Institute for government authorities, often involve more
Transuranium Elements (ITU) in Karlsruhe was than one country. The JRC has been co-chairing
asked to characterise the material and to provide the International Technical Working Group in
clues on its origin. The pellet material was Nuclear Forensics since its foundation in 1995
identified by mass spectrometry as low-enriched – which includes co-operation with the UK’s
uranium with 3.4% of fissile uranium-235, typical Atomic Weapons Establishment (AWE – see
of nuclear reactor fuel. case study on p116) and National Nuclear
Adding the information on the pellets’ Laboratory – and is involved in the activities
dimensions, measured by microscopy, allowed of the Global Initiative to Combat Nuclear
investigators to identify the production facility. Terrorism (GICNT). It also cooperates closely
This origin was corroborated by the low trace- with the International Atomic Energy Agency
element content of the pellets, which was (IAEA) in many areas related to nuclear security,
consistent with the fabrication process used in particularly in nuclear forensics.
that particular facility; as well as by the measured
AUTHENTICITY AND PROVENANCE

the facility to deploy tools out in the field. More


sophisticated tools are also being developed that,
THE REQUIREMENT FOR APPROPRIATE
for example, provide evidence relating to the REFERENCE DATABASES IS A RECURRING
source of ingredients or production, or to the THEME. THEY ARE ESSENTIAL FOR
authenticity of associated packaging.
Untargeted investigations applying INTERPRETING VARIATIONS FROM A
chemometrics (the application of mathematical PRODUCT’S EXPECTED COMPOSITION.
approaches to handing complex data sets) to
spectroscopy is a well known research area12.
There are a number of other measurement
techniques that can screen samples for used this technology to analyse for differences
multiple small and large molecules, such as between closely related fruit species, and thereby
proteins and DNA, and these have advanced identify chemical targets that indicate the trace
over the past decade in response to market adulteration of foods with allergenic ingredients17.
needs and to new requirements in areas like Broad screening of proteins is also possible
biomarker identification and ‘omics’ investigation. through techniques such as highly multiplex
For example, the measurement of multiple immunoassays and array technology18. Protein
small organic molecules by nuclear magnetic microarrays are used for both analytical and
resonance13 (NMR) or mass spectrometry14 functional applications, such as studies of protein
(MS) has been applied extensively to study interaction, biochemical activity and immune
the so-called metabolome – the range of small response. These analyses mostly involve arrays
molecules that appear in biological samples as of antibodies that bind to specific proteins,
a consequence of, for example, the activities of and are applied primarily in clinical chemistry.
human metabolism. MS combined with liquid However, the low cost and sensitivity of antibody 113
or gas chromatography (which can separate detection methods also lends itself to many other
the chemical components of mixtures) is now applications relating to biological origin (including
a routine tool within analytical laboratories. It authenticity and allergenicity), and the simplicity
is used in a wide range of areas that require of related detection methods could a powerful
analysis for multiple chemical forms, including the way to move from laboratory measurement to
screening of food and environmental samples field-based application (see below) if issues in
for the presence of pesticide and drug residues, specificity and cross-reactivity can be resolved.
studies of drug metabolism, and investigations in Medium-density microarrays have also seen
forensic toxicology. a recent resurgence in molecular biology. They
Advances in chromatography now allow are used to identify multiple genetic variants,
hundreds of chemicals to be screened in a for example, and for the broad screening of
single measurement run, generating information- multiple genes and RNAs. As such, they add
rich datasets that can be stored for future to a molecular biology tool kit that includes
interrogation should knowledge of new threats other measurement techniques including next-
subsequently emerge. With the continued growth generation sequencing (NGS), high-throughput
in MS databases, and the advances being made genotyping and multiplexed real-time PCR.
in data mining and analysis, it is now possible Such techniques are extremely powerful in
to generate ‘fingerprints’ for particular product determining biological origin because they can
types, and to identify the presence of unexpected discriminate closely-related (sub) species, and
or unknown compounds15. These approaches even pin down a sample’s geographic origin if
have already shown promise in studies of food high-quality reference sequence databases are
authenticity and for identifying unknown ‘designer available.
steroids’ in sport doping investigations16, and are Indeed, this requirement for appropriate
expected to gain more widespread usage as the reference databases is a recurring theme.
technology continues to evolve. Reference databases are essential for
Accurate mass MS is now also routinely interpreting variations from a product’s expected
applied in protein (peptide) analysis and in composition, and apply equally to methods that
‘proteomics’. As Government Chemist, we have measure the overall response of a product to an
FORENSIC SCIENCE: BEYOND THE COURT

OUR ABILITY TO EXTRACT AND AMPLIFY DNA IS NOW SUCH THAT,


IN PRINCIPLE, IT IS POSSIBLE TO DETECT SINGLE GENE COPIES,
EVEN AGAINST A HIGH BACKGROUND OF GENETIC MATERIAL.

external input, as well as those that seek specific and count individual molecules. These advances
chemicals or chemical sequences. Approaches offer great potential for diagnostics, for research
that depend on reference databases include: at the cellular level and for identifying potentially
• multi-spectral imaging for determining food harmful contaminants. However, the application
authenticity19 of ultra-sensitive techniques in forensics and
• near infra-red (NIR) and Raman spectroscopy, compliance testing needs to be approached with
which are useful for pharmaceutical counterfeit appropriate interpretative caution.
detection20 due their discriminating power, For example, as the relevance and value of
portability and relatively simple operation (see DNA profiling to forensic investigations has
Chapter 12, case study p138) increased, so too has the desire to generate
• electrical and optical testing, and digital imaging, this information from smaller amounts of DNA.
of electrical components21 When the level of DNA in a sample falls well
• spectroscopic methods for detecting below the recommended threshold it is still
counterfeit clothing22 possible to generate interpretable profiles, but
these need to be evaluated more carefully:
TEASING OUT TRACES contamination raises the risk of misidentification,
114 Advances in measurement science have not and there is a greater likelihood of obtaining
only improved our ability to screen multiple partial profiles and seeing other imperfections in
components – they have also allowed the DNA amplification process that might lead
investigators to detect compounds at increasingly to incorrect interpretation of the data25. These
diminishing levels. Forensic science remains a challenges in DNA apply equally to issues in
catalyst for this trend: it aims to generate DNA authenticity and compliance, such as the presence
data whenever possible; to find traces of chemical of trace levels of species (for example, genetically
warfare agents and their derivatives, which may modified organisms) in processed foods and
inform security activities; and to provide evidence other products.
of criminal activity, such as the handling of drugs. Many synthetic chemicals can now
Our ability to extract and amplify DNA be detected at background levels in the
is now such that, in principle, it is possible to environment. These levels and variations need
detect single gene copies, even against a high to be understood before setting meaningful
background of genetic material. For example, action or compliance limits, as do the current
digital PCR23 (dPCR), an approach first developed limitations of associated measurement capability
in the 1990s, is a technique that is used to (see Chapter 14). As such, regulation and policy
quantify the amount of DNA in a sample by that is based on based on zero tolerance,
counting amplifications from single molecules. such as banned veterinary residues in food
Improvements in MS are leading to selective and drugs in sport, will become increasingly
methods that can detect molecules at less than difficult to enforce without effective guidelines
a picogram (10-12 g) per kilogram of sample. for interpretation. Such guidelines should
Even higher sensitivities are possible using recognise well-developed statistical techniques
immunoassays, in which improved affinities, in hypothesis testing and advances in toxicology
better methods and novel forms of detection such as margin of exposure26 comparative
have enabled signal generation with femtogram risk assessment. We need further exploration
(10-15 g) to attogram (10-18 g) levels of input and dissemination of approaches to establish
material24. Indeed, the combination of sensitive practical yet suitably precautionary approaches
detection with solution partition or imaging has to essentially unanswerable questions such
led to a number of approaches that can detect as “Is it nut free?” or “Is it carcinogen-free?”.
AUTHENTICITY AND PROVENANCE

Can anything ever be claimed as ‘pure’? (see techniques are increasingly being evaluated for
case study on p120). To what extent does use in traceability studies, as is evident from the
the presence of chemicals at ultra-trace levels number of national and international traceability
really indicate contamination or adulteration, projects now in existence (e.g. Labelfish, the
or represent a meaningful risk to consumers? Atlantic Network on Genetic Control of Fish and
These are questions that will need to be Seafood Labelling and Traceability). Approaches
addressed as our measurement tool kit including end-point PCR, real-time PCR, and
continues to advance. Moreover, there is an DNA sequencing can identify and capitalise
unmet need for the development and teaching upon minute differences in the genome of
of end-to-end interpretative skills across geographically-isolated populations of the same
multiple disciplines in areas such as forensic species, and can be used to augment the more
science and food crime. routinely used elemental and isotope-based
Traditional crime scene forensic investigations measurements for point-of-origin studies.
draw together all of the available evidence and
then apply multiple techniques in order to build IN THE FIELD
up a picture of what occurred, and the roles of All of the advanced detection and identification
the specific individuals that were present when technology described so far is normally operated
the offence was committed. There are analogies in controlled laboratory environments, with
here with the more general fight against fraud documented and accredited quality systems that
and counterfeiting, where the article is often incorporate procedures for calibration (by using
distributed with additional components, and appropriate certified reference materials, for
where potential surface contamination can example).
provide useful intelligence. These additional and These laboratory measurements can provide
rich sources of information reside, for example, in reliable data that is quantified to a known level 115
the form of external packaging and blister packs of uncertainty, satisfying the needs of regulators
for pharmaceuticals; labels and logos for designer and our legal system. However, laboratory
goods; and packaging and identification numbers measurement requires samples to be taken
for electronic devices. from the field, transported and administratively
Similar to crime scene forensics, analysing processed prior to analysis. This takes time
products and their associated articles for (typically days) and requires systems to be in
authenticity and compliance often requires place for tracking and ensuring continuity of
multiple measurement techniques, including evidence. Ultimately, though, the data generated
specialist methods that are not routinely is only representative of the sample provided, and
applied in product quality control and assurance hence interpretation is needed to elucidate how
(see Chapter 11). Notable in this respect is the this relates to the entire batch of product under
emergence of isotope ratio measurement27, investigation.
which exploits the subtle geographic differences These limitations mean that there is now
in the ratios of stable isotopes of common significant interest in techniques that can
elements to investigate claims about a product’s be applied in the field to provide real-time
origin. This is potentially the most challenging information, and to assist in product sampling
of all authenticity issues e.g. is this Atlantic or strategies to maximise the likelihood of detecting
Pacific cod? Was this chemical made in factory non-compliant or fraudulent events. A range of
X or factory Y? Was this wine made from technologies are under development for field
grapes produced in region A or B? (see case application, and there are already a number
study on p118).
Although both elemental and isotope-based
measurements provide the basis for much of LABORATORY MEASUREMENT REQUIRES
the information pertaining to the point of origin SAMPLES TO BE TAKEN FROM THE FIELD,
of animals, plants and food products, alternative
rapid and cost effective methodologies are TRANSPORTED AND ADMINISTRATIVELY
also being examined. For example, molecular PROCESSED PRIOR TO ANALYSIS.
biology approaches that focus on DNA-based
FORENSIC SCIENCE: BEYOND THE COURT

CASE STUDY

PROVENANCE OF
NUCLEAR MATERIALS
DANIEL THOMAS, Nuclear Threat Reduction, AWE

Imagine the following scenario, and the a scene, an object, a person or persons, identify
questions it raises: the radioactive material and show where
• Police receive a phone call claiming that a ‘dirty it could have originated. This relies on the
bomb’ has been placed in central London. Is longstanding capabilities of AWE (the Atomic
this real, or a hoax? Is there anything to find? Weapons Establishment) in this area, which have
How to find it? been enhanced in recent years by the Ministry
• Police then find a suspect package. Is this of Defence in order to respond to developing
what they’re looking for? Is it a radiological or needs such as provenance. The Office for
nuclear device? What precautions are needed? Security and Counterterrorism in the
• Investigators confirm that the device contains Home Office also funded the Conventional
nuclear material and explosives. But is it an Forensic Analysis Capability (CFAC) at AWE,
improvised nuclear device (IND)? What could which provides the capability to carry out
116 the consequences be if it is detonated? recovery of fingerprints, DNA, fibres, hairs,
• The device is made safe, and nobody is injured. and digital information from radioactively-
But who was involved in building and planting contaminated items.
the device? How did it happen? Where did the The approach taken at AWE, on behalf of the
material come from? How was the material UK government, has been to ensure that nuclear
removed from normal regulatory control? Is forensics can be carried out in an integrated
this our material? If not, where did it come fashion, by bringing normally disparate technical
from? Could there be other devices, or more disciplines together. Experts from a range
lost material of concern? of disciplines will increasingly need to work
together in order to solve the forensic puzzles
Throughout this scenario it is clear that the presented by perpetrators.
government, the police service and supporting Nuclear materials have been produced
agencies would be faced with a multitude of globally over many decades in facilities that were
urgent issues before investigative and forensic focused on producing material and meeting
questions can be addressed. Nuclear materials the required specifications; personnel were not
that represent the gravest concerns – those tasked with helping to establish provenance
which can be used to build a nuclear device following the loss and subsequent discovery of
– typically have half-lives longer than tens of that material. Consequently, there will probably
thousands of years, giving them an enduring not be a predetermined ‘unique fingerprint’ for
potential for misuse. identifying the provenance of many materials,
But provenance will ultimately become a key nor will historical records necessarily provide
question, asked by the most senior decision- the fidelity of data required for provenance
makers. They will want to know where and assessments that use a data matching approach.
how the material was acquired, and who was The challenges arising from questions
involved. Nuclear forensics has a key role to play of provenance mean that new interpretive
in answering these questions, by using forensic knowledge is being developed, in addition
analysis to assess these radioactive substances as to the analytical capabilities to measure the
well as items contaminated by them. properties of materials. New technical skills such
Nuclear forensics can draw out links between as chemical modelling and statistical analysis will
AUTHENTICITY AND PROVENANCE

of good examples of where these are being


deployed, including the use of transportable
ion-mobility spectrometers (IMS) in airports and
border crossings to detect explosives and drugs.
Recently it has become possible to augment
IMS at these sites using Raman spectroscopy
to screen for the same types of compounds in
packaged materials and solutions28. Raman and
NIR have also been extensively investigated
and used for the detection of pharmaceutical
counterfeits, and hand-held versions of both are
be needed to understand the properties now available for enforcement and surveillance20.
of materials produced long ago in the UK, A range of other portable diagnostic devices is
so that we can assess the future unknowns. emerging, which could transform enforcement
This is particularly important as the people and supply chain monitoring. These include
who worked in these production and sensor systems based on affinity reagents
manufacturing domains retire. (immunoassays) with, for example, optical,
By measuring various properties of the electrochemical or surface acoustic wave
material (isotopic, chemical and physical), detection, and DNA diagnostics with on-
identifying the type of process that may board amplification systems that are capable
have produced it, and knowing whether of providing information in relatively short
UK-produced materials are consistent with timeframes (typically 10-60 minutes). Indeed,
those measured properties, investigators will DNA intelligence tools are already available for
be able to use an exclusion-based approach crime scene investigation29 and for rapid diagnosis 117
that allows them to rule out known sources of disease – further development is likely to
from their investigations. Nuclear forensics and lead to instruments that can be deployed for
provenance is an evolving discipline, and it has bio-security applications, and for food safety and
great intellectual and technical opportunities authenticity screening.
for scientists to apply themselves to matters of However, even with the support of portable
national security concern. measurement instruments, detection tools will
not be sufficient on their own to eliminate or
identify all forms of fraud. Fraudsters will adjust
their tactics, evading different forms of detection
by exploiting weaknesses in measurement
methods. This was most notably illustrated
in China, when melamine was added to milk
that had been watered down. The nitrogen-
containing melamine was intended to fool
the methods for determining milk content,
which were based on the analysis of nitrogen
as a quantitative measure of related proteins.
Conversely, some organisations specifically add
markers to their products to aid detection:
drinks manufacturers may add combinations
of chemicals (and macromolecules like DNA)
to readily differentiate their products from
counterfeit versions; and many companies
add physical features such as watermarks or
holograms as an anti-counterfeiting measure.
Designing anti-counterfeit or safety and
compliance measures into products, packaging
and processes offers optimal protection to
FORENSIC SCIENCE: BEYOND THE COURT

CASE STUDY

FORENSIC GEOSCIENCE
LORNA DAWSON, Head of the Soil Forensic Group, James Hutton Institute; and RUTH MORGAN, Director of the

F
UCL Centre for the Forensic Sciences

orensic geoscience is an increasingly im- development and availability of relevant databases,


portant discipline that studies soils, min- allow forensic geoscientists to help police to search
erals, dusts, plants and rock fragments for unknown objects or people, prioritise areas
to help determine their provenance (i.e. for investigation or search, and provide robust and
a chronology of their ownership, custody or loca- reliable evidence in court.
tion). These materials have been used as forensic Advances in forensic geoscience have also
trace evidence for many years and are often highly underscored the importance of developing the
distinctive from one region to another. empirical evidence base that we need to interpret
Such traces are extremely useful in a forensic and assign the significance and importance of
context, because of their environmental specificity; these materials in specific scenarios. Without
their high levels of transferability; their ability to these established evidence bases, it would not
persist on items such as clothing, footwear, tools be possible to offer such reliable evidence for
and vehicles; and their high levels of preservation presentation in court.
after long periods of time, even after activities The full potential of forensic geoscience has
118 such as burning and washing. This resilience makes only truly begun to be recognised in the past
geoforensic trace materials – frequently present decade. Since many criminals now show a high
at crime scenes, and in forensic exhibits – highly level of forensic awareness in relation to evidence
valuable forms of intelligence and evidence that such as fingerprints, blood and other body fluids
can aid crime investigations and reconstructions. – along with an ability to fake products with
There have been significant advances in forensic precision – police and security agents
forensic geoscience over the past decade, both are encouraging the use of geoforensic evidence
in the development of analytical approaches and applications. To date, forensic geoscience has
also in understanding of the behaviour, transfer, mainly been used in the context of high-impact
persistence and preservation of sediments, soils crimes such as murder, rape, aggravated burglary
and plant material. Evidence samples can now and terrorism investigations, where resources allow
be analysed by a wide range of complementary it. However, techniques are increasingly becoming
methods that address their physical, chemical and cheaper and faster, and have the potential, once
biological components with greater precision, fully tested, to become regularly used forensic
speed and accuracy than ever before. This allows tools.
samples of less than 10 milligrams to be accurately Forensic geoscience is also being applied in
characterised, and mobile platforms are increasingly a wider range of investigations, including wildlife
enabling real-time decisions that aid investigations. crime, fraud identification, food adulteration,
These developments have enabled geoscience kidnapping, trafficking and smuggling. Using state-
techniques to be applied in a greater range of-the-art techniques in chemistry, biology, and
of cases, and in helping to review ‘cold cases’. microscopy, it is possible to identify if particular
Improved analytical capabilities, coupled with the foods have come from a claimed location. For

THESE DEVELOPMENTS HAVE ENABLED GEOSCIENCE TECHNIQUES TO


BE APPLIED IN A GREATER RANGE OF CASES, AND IN HELPING TO
REVIEW ‘COLD CASES’ .
AUTHENTICITY AND PROVENANCE

THE GLOBAL ILLICIT ECONOMY


HAS ALREADY INFILTRATED AND
CORRUPTED LEGAL MARKETS, REDUCED
CONSUMER CONFIDENCE, IMPACTED
TRADERS, PROVIDED A DISINCENTIVE
TO INVESTMENTS IN R&D, AND
example, elemental composition can indicate RAISED PUBLIC HEALTH RISKS.
the type of soil in which garlic cloves were
grown; isotope and trace chemical values
can indicate in which distillery a whisky was
produced; isotopes and elemental profiles show traders and the public (see Chapter 9). Other
where cheeses, oils or soft fruit were produced; related measures include the ability to follow
organic compound analysis can determine production process, and to track the movements
cultivar level identification; strontium isotopes and associated environmental exposures of
can discriminate between zones where beef ingredients, components and finished products
has been produced; and grain shape and from source to retail. This approach is already
texture can identify the beach where drugs being used in a number of areas: ear-tagging
were imported from. individual cattle allows meat to be traced up
Forensic geoscience can also help the food chain; quality-by-design and process
investigators to reconstruct journey histories, monitoring tools support good manufacturing
often a critical issue when reconstructing practice (GMP); radio-frequency identification 119
crime scenes and establishing pertinent time technology (RFID) tracks product movements;
lines. Current research is demonstrating and continuous temperature monitoring ensures
that sediments can be transferred to the the integrity of cold supply chains (see case
components of improvised explosive devices studies on p112 and p116 for further examples
(IEDs) or high-value goods, which can indicate about nuclear materials).
where they were manufactured. This type of
intelligence can indicate locations of interest in CONCLUSION
terrorism and illegal trafficking investigations, The global illicit economy is growing rapidly,
or reveal important social networks integral to due to a wide spectrum of activities that include
terrorist activities. The sediments on footwear counterfeiting goods. It has already infiltrated
and vehicles can indicate where a crime may and corrupted legal markets, reduced consumer
have taken place, and may provide evidence of a confidence, impacted traders, provided a
person being at a particular place of interest. disincentive to investments in R&D, and raised
With the developments in analytical public health risks.
technology, and an increasing understanding This threat is preventing fair markets
of how soils and sediments move within from reaching their potential and endangering
natural and anthropogenic environments, our health and safety. Technology – including
forensic geoscience has more power to answer advances in measurement science – must
questions such as: “Where did the trace material continue to evolve to meet this challenge.
come from?” or “Where has this item been?”.
Understanding the context of a specific case is
crucial in helping to answer such questions. In
addition, being able to explain the significance
of the evidence that has been analysed, and
demonstrating logically and transparently how a
conclusion has been reached, remains important
for forensic geoscience specifically and trace
evidence generally.
FORENSIC SCIENCE: BEYOND THE COURT

CASE STUDY

NOTIONS OF PURITY:
AN ANTHROPOLOGICAL PERSPECTIVE

P
FRANCESCA BRAY, Social Anthropology, University of Edinburgh

urity and pollution were initially understanding that pigs’ meat carries parasites
treated in anthropology as exclusively dangerous to human health. This common-
religious concepts1–3, and they remain sense interpretation, popular among cultural
a central concern in the anthropolo- ecologists through the 1950s and 1960s and
gy of religion today. Though variously defined in most vividly formulated by the cultural materialist
different religions, purity is everywhere a spiritual Marvin Harris, today attracts little anthropological
precondition for communicating with the gods but much popular interest13, 14. “Comparative
through prayer or ritual. religion has always been bedevilled by medical
Purity can be defiled by inappropriate emotions materialism,” Mary Douglas remarks tartly15.
or thoughts, acts or contacts, by sickness and The second school of thought about purity
by passages through the life cycle, notably birth, and pollution originated in 19th and early 20th
menstruation and death. Some categories century studies by Robertson Smith, Émile
of people, things or acts are inherently and Durkheim and others who argued that religions
120 irrevocably tainted: a Hindu untouchable cannot are neither divinely inspired nor materially rooted.
become touchable however pious his behaviour; Rather, they are an expression of collective values.
in ancient Greece or imperial China there was Sacred and secular must therefore be analysed
no redemption for the parricide. Much pollution, not as separate domains but as interdependent
however, is transitory and an affected individual can elements of a single moral-symbolic system.
achieve or regain purity through rituals, discipline, It was the structuralist anthropologists of the
pilgrimage, fasting or simply the passage of time. 1960s who breathed new life and vigour into
For example, Christianity requires the ‘churching’ this approach. The landmark study was ‘Purity
of a woman who has given birth; in Chinese and Danger’ by Mary Douglas. A focus on purity
Buddhism the taint of a family death dissipates and pollution, Douglas showed, can illuminate the
gradually, aided by a sequence of sacrifices for the deepest workings of any society, including our
soul of the departed and their transformation into own. While the categories of purity and pollution
an ancestral spirit. Typical prohibitions for saints may be most evident in the religious and ritual
and priests, and for the laity before conducting domain, they reflect deeper structures of symbolic
major rituals or undergoing rites of passage, thought manifested in secular values and everyday
include bans on sexual intercourse, eating meat or practices, from the preparation of meals to
expressing anger.Views on alcohol differ between definitions of nationality10, 16.
religions: in some it is permanently forbidden to Dirt is matter out of place, Douglas famously
all the faithful, in others one should abstain before remarked, and its threat to purity must therefore
praying, some require officiants to share blessed be approached through order: “Uncleanness or
wine with their congregation, while some require dirt is that which must not be included if a pattern
anyone offering a sacrifice to be roaring drunk4–12. is to be maintained,” she wrote17. Danger lies
How do we explain similarities and differences not in the existence of the unclean per se, but in
in how purity and pollution are construed? the transgression of boundaries, the mingling of
Anthropologists have taken two distinctive categories, the contamination of pure by
approaches. One pragmatic, materialist school impure4, 12. Douglas’s important insight has inspired
has sought to explain ‘native’ rules about purity as a succession of groundbreaking anthropological
proto-scientific systems of hygiene, for instance studies of the imperatives of purity in such diverse
interpreting the Judaic taboo on pork as a latent fields as racial science, nationalism, victims of
AUTHENTICITY AND PROVENANCE

EVEN IN THE STRICTLY MATERIAL SENSE, PURITY IS NOT A STATE OF


NATURE, NOR IS IT UNCONDITIONALLY DESIRABLE.

atomic disasters, etiologies of AIDS, and views of research, seek effective catalysts for the reactions
genetic engineering18–23. they want to produce, design instruments, carefully
The underlying assumption here is that purity select and breed experimental animals to fit the
is the desired state which any taint impairs. But experiments, pre-select the ecological niches or
this attitude is more culture-bound than we soil cores with which they investigate ‘nature’27–29.
realise. The development of modern science is a In the process, definition and distinction become
history of purification. In order to extract better increasingly complex and challenging. Is a pest-
knowledge, chemists, engineers and physicists have resistant GM eggplant more or less pure, natural
quarried the messy material stuff that surrounds and organic than a non-GM eggplant treated
us; isolated and purified it in order to classify it and with pesticides? From atmospheric levels of sulfur
study its properties. Nature is then rendered into dioxide to the meat content of a proper sausage,
its very purest form – abstract thought: theories scientists, regulators, legislators, corporations,
or laws of universal validity, expressed in terse, farmers, shopkeepers, activists and consumers 121
uncontextualised verbal or numerical form24. wrangle continually over definitions and degrees of
As Bruno Latour observes, a defining premise safe, acceptable or simply workable purity, impurity
of modern sciences, both natural and social, or contamination30–32.
and indeed of our modern life generally, is that Even in the strictly material sense, then, purity
objectivity is considered both possible and is not a state of nature, nor is it unconditionally
necessary. We have supposedly escaped the desirable. While regimes of purification bring
primitive entanglement of mind, soul and body, of greater control, more predictability and increased
moral and material. Instead we bring an effective efficiency, they also contain the threat of inbreeding,
approach to the world and its problems that sterility and vulnerability. Purity and hybridity
categorically separates the social and the natural, become inextricably entangled33. Pure lines of
the human and the artefact, the mind and the wheat cannot rival hybrids for yields. They are
objectively observable fact – a universal science painstakingly bred not to grow in their own right
beyond politics or creed25. but to cross breed into high-yield hybrids. Hybrids,
But in reality such purification is impossible, however, do not breed true and must be replaced
as Latour and his fellow researchers in science yearly. In the case of wheat, pure lines must be
and technology studies have shown. Science maintained to reproduce the essential hybrids.
depends on funding and politics. Politics and power One could argue that in the case of human
permeate every human act. Researchers are societies, a similar if not identical dialectic between
cultural, political and often religious beings: nuclear purity and hybridisation, analogous processes
scientists conduct rituals and rites of passage of hybridisation, miscegenation and tincture, are
as part of their research; particle physicists and essential for long-term health and survival. And yet,
molecular biologists evaluate the quality of evidence as anthropological studies of assisted reproductive
in quite distinctive ways26. Environments are co- technologies or of immigration vividly illustrate,
produced by the collectivity of their denizens, they are widely viewed with misgiving, resentment
and humans more than any other life form have or fear16, 19, 34, 35. The anthropology of purity
remade ‘nature’ in their own image throughout reminds us that culture, politics and morality are
their existence. Scientists do not discover nature intrinsic to any scientific or legislative attempt to
in the raw; they define the categories they will classify or to purify.
FORENSIC SCIENCE: BEYOND THE COURT

CHAPTER 11

FOOD AND DRINK


VLADIMÍR ŠUCHA, Food adulteration is as old as trade itself, but it has grown into a global criminal enterprise
ELKE ANKLAM AND that costs billions of pounds in lost revenue every year, and may also put consumers at risk
FRANZ ULBERTH, of harm. Authorities and policymakers must have access to up-to-date knowledge about
Joint Research Centre, fraud detection and prevention technologies to safeguard the integrity of the food chain.

T
European Commission

he adulteration of foods has a year1. Preventing fraud in the agri-food chain,


history dating back to ancient and promoting authentic products, are key
times. Cato gave one of the goals to assure the commercial success of
earliest accounts of adulteration of European high-value agri-food products on
foodstuffs in his treatise ‘On Agriculture’ (around international markets. Marketing standards and
160 BC) when he reported on the adulteration EU quality schemes aim to ensure that consumer
of wine. Likewise, Roman legislation was aware expectations are met, and enable the functioning
that olive oil can be a target of fraudulent co- of the internal market and global trade in
mingling. Food adulteration practices are as old as agricultural products. Losing reputation in this
trade, and strict punishment of fraudsters, when area will negatively impact on competitiveness
detected, was announced and implemented. and profitability of the agri-food sector in the EU.
One of the earliest known modern accounts
on food fraud was given by Frederick Accum, CHALLENGES IN FOOD AND DRINK
122 who published ‘A Treatise on Adulterations AUTHENTICITY CONTROL
of Food and Culinary Poisons’ in 1820. He The driving force behind food adulteration is
described common malpractices such as to maximise revenues by either using a cheap
adding chalk to flour, and sawdust to bread, as ingredient to (partially) substitute a more
well as recycling spent tea leaves and coffee expensive one; or to (partially) remove the
grounds. Intentional food adulteration increased higher-valued component in the hope that the
considerably during the Industrial Revolution altered product passes undetected by the final
following the separation of the direct link user or consumer. For example, fraudulently
between farmers/food producers and town watering down milk or skimming off cream have
dwellers. Unfortunately, some of the known both been practised for a long time.
malpractices raised concern for food safety. Certain production methods, notably for
Examples include the introduction of chemical organic foods or those where animal welfare
hazards through adding, for instance, strychnine practices are promoted (e.g. free-range
to beer to save on the more expensive bitter products), have gained a significant market share
hops; colouring candies and preserves with in developed countries. The popularity of these
toxic metal salts; or diluting vegetable oils with production methods arises from widely-held
industrial oils. beliefs about their superior nutritional qualities
Fraudulent malpractice creates unfair resulting from their ‘naturalness’, which should be
competition, leading to market distortions, preserved to a higher degree.
which in turn may impact the local or even Similarly, the marketing of agricultural
the international economy. Today, economic products has been focused recently on the
adulteration and counterfeiting of global food promotion of premium goods in Western
and consumer products is expected to cost countries. Such products command a premium
the industry $10 billion to $15 billion per because they were produced within a well-

FOOD CONTROL AUTHORITIES NEED TO CONTINUALLY ADAPT EXISTING


TECHNIQUES AND DEVELOP NEW METHODOLOGIES TO DETECT FRAUD
FOOD AND DRINK

defined geographical location, and/or applying FRAUDULENT MALPRACTICE


only traditional methods of production, and/
or using only certain ingredients (see case CREATES UNFAIR COMPETITION
study p125). Similar considerations apply to WHICH MAY IMPACT THE LOCAL OR
other speciality products, such as foodstuffs
that respect fair-trade principles or religious INTERNATIONAL ECONOMY. TODAY,
beliefs (e.g. halal or kosher) or care for the ECONOMIC ADULTERATION AND
environment (e.g. food miles). To capitalise on
market demands and improve profits, goods of
COUNTERFEITING OF GLOBAL FOOD
lower economic value may be co-mingled into AND CONSUMER PRODUCTS IS
higher priced commodities. This harms honest
producers who suffer from unfair competition,
EXPECTED TO COST THE INDUSTRY
and consumers whose fundamental rights are $10 BILLION TO $15 BILLION PER YEAR.
violated by fraud.
Extension of a product with a cheap ingredient,
or counterfeiting of a branded product, does not
usually carry a health hazard for consumers. But 1 Identification of a marker (or markers) that
there are notable exceptions. In 1981, the Toxic allow discrimination between the genuine
Oil Syndrome in Spain affected nearly 20,000 and the adulterated state of a food or food
consumers who ate rapeseed oil denatured with ingredient. Detection can be rather simple
aniline that was refined and sold to consumers if the commodity used for extending the
as olive oil2. In 2008, the Chinese milk scandal authentic product introduces a substance
sickened more than 50,000 children after they (marker) that is not naturally present in the
consumed milk tainted with melamine3; and in original. For example, the addition of vegetable 123
2012, 38 people died in the Czech Republic oils or fats to butter can be easily detected
following the consumption of spirits in which part by tracing phytosterols, which do not occur
of the ethanol was replaced by methanol4. in measurable amounts in genuine butter fat.
The need to detect the intentional addition In most cases, however, such fundamental
of hazardous chemicals gave a great impetus to differences do not exist, and scientists
the development of analytical chemistry applied need to rely on empirical differences in the
to food, and the establishment of food chemistry composition of constituents of the genuine
as a scientific discipline enabled society to and the adulterated product. Quite often,
adopt appropriate countermeasures to pursue advanced statistical techniques are necessary
fraud. But unscrupulous purveyors of fraud also to turn analytical data into information for
benefited from this development, because the decision-making.
availability of compositional data enabled them
to fine-tune their illicit manipulations in order 2 Access to authentic samples to establish the
to evade legal action. In general, fraudsters markers and develop diagnostic tests. Physical
tend to be quite innovative and well informed access to samples can sometimes represent a
about weak points in food inspection systems. bottleneck, particularly when the food has been
Therefore, food control authorities need to grown or produced overseas. Repositories of
continually adapt existing techniques, and authentic samples are difficult to maintain, so
develop new methodologies, to detect fraud and characteristic features (e.g. compositional data,
protect the fundamental rights of consumers. spectra, molecular markers, etc) are stored in
Food fraud can have various levels of electronic format. Creating and curating such
complexity, from diluting milk with water to databanks is a resource-intensive process, and
a very complex practice of adding gently- access in certain cases is only possible on a
deodorised olive oil to extra virgin olive oil. subscription or fee-for-service basis, which
Correspondingly, methods for detecting fraud could limit their public use. The EU wine
range from simple to highly sophisticated databank, established already in the 1990s in
approaches. In principle, the food forensic accordance with Regulation (EU) 1306/2013
scientist faces three problems5: (ref. 6) and. operated by the European
FORENSIC SCIENCE: BEYOND THE COURT

THE FIGHT AGAINST FOOD FRAUD CALLS FOR AN INTERNATIONAL


APPROACH INVOLVING COOPERATION AND CONSULTATION
AMONG ALL STAKEHOLDERS, AT ALL LEVELS OF THE FOOD
CHAIN. INVESTIGATIONS CARRIED OUT BY EUROPOL SUGGEST
THAT ORGANISED CRIME SYNDICATES ARE INCREASINGLY
RESPONSIBLE FOR CASES OF FOOD FRAUD AND ADULTERATION.

Commission’s Joint Research Centre (JRC), is Standards Agency8, for example, food fraud is
one of the few examples where compositional committed when food is deliberately placed on
data of a premier agricultural product are the market, for financial gain, with the intention
systematically collected. The databank contains of deceiving the consumer.
the isotopic composition of wines, which are Certain diagnostic tests, in particular those
made available to the competent authorities in based on DNA analysis, are highly sensitive
the Member States when disputes regarding and can indicate the presence of exogenous
watering or sugaring of wine arise. DNA as a result of contamination due to
cross-contact with other foodstuffs. To decide
3 Creating reliable forensic evidence and whether the presence of a foreign substance
confidence in the data that will stand up is due to accidental contamination or intended
to scrutiny in the judicial system. Cases co-mingling requires an assessment of the
124 where only one marker forms the basis for amount of the substance present, which is not
discriminating the genuine and the adulterated straightforward to derive from the quantity of
product are relatively straightforward to foreign DNA. This kind of uncertainty needs to
handle, taking into consideration the empirical be taken account of when weighing the forensic
distribution of the marker, as well as the evidence in a court of law.
uncertainty in the measurement of the The horsemeat adulteration scandal showed
marker. But things get more complicated that one of the weaknesses of the current
when complex statistical models using many system of enforcement along the food chain
input variables (e.g. those generated by was that Member States’ competent authorities
spectroscopy) have to be used for decision- found it difficult to communicate efficiently with
making. The judicial system does not their counterparts in other Member States —
always accept evidence generated by such which is essential in cases where violations have
approaches. cross-border impact.
The Commission decided therefore to
In the EU, Article 8 of the EU General Food activate a dedicated network of administrative
Law7 stipulates that the interests of consumers assistance liaison bodies that would handle
shall be protected by preventing fraudulent or specific requests for cross-border cooperation
deceptive practices misleading the consumer. in cases of ‘food fraud’. The dedicated liaison
In addition, national laws in EU Member States bodies are referred to as Food Fraud Contact
provide various definitions for the violation Points (FFCP). They act, as do all administrative
of statutory agri-food chain requirements. assistance liaison bodies, within the legal
They are qualified by the intention to deceive, framework provided in Title IV of Regulation
and the motive of financial or economic gain, (EC) No 882/2004. The group of FFCPs is
though constitutive elements vary from one collectively referred to as the Food Fraud
national system to the other. In a number of Network (FFN)9.
Member States, those facts may be relevant On 14 January 2014, the European
for the application of criminal penalties and Parliament published a resolution on the
of procedural rules on criminal prosecution. control of fraud in the food chain10, calling
According to a statement by the UK Food on the European Commission to take all
FOOD AND DRINK

CASE STUDY

SCOTCH WHISKY: AUTHENTICITY,


PROVENANCE AND ASSURANCE

S
JULIE HESKETH-LAIRD, Deputy Chief Executive of the Scotch Whisky Association

cotch Whisky is a prestigious spirit drink Brand owners may build up unique and
with a global reputation. Sold in around confidential authenticity indictors underpinning
200 markets worldwide, Scotch Whisky the analytical fingerprints of their brands. Fast and
exports are worth around £4 billion reliable field tests have even been developed for
each year. use in market.
The Scotch Whisky Association (SWA) works to Our strategy for generic analysis has involved
sustain Scotch Whisky’s place as the world’s leading developing an analytical fingerprint for Scotch
high-quality spirit drink and secure its long-term Whiskies as a whole. This fingerprint can then
growth in the market. be used to show how Scotch Whisky is distinct
Scotch Whisky is protected as a ‘geographical from whiskies of other origins, other distilled spirits
indication’ (GI) to safeguard the industry’s intellectual or cheaper neutral alcohol, each of which may
property and underpin our cultural heritage and contribute to the composition of products falsely
employment. We want consumers to be assured claiming authenticity. 125
that they are getting the best product, traditionally For example, Scotch Whisky must be matured
produced to strict standards. Scotch Whisky’s in oak barrels for at least three years. Maturation
reputation has taken years to build and we are changes the chemical composition of the spirit,
committed to maintaining and building on that. with the lignin in the wood broken down into
That is why a major part of the SWA’s work compounds that can be identified by analysis.
is to safeguard Scotch Whisky against fraud. At Chemical analysis can therefore indicate whether
any one time our legal team has about 70 actions the maturation compounds are consistent with
in courts around the world, and many more aging in oak for at least three years, and identify
investigations under way. Crucial in the fight against flavourings that have been added to mimic the
fakes is the need to determine whether the effects of maturation.
suspected product is consistent with Scotch Whisky. The SWA instructs an independent laboratory
Investigations require forensic support in the set up by the Scotch Whisky industry, the Scotch
form of authenticity analysis of the liquid. As well Whisky Research Institute (SWRI), to analyse
as determining spirit strength and the presence products described as ‘Scotch Whisky’, but
of additives — which are not permitted in Scotch suspected to be fake. We are one of several
Whisky — sophisticated techniques are employed customers of the SWRI, which also assists
to check authenticity. enforcement authorities in the UK and abroad. The
The raw materials and production processes SWRI has access not only to published research
used to produce Scotch Whisky result in a spirit on the analysis of Scotch Whisky, but also has its
with certain chemical characteristics that can be own extensive database on the analysis of Scotch
checked by analysis. This is because the production Whiskies collected over many years. Every year
of genuine Scotch Whisky leads to the presence around 160 suspect ‘whisky’ samples sourced by
of certain components in the finished product. the SWA are tested by SWRI, which also provides
Many of these components will contribute to the expert evidence in legal proceedings in respect of
colour, aroma and taste of scotch. The relative and many of the samples tested.
absolute concentrations of particular components Robust protection of Scotch Whisky requires
allow conclusions to be drawn on how the product robust science, and the Scotch Whisky industry
has been made. has both.
FORENSIC SCIENCE: BEYOND THE COURT

necessary steps to make combating food came to similar conclusions12. In response to


fraud an integral part of EU policy. It also the horsemeat scandal, the UK government
encouraged the commission to consider commissioned Chris Elliott of Queen’s
developing an EU reference laboratory University Belfast to review the integrity
for food authenticity, and called for the and assurance of food supply networks. His
establishment of an anti-food fraud network report identified several systemic gaps and
as a means of improving coordination among suggestions for addressing them, including the
the competent European bodies (Europol, need for unannounced audits of food business
Eurojust), in order to prevent and detect food operators; intelligence gathering; strengthening
fraud more efficiently. The associated report11 the Public Analyst system; and setting up a
identified the top 10 food products that are food crime unit and crime prevention activities
most at risk of food fraud (see Table 1); a within the UK Food Standards Agency13 (see
US Congressional Research Service report case study p129).

Table 1: Top 10 food products that are most at risk of food fraud

COMMODITY FRAUD CASES

OLIVE OIL Extension with other vegetable oils, notably hazelnut oil
Misdescription of geographical origin and olive variety
Misdescription of olive oil quality (refined oil sold as extra virgin oil)

126 FISH Substitution of high-value fish, particularly filets, by cheaper varieties


Substitution of ‘wild-caught’ fish by farmed fish
Misdescription of geographical origin (particularly for salmon)
Misbranding of ordinary catch as coming from sustainably managed stocks

ORGANIC Misdescription of production method


FOOD

MILK Addition of water and salts


Substitution of milk from other species (ovine, caprine, ewes, human) by cow’s milk
Substitution of milk protein or fat by non-milk ingredients (plant proteins, animal and vegetable fats)
Addition of nitrogen-rich substances (e.g. melamine, urea) to increase apparent protein content
Misdescription of milk reconstituted from milk powder as fresh milk

GRAIN Misdescription of soft wheat as hard wheat (durum wheat)


Misdescription of long grain rice as Basmati rice

HONEY Extension of honey by sugar syrups obtained from sugar cane, sugar beet, maize, wheat, rice, agave, maple
Misdescription of geographical origin and botanical variety

COFFEE Misdescription of geographical origin and variety (Coffea robusta, Coffea arabica)
Extension with roasted cereals, chicory, figs, caramel, malt

TEA Misdescription of geographical origin and variety


Extension with twigs and leaves from other plants, coloured sawdust, used tea leaves

SPICES Addition of synthetic dyes (e.g. Sudan red)


Extension with extraneous substances

WINE Addition of water and sugaring of must (chaptalisation)


Misdescription of geographical origin, grape variety and vintage year
Addition of chemicals (e.g. diethylenglycol)

FRUIT Addition of water, sugars or pulp wash


JUICES Extension of authentic juice with cheaper alternatives
FOOD AND DRINK

Table 2: Fingerprinting techniques used in food forensics, grouped by type and/or analysis target

ELECTROPHORETIC DNA ANALYSIS SPECTROSCOPIC CHROMATOGRAPHIC


(PROTEINS)

Protein electrophoresis Restriction fragment length UV/Visible Thin-layer (TLC)


polymorphism (RFLP)
Isoelectric focusing Fluorescence Gas-liquid (GLC)
Random amplified
Two-dimensional polymorphic DNA (RAPD) (Fourier-transform) infrared High-performance liquid
electrophoresis (HPLC)
Amplified fragment length Raman
polymorphism (AFLP)
Mass (MS)
Simple sequence repeats
Nuclear magnetic resonance
(SSR)
(NMR)
Single-nucleotide
polymorphism (SNP

FORENSIC TECHNIQUES Analysts will use a targeted technique if


The fight against food fraud calls for an they know what kind of adulterant has been
international approach involving cooperation and used (e.g. a DNA-based assay for detecting
consultation among all stakeholders, at all levels horsemeat, or a chromatographic method for 127
of the food chain. Investigations carried out by detecting melamine added to a dairy product);
Europol suggest that organised crime syndicates or they will resort to an untargeted technique if
are increasingly responsible for cases of food no prior information exists. In the former case,
fraud and adulteration. analysts will only detect what they are looking
Consequently, the detection and prevention for (‘known knowns’), whereas the latter tries
of food fraud requires strategic planning and to address the ‘unknown unknowns’. Since
investment at the national and European level many different adulterants can be used, the
with a proportionate and sustainable budget. effectiveness of targeted testing for detecting
It also requires access by the enforcement food fraud is limited; methods that assess the
authorities to state-of-the-art analytical tools, ‘integrity’ of the food are, therefore, becoming
which enable them to detect (and provide popular.
judicial evidence of) fraudulent practices. Analytical approaches used in food forensics
Modern measurement science offers a wealth are based on separation science; spectroscopy;
of technologies that can be used to detect molecular biology; and analysis of stable isotopes
fraud in the food chain. Traditionally, chemical of light elements. The first approach tries to
composition analysis has played a dominant unravel the composition of mostly small organic
role, particularly where marketing standards for molecules (metabolites) of a particular food or
certain commodities (e.g. edible oils, honey, etc) food ingredient to create a detailed, quantitative
exist. Where the test results of a suspect product profile, or a qualitative fingerprint that is
do not conform to the standard, fraudulent characteristic of the authentic product. Several
manipulations may be the obvious reason. Simple forms of spectroscopy (UV/Visible, fluorescence,
physicochemical methods, such us freezing- Fourier-transform infrared, Raman, or nuclear
point depression (e.g. for detecting the watering magnetic resonance) create fingerprints without
of milk), electrical conductivity and refractive prior separation of individual components and
index (e.g. for honey authenticity) are suitable are consequently viewed as ‘holistic’ methods,
to detect gross violation. But more refined which use the whole information content of the
techniques need to be applied to identify more created spectra.
sophisticated cases of adulteration. Methods based on DNA analysis are
FORENSIC SCIENCE: BEYOND THE COURT

EU QUALITY POLICY HAS CREATED more widely applied statistical techniques are
principal component analysis (PCA), linear
QUALITY SCHEMES THAT GRANT discriminant analysis (LDA), soft independent
PROTECTED DESIGNATION OF ORIGIN modelling of class analogy (SIMCA), partial
least squares discriminant analysis (PLS-DA),
LABELS TO AGRICULTURAL PRODUCTS and artificial neural networks. Some of the
AND FOODSTUFFS, WHICH ARE statistical routines even allow quantification
of added substances. Chemometrics, which is
PRODUCED, PROCESSED AND PREPARED the use of advanced statistics for the analysis
IN A GIVEN GEOGRAPHICAL AREA of chemical and biological data, has been
developed, refined and applied with success in
USING RECOGNISED KNOW-HOW. academic research related to food forensics.
However, the criminal courts have been slow
to accept its utility for evaluating and weighing
evidence, despite the existence of solid
invaluable for the discrimination of food- knowledge in the field of forensic statistics16.
producing animal and plant species. The power An important quality characteristic of
inherent in DNA analysis has enabled law certain food products or ingredients is
enforcement in difficult cases where certain their geographical origin. EU quality policy
varieties of a given species command different has created quality schemes that grant
prices, or are used for distinguishing quality Protected Designation of Origin labels to
levels. DNA-based assays have been used agricultural products and foodstuffs, which are
to discriminate, for example, Arabica from produced, processed and prepared in a given
128 Robusta coffee beans, mandarin from orange geographical area using recognised know-how.
juice, several meat species, Basmati rice from Verifying that claim is a delicate task, requiring
other long-grain rice, grape varieties used in isotopic ratio mass spectrometry (IRMS)
wine making, and olive cultivars for olive oil analysis of the stable isotopes of light elements
production14. Real-time quantitative polymerase (hydrogen/deuterium, carbon, nitrogen, oxygen,
chain reaction (PCR) based tests are even sulphur), which are related to the region where
able to estimate the amount of the adulterant the products were grown (see Chapter 10
added (e.g. the amount of horsemeat in beef case study p118). Specifically, stable isotope
burgers). The PCR products (amplicons) ratios of hydrogen (H) and oxygen (O) in
can further be manipulated and separated produce relate to the environmental water of
by electrophoresis to generate specific the growing region. Isotope effects fractionate
fingerprints, which are of diagnostic value. H and O isotopes through evaporation,
Table 2 gives an overview of fingerprinting condensation and precipitation as they move
techniques used in food forensics15. through the hydrological cycle. These effects
Combinations of techniques exist: the are well understood and have led to the
most widely used combines GLC or HPLC production of isotope landscapes (isoscapes),
with mass spectrometry (MS). In using these allowing investigators to predict the isotopic
techniques, an enormous number of ‘features’ composition of food grown in a particular
(fragments of molecules, which are eluted from region. This gives the forensic scientist a
the chromatographic system at a characteristic powerful tool to check whether a geographical
time) are generated per analysis. Similarly, origin claim is correct.
spectroscopic techniques (where the whole Stable isotope ratios of carbon determined
spectrum is considered) also generate massive by IRMS can discriminate between plants
amounts of data. Only the combination of that use C4 carbon fixation rather than the
data processing by advanced mathematical C3 photosynthetic pathway. This plays an
algorithms and subsequent multivariate important role in determining whether sugar
statistics allows the recognition of patterns or sugar syrups produced by a C4 plant
that are useful for discriminating between (maize and sugar cane) has been added to,
genuine and adulterated products. Among the for example, wine must or fruit juice, without
FOOD AND DRINK

CASE STUDY

STOPPING FOOD FRAUD

I
SUE DAVIES, Chief Policy Adviser, Which?

n 2013, the discovery of widespread adul- KEEPING ONE STEP AHEAD OF


teration of beef products with horsemeat
outraged consumers and brought food fraud FRAUDSTERS ACROSS COMPLEX GLOBAL
into the spotlight. It prompted a govern- SUPPLY CHAINS IS A CHALLENGE.
ment-commissioned review of the integrity of food
supply chains by Professor Chris Elliott of Queen’s TACKLING IT DEMANDS EFFECTIVE
University Belfast. His recommendations1 for a INTELLIGENCE GATHERING, ECONOMIC
‘consumer first, zero tolerance’ approach were
accepted and led to a number of changes, including ANALYSIS AND REGULAR AUDITING AND
the creation of a new National Food Crime Unit TESTING BY FOOD COMPANIES AND
within the Food Standards Agency (FSA).
Estimating the true scale of food fraud is one PUBLIC AUTHORITIES.
of the first tasks of the new unit. It is already
clear that substituting cheaper ingredients can be
lucrative. In some cases it can also lead to safety
concerns, as seen with potentially carcinogenic found that 9 of 76 samples were adulterated, 129
Sudan I dyes added to chilli powder and, more and 6 of these were more than 50% sheep’s
recently, the substitution of ground almonds with cheese. Further work with Professor Elliott in
peanuts has caused allergy risk. Fraud also causes August 2015 found that 25% of 74 dried oregano
wider consumer harm: causing them to pay for samples analysed containing cheaper leaves such
something of poorer quality than they expected, as olive and myrtle. While the analysis for meat
and also potentially leading to inadvertent substitution was relatively routine, Elliott’s team
consumption of ingredients that people avoid for developed an innovative approach using both
religious or other cultural reasons. Fourier-transform infrared spectroscopy (FTIR)
Keeping one step ahead of fraudsters across and liquid chromatography high-resolution mass
complex global supply chains is a challenge. spectrometry (LC-HRMS) to screen and confirm
Tackling it demands effective intelligence gathering, oregano adulteration.
economic analysis and regular auditing and Stopping food fraud has to remain a priority,
testing by food companies and public authorities. with effective, preventative action from both the
Ensuring analytical availability and capability is food industry and government. Which? consumer
a crucial aspect of this. As a result of the Elliott research has shown that failing to act would
report, a network of centres of excellence is now have a long-term negative impact on consumer
being established. confidence; and that consumers expect public
Over the past two years, testing by Which? authorities to ensure their food is what it says it
as part of its Stop Food Fraud campaign has is. A September 2014 survey found that over half
found problems with a spectrum of products. (55%) of people were worried that a food fraud
The results have been shared with the FSA incident would happen again. A quarter (23%)
for investigation. In April 2014, 40% of 60 lamb said that in the past 12 months they had changed
take-aways tested were found to be adulterated the type of meat products they bought because
with other meats, mainly chicken and beef. they were worried about food fraud.
In September 2014, we discovered haddock With local authority resources under strain and
substituted with cheaper whiting in 5 out of food standards work in decline in many parts of
15 Glasgow fish and chip shops. Goat’s cheese the country, the FSA and its new National Food
tested by Professor Elliott in October 2014 Crime Unit will have a crucial role to play.
FORENSIC SCIENCE: BEYOND THE COURT

CASE STUDY

EXPLOITING THE MICROBIOME

T
PAUL BRERETON, Head of Fera International

he microbiome is the combined between the micro-floral markers, and how


genetic material of all the micro- the characteristic signatures of these markers
organisms that typically inhabit a vary from one place to another. Large numbers
particular environment. Although of data points are needed to understand the
usually associated with studies of the human potential variability of markers within particular
gut, understanding the nature of the microbi- target regions; this requires resource-intensive
ome of animals, plants, and their environments production, analysis and storage of these data,
is a potentially new and powerful method for limiting the application of the technique.
assessing where items originate and where they Fera (formerly the Food and Environment
have been. Research Agency) has developed a method
Many geological, biological, and environmental that uses the latest NGS technology to facilitate
markers (such as the composition of chemical rapid and wide-ranging interrogation of microbial
elements, or the shape of a sand grain – see genomes. Funded by the Department for
Chapter 10, case study on p116) are already Environment, Food and Rural Affairs (Defra) and
used to match items with a particular point of the Food Standards Agency, Fera has undertaken
130 origin. But the microbiome has been under- a pilot study of the microbiome concept that
utilised in forensics. aims to confirm the geographical origin of
Given the increased regulatory emphasis on oysters from beds around the UK coastline1.
accurate labelling of a food’s geographical origin, We focused on genomic sequence data from
there is a need for systems that accurately assess a particular bacterial gene that is commonly used
provenance. One approach exploits micro-floral to differentiate bacterial species. Our hypothesis
signatures – the genetic profile of all the algae, was that it could also be used to differentiate
fungi and bacteria present in a sample. These samples of Pacific oysters, according to their
signatures could be used to identify where a production site and related conditions such as
sample was originally produced, but also link how they were grown and the origin of the
samples to particular environments where they spat (‘larvae’) that the oysters grew from. 110
have been, a crucial aspect for forensic analysis. oysters were collected directly from 11 major
Until recently, it has been difficult to measure production sites around the UK. Bacterial gene
and interpret the microbiome due to the sequences were generated by sequencing oyster
diversity of micro-floral populations, and the gill tissue. After analysing the sequence data using
limitations of the tools used to measure them. bioinformatics techniques, differences in bacterial
But the advent of Next Generation Sequencing communities between locations and substrate
(NGS) has provided a step change in analysis were identified using statistical procedures.
that now permits rapid interrogation of the We found strong links between the
RNA/DNA sequences that make up the microbiome and the oysters’ geographical
genome; as such, it offers for the first time the origin; and also between the microbiome and
potential for forensic analysis to exploit the the oysters’ substrate (e.g. whether they were
microbiome. grown on trestles or on the sea bed). The
Attributing a geographical origin to a sample length of time that oysters had been grown at
(“Where does it come from?”) is usually more the sampling location was also weakly linked to
challenging than confirming a match between an the composition of their microbial community,
unknown sample and a reference control (“Is it although this correlation was less strong than
from here?”). To answer the former question, with the sampling location itself, indicating that
investigators need to understand the relationship the oyster microbiome is influenced most
FOOD AND DRINK

declaration. In combination with a specialised


NMR technique called site-specific natural isotope
fractionation (SNIF), even the addition of beet
sugar (a C3 plant) to wine must (chaptalisation)
can be detected.

INNOVATIVE TECHNOLOGIES
Traceability is a key element in ascertaining the
IT HAS BEEN DIFFICULT TO safety of the food chain, but it is also an important
tool to ensure its integrity.
MEASURE AND INTERPRET Anti-counterfeiting technologies play an
THE MICROBIOME DUE TO important role in ensuring product safety, as well
as authenticity, although the technology only allows
THE DIVERSITY OF MICRO- track-and-trace of the package and not the package
FLORAL POPULATIONS, AND content. Authentication packaging technology
offers many levels of varying sophistication either
THE LIMITATIONS OF THE using overt technology (holograms, security
TOOLS USED TO MEASURE threads, watermarks, colour shifting ink) or covert
technology (UV ink, fluorescence fibres added to
THEM AGAIN. packaging paper, biological or chemical tags such
as DNA printing inks). Synthetic and unique DNA
can be incorporated in packaging material for
strongly by the water in the locality. Further authentication of genuine products that encodes
work is assessing the impact of seasonality product-specific information, which are impossible 131
on the oyster microbiome in the different to forge.
production sites, in order to ensure that the Hyperspectral imaging, which marries
microbiome markers are robust and not spectroscopy to image analysis for providing
affected by the season in which the samples spectral, as well as spatial information, is a powerful
are taken. tool that can be used for rapid non-destructive
quality and authenticity assessment of food,
This approach has many potential particularly meat and spices.
applications in broader areas, such as: Next-generation sequencing (NGS), at least
• Forensics: being able to link an item/person theoretically, makes it possible to identify all species
to a particular location present in a food product. The technique holds
• Food waste (spoilage): using analysis of great promise for identifying pathogens isolated
the microbiome to better understand and from clinical material and food to support trace-
extend shelf life back investigations to identify the source of an
• Microbial epidemiology: using micro-floral outbreak (see case study p130). NGS has the
signatures (including those from non- potential to advance food authenticity testing, but
pathogenic sources) to trace pathogen requires further refinement and development,
outbreaks particularly related to data analysis (bioinformatics),
• Food authenticity: using a food’s microbiome before finding its way into routine laboratory use.
as an authenticity marker or specification Competent authorities and policymakers in the
EU must have access to up-to-date knowledge
related to fraud detection and prevention
technologies, as well as the
relevant databases, to safeguard the integrity of
the food chain. Responding to this need, the JRC is
putting in place dedicated research infrastructures
to provide the European Commission and EU
Member States with the necessary knowledge to
fight food fraud.
FORENSIC SCIENCE: BEYOND THE COURT

CHAPTER 12

COUNTERFEIT PHARMACEUTICALS
AND METHODS TO TEST THEM
HARPARKASH KAUR, Pharmaceutical counterfeiting is a global threat that can kill patients, contributes to the
London School of rise of drug resistance, and increases citizens’ mistrust of health systems. To monitor drug
Hygiene and quality, governments and health programs must invest in regulations, technologies, and
Tropical Medicine infrastructure, including anti-counterfeiting measures, specialised analytical facilities run by

T
experienced staff, and portable technologies for screening medicines in the field.

he United Nations Office on source or identity. (A falsified drug could signal


Drugs and Crime has identified a potentially counterfeit product, which does
pharmaceutical counterfeiting as not comply with intellectual property rights
a global threat1. Although health or may infringe trademark law)5. Substandard
professionals assume that they are prescribing drugs are produced with inadequate attention
good-quality medications, and patients to good manufacturing practices and may
believe that these medications will cure them, have contents or dissolution times that are
counterfeit drugs are often revealed only after a outside accepted limits, due to poor quality
patient fails to recover2. control6. Degraded formulations may result
The medicines supply is carefully monitored from exposure of good-quality medicines to
132 in the UK, but this is not the case in resource- light, heat, and humidity. It can be difficult to
constrained countries, where a range of distinguish degraded medicines from those
factors are contributing to pharmaceutical that left the factory as substandard, but the
counterfeiting. These include: lack of legislation; distinction is important because the causes and
weak or absent regulatory authorities; demand remedies will be different.
exceeding supply; the high price of ‘innovator The WHO’s International Medical Products
drugs’ (i.e. brand-name drugs); the difficulty Anti-Counterfeiting Taskforce (IMPACT)
in tracking transactions involving many estimates that up to 25% of the total
intermediaries; and the lack of laboratories or medicine supply in less-developed countries
field-tests to assess the quality of drugs. is counterfeit7. Obtaining exact figures is very
Poor-quality medicines are divided into four difficult, however, as the very nature of this
main classes: counterfeit, falsified, substandard trade means that it attempts to operate below
or degraded. But there are no universally- the regulatory radar, and many suspect drugs
accepted definitions of these categories3. The remain undetected. The prevalence of poor
World Health Organization (WHO) defines quality drugs can only be known after a formal
spurious/falsely-labelled/falsified/counterfeit drug quality survey has been performed, and
(SFFC) drugs as follows4: objective evidence of the quality of drugs
“A counterfeit medicine is one which is available from most countries is lacking.
deliberately and fraudulently mislabelled Alarmingly, if a medicine contains too few
with respect to identity and/or source. active pharmaceutical ingredient (APIs) to
Counterfeiting can apply to both branded and kill all the pathogens in a patient’s body, it
generic products and counterfeit products may encourages the emergence of drug resistant
include products with the correct ingredients strains. And because the poor are often limited
or with the wrong ingredients, without active to buying not just the cheapest product, but
ingredients, with insufficient active ingredient or also the smallest pack size, that also makes it
with fake packaging” more likely that they receive inadequate doses
Falsified (fake) medicines do not contain the of an active ingredient, further accelerating
stated active pharmaceutical ingredient (SAPI) drug resistance. Poor quality medicines may
and may carry false representation of their also lead to distrust in the healthcare system
COUNTERFEIT PHARMACEUTICALS AND METHODS TO TEST THEM

and threaten decades of progress in public THE SHEER VOLUME OF ANTIBIOTICS


health. It is simply unacceptable that the
quality of drugs is poor or uncertain for the SOLD DAILY AND THEIR RELATIVELY
most disadvantaged people, who have the LOW PRODUCTION COST MAKES THEM
least resources and are attracted by the lower
prices of counterfeit drugs. A VULNERABLE GROUP OF DRUGS FOR
TARGETING BY COUNTERFEITERS
ANTI-COUNTERFEITING
TECHNOLOGIES
Several countries have recently ratified legislation
to combat the sales of falsified medicines. The did not differentiate between substandard
United States passed the drug quality and and counterfeit medicines13. Surveys require
security act8, while China and India have brought epidemiological knowledge, and an adequate
in legislation to use bar codes and adopt track- sample size from as wide a range of outlets as
and-trace systems to check that quality-assured possible, to provide a reliable estimate of the
medications reach patients. Tagging technologies frequency of poor quality drugs.
include radio-frequency identification or Reliable surveys are essential to justify and
RFID9, Microtags10, NanoEncryption™ 11 and promote the political action that would create
AuthentiTrack® 12, which allow manufacturers the mechanisms needed to assure drug quality14.
and distributors to track medicines through
the supply chain. Microtags are micrometer- METHODS TO TEST MEDICINES
sized particles uniquely encoded with multiple 1. Visual and physical inspection
levels of security information within a space of The first step in determining the quality of a
50–110 micrometers (the size of a speck of medicine is to look for the key features of any 133
dust). The tags are made of inert materials, are high-quality medicine. The package should
safe for human consumption and will not alter include a list of active ingredients, the name and
the potency of the medicine. The information address of the manufacturer, storage conditions,
they carry can be decoded with laser pens, batch or lot number, dates of manufacture and
optical scanners or other scanning technologies expiry, and directions for use. An instruction
provided by the Microtag maker. leaflet (in the appropriate language and without
Global alarm about the emergence of any spelling errors) should be enclosed with
antibiotic-resistant ‘superbugs’ is prompting wider the tablets. The tablets themselves should
use of these tagging technologies. In developing match the authentic product in their shape,
countries, generic antibiotics can be obtained size, and colour. If the solid dose formulation is
without a prescription and little is known about crumbling, chipped or cracked, it may indicate
their quality. Misuse of antibiotics – through a substandard or degraded medicine. However,
unnecessary over-prescribing and sub-optimal in my experience it can be difficult to persuade
dosing resulting from substandard antibiotics – manufactures to supply genuine product for
engenders the development of resistance. The comparison. Pharmaceutical manufacturers
sheer volume of antibiotics sold daily, and their employ overt anti-counterfeiting strategies
relatively low production cost, makes them a such as visible holograms, as well as invisible
vulnerable target for counterfeiters, illegitimate covert features to mark the authenticity of
internet pharmacies, and drug manufacturers their products. Sadly, holograms can also be
who use poor manufacturing practices. counterfeited, as was the case for packages
Antimalarial drugs are another vulnerable of antimalarial artesunate in South East Asia
target. Considerable technical, financial and that claimed to be manufactured by Guilin
human resources are required to inspect, Pharmaceutical Co. Ltd15.
analyse and police the drug supply, all of which
are lacking in most malaria-endemic countries. 2. Laboratory tests
A systematic review of the literature reported A well-equipped medicines quality control
that few surveys of antimalarial medicines used laboratory (MQCL) is a crucial component
robust methodology, and that the majority of any drug quality assurance system. It
should be equipped with a range of analytical lower bioavailability. Indeed, an epidemic
equipment (see below), as well as quality- of malaria on the Afghan-Pakistan border
assured reference standards, all of which is was confirmed to result from the poor
cost intensive. An MQCL also requires staff bioavailability of locally-procured substandard
with a high level of technical expertise and antimalarial drugs18. These tests require a
experience of method development. sophisticated dissolution apparatus, as well as
High-performance liquid analytical equipment (HPLC with UV-PDA)
chromatography (HPLC) is an analytical and reference standards, which are expensive
technique used to separate specific and may be difficult to obtain. Furthermore,
compounds, and then identify and quantify analysts need to have access to the dissolution
them based on how long they take to separate, information that is expected for each
and their spectrophotometric properties. medication, and the tests are both labour- and
HPLC can be coupled to various detectors, cost-intensive.
but the ultraviolet photodiode array (UV- Nuclear magnetic resonance (NMR)
PDA) is regarded as the ‘gold standard’ for spectroscopy is a powerful tool that allows
drug quality analysis because it offers accuracy, analysts to determine the structures and
specificity and precision in quantifying the relative concentrations of molecules in
amount of APIs present. It is, however, relatively a sample without active pharmaceutical
expensive and requires greater expertise to reference standards. For example, NMR
operate, which demands extensive training and analysis of the hydrogen and phosphorous (1H
technological support. and 31P) atoms in the anti-leishmanial drug
HPLC can also be coupled to a mass miltefosine helped to prove that a generic
spectrometer (LC-MS). Although this gives version procured from Bangladesh did not
134 analysts abundant chemical information, it contain the SAPI19.
also relies on tedious, time-consuming sample
preparation, and typically requires a reference 3. Screening techniques
standard to determine API levels. Thin layer chromatography (TLC) is an
However, more recent MS technologies inexpensive, simple, flexible and effective
avoid sample preparation and give almost method for verifying the identity of a
instantaneous results. Direct analysis in real formulation. It requires a variety of chemical
time (DART) MS allows the analyst to hold a reagents and plates, reference standards of
tablet in front of a mass spectrometer and get the SAPIs, and some basic training for the
information about its composition in seconds16, analyst. For example, two TLC-based tests can
while desorption electrospray ionization check the quality (falsified or authentic) of the
(DESI) MS involves spraying a solvent at the most effective antimalarial drugs, artemisinin
tablet to free APIs for analysis17. combination therapies (ACTs), in the absence
Dissolution testing offers a valuable of a MQCL20.
prediction of the in vivo bioavailability and Many developing countries do not have
bioequivalence of tablets and capsules, by the technical, financial, or human resources
measuring the amount of drug released required to inspect and police the drug
into a dissolution media (liquid) over time. supply7. Thus simple and affordable field
The presence of incorrect excipients, as methods provide a practical means of rapidly
well as poor manufacturing processes, may monitoring drug quality. Portable labs – in
contribute to poor dissolution resulting in particular the Minilab®, a ready-to-use TLC

CONVENIENCE SURVEYS CONDUCTED IN SOUTH EAST ASIA IN 2000/1


AND 2002/3 SUGGESTED THAT 38% AND 53% OF THE ARTESUNATE
BLISTER PACKS OBTAINED FROM PHARMACIES AND SHOPS WERE
COUNTERFEIT.
COUNTERFEIT PHARMACEUTICALS AND METHODS TO TEST THEM

kit from the German Pharma Health Fund A RECENT META-ANALYSIS REPORTED
(GPHF)21 – provides a versatile means for
initial screening of many drug formulations, THAT 35% OF ANTIMALARIAL DRUG
including antimicrobials, antimalarials, and SAMPLES FROM 21 SUB-SAHARAN
antiretrovirals. Currently 713 GPHF-Minilab
units are used globally across 92 countries to AFRICAN COUNTRIES, FAILED
fight the counterfeit drug trade. CHEMICAL CONTENT ANALYSIS.
The Tanzanian Food and Drugs Authority
pilot-tested the Minilab® and found it to be
relatively inexpensive and rapid, but that it
detected only grossly substandard or wrong- affecting the quality of the spectrum. The
drug samples. Ultimately, the Minilab® should TruScan® hand-held Raman device has
be used in conjunction with robust laboratory- successfully detected some counterfeits in
based testing22. This approach was recently the field, but it has not been useful to detect
used to assess the quality of two brands of substandard medicines24.
antibiotics, amoxicillin and co-trimoxazole, Unlike Raman spectroscopy, infrared (IR)
manufactured in six countries and purchased spectroscopy has a larger depth penetration into
in Ghana, Nigeria and Nigeria. All of the the sample surface. Near-infrared spectroscopy
samples of amoxicillin complied with United (NIR) can reveal whether excipients are not
States Pharmacopeia (USP) tolerance limits for in the correct proportions, suggesting that the
dissolution testing, but 60% of co-trimoxazole medicine is counterfeit, but it cannot detect
tablets did not. But there was some disparity substandard medicines25. NIR is also relatively
in the Minilab® results, highlighting that this simple to miniaturise: for example, the SCiO
portable laboratory should not be relied upon NIR device, at present under validation, is a 135
to make regulatory decisions23. smart-phone-sized instrument that promises
to be highly effective at checking the quality
4. Portable instruments of medications in the absence of a MQCL26.
Hand-held devices based on spectroscopic Meanwhile, the US Food and Drug Administration
methods are now being investigated as (FDA) has recently started using its Counterfeit
screening tools that can rapidly detect poor- Detection Device CD-3 to screen tablets,
quality drugs throughout the supply chain packaging and even documents at ports of entry
(see case study p138). Non-destructive or in remote areas, although further development
spectroscopic techniques such as Raman is still needed27.
spectroscopy and near infrared (NIR)
are currently being evaluated for their ability QUALITY OF ANTIMALARIAL DRUGS
to scan drug samples through the blister IN MALARIA-ENDEMIC COUNTRIES
pack, without using the toxic chemicals A recent meta-analysis reported that 35% of
or flammable solvents typically found in a antimalarial drug samples from 21 Sub-Saharan
MQCL. Both techniques rely on comparing African countries, failed chemical content
characteristic spectral ‘fingerprint’ of a analysis28. The underlying research predominantly
suspect medicine with a genuine sample. This used the ‘convenience’ sampling approach, where
necessitates access to a database of spectra, research teams purchased medicines from drug
created by investigators, for every brand of sellers who were easily-accessible, or who were
medications from every manufacturer (see already thought to sell poor-quality medicines.
case study, p140). Results based on this low-cost sampling
One potential drawback of using Raman approach can be useful in drawing attention to
spectroscopy is that only the sample surface is a potential problem. For example, convenience
probed, so if the SAPI is not evenly distributed surveys conducted in South East Asia in 2000/1
throughout the entire tablet, the resulting and 2002/3 suggested that 38% and 53% of
content information may be inaccurate. the artesunate blister packs obtained from
Additionally, many pharmaceutical preparations pharmacies and shops were counterfeit29.
contain highly fluorescent excipients, thus But the convenience approach may not be
FORENSIC SCIENCE: BEYOND THE COURT

Table 1: Comparative strengths and weaknesses of the three sampling approaches used

SAMPLING
ADVANTAGES DISADVANTAGES
APPROACH

CONVENIENCE • Rapid • Lack of defined sampling frame of standardised


approach
• Low cost
• Uncertainty in whether sampling is representative
and therefore reliability of the estimates of drug
quality obtained
• Generalisability of findings may be weak
• Results may be difficult to replicate

MYSTERY • Use of defined sampling frame • Sample will only be as comprehensive and/or
CLIENTS representative as the sampling frame that was
• Can yield representative sample from all types of
used
outlets and/or brands
• Need to authenticate and update sampling frame
• Low risk of sampling bias in samples collected, as
increases time and cost of survey
outlets are unaware of survey
• Information on sources of poor quality drugs
• Reliability and generalisability of results should be
is limited to brand, batch and country of
strong
manufacture as stated on packaging
• Results can be replicated
136
OVERT • Use of defined sampling frame • Sample will only be as comprehensive and/or
representative as the sampling frame that was
• Can yield representative sample from all types of
used
outlets and/or brands
• Need to authenticate and update sampling frame
• Results can be replicated
increases time and cost of survey
• Can collect additional information at minimal
• Possible risk of sampling bias in samples collected,
additional cost to mystery approach
if some outlets refuse to be sampled or are
aware of which samples might be poor quality
and differentially withhold these
• Reliability and generalisability of results may be
compromised if sampling bias occurs

representative of the places where patients remaining parasites, in the hope that resistance
actually buy their medicines, and it may also be will be slowed enough to allow for the
biased: for example, if the collector consciously development of a pipeline of efficacious drugs.
or subconsciously set out to procure or not Once ACTs had been enforced in malaria-
procure poor-quality formulations (see Table 1)30. endemic countries, it was believed that they
In 2006, the WHO banned malaria would be in danger of being counterfeited.
medicines that contain just one active Hence, the Artemisinin-based Combination
ingredient (such as artesunate), in favour of Therapy Consortium Drug Quality programme
artemisinin combination therapies (ACTs) that purchased over 10,000 artemisinin-containing
contain more than one active ingredient. This antimalarials (ACAs) in 6 malaria endemic
treats the disease more rapidly: the artemisinin countries, from private sector retail outlets
component kills the majority of the parasites such as pharmacies and drug shops, following
at the start of the treatment, while the more representative sampling approaches31. Outlets
slowly-eliminated partner drug clears the were selected at random in most countries
COUNTERFEIT PHARMACEUTICALS AND METHODS TO TEST THEM

from lists obtained from the relevant


government’s ministry of health; whereas
WE NEED GREATER INVESTMENT
in other countries we initially conducted a IN DEVELOPING AND VALIDATING
pilot study by collecting samples using the
‘convenience’ approach to gain perspective
PORTABLE TECHNOLOGIES THAT
on the type of outlets and brands of ACAs CAN BE USED IN THE FIELD.
available.
Medicine samples were subsequently
purchased using one of two approaches. as falsified when either one of the SAPIs was
Through the ‘mystery client’ approach, the not present. All results were compiled into
person purchasing the medicines posed as a a report and disseminated to the relevant
malaria patient or their relative; through ‘overt ministries of health before being submitted as a
sample collection’, vendors were informed manuscript to peer reviewed journals.
that we were going to analyse the quality of In these investigations of ACAs, we found no
the medicines they sold, and samples were evidence of falsified medicines in 4,928 samples
purchased once they consented. This allowed (over 50 brands) from Cambodia, Ghana,
us to interview the vendor to obtain data Rwanda and Tanzania. Of the 5,151 samples
on the availability and supply of antimalarials, that were collected in Bioko Island (Equatorial
their storage conditions, and the training of Guinea) and Nigeria (over 142 brands), 1.9%
providers. were falsified i.e. they contained neither of
The collected samples were analysed in the SAPIs. Instead, they contained compounds
three different laboratories in the UK and the including chlorzoxazone (a muscle relaxant), 137
US. First, they were sent to the London School ciprofloxacin (an antibiotic) or acetaminophen
of Hygiene and Tropical Medicine (LSHTM), (paracetamol, a commonly used painkiller).
where they were logged and their packaging The falsified medicines found in this research
and blister packs scanned. Each tablet was are far fewer than the 35% fakes suggested in
weighed and its dimensions recorded on the previous reports. However, it is worth noting
database. Each sample was analysed using that substandard drugs were found in all the
HPLC UV-PDA to measure the amount countries that we studied, with the most in
of APIs, which was then expressed as the Cambodia (31.3%), Ghana (37%) and Tanzania
percentage of the SAPIs and used to classify (12%); others were less than 8%.
the quality of the sample. Duplicate samples The key strengths of this investigation are
from each packet of tablets analysed at LSHTM that representative sampling approaches were
were sent to the US Centers for Disease used to purchase a sizeable number of samples;
Control and Prevention in Atlanta, where a these were analysed in three independent
random 10% were analysed for confirmatory laboratories, using two different detection
HPLC-PDA results. A duplicate set was also methods (HPLC with UV-PDA and MS)30.
sent to the Georgia Institute of Technology, Representative methods to sample
Atlanta, for ambient MS analyses to verify the medicines are important for generating
pharmaceutical ingredients present and identify reliable estimates of the prevalence of poor
any unstated compounds. Samples were quality drugs in a given country. However, this
classified as ‘acceptable quality’ if the SAPIs type of study is cost intensive, both for the
were present at between 85% and 115% of purchase and analysis of drugs. It is important
the SAPI quantity. Medicines outside this range, to establish affordable systems that sample
for either or both of the partner compounds, medicines in a representative way, and develop
were classified as substandard. These robust laboratory techniques to analyse them
substandard medicines were also examined to on a regular basis. This will enable for the
detect the presence of degradation products, accurate quantification and tracking of the
caused by poor storage conditions such as scale of poor-quality medicines that threaten
heat and humidity. Medicines were regarded the treatment of this life threatening disease.
FORENSIC SCIENCE: BEYOND THE COURT

CASE STUDY

OPERATION PANGEA

O
GIFT MINTA, Senior Criminal Intelligence Analyst, Medicines and Healthcare products Regulatory Agency

peration Pangea is an crimes. The MHRA consequently launched the


International Internet Week of UK Internet Day of Action (IDA Operation
Action (IIWA) to tackle the Bali) in April 2006, to investigate internet
online sale of illicit and counterfeit sites offering illegal medicines, and followed
medicines, and highlighting the dangers of that with Operation Latvia in 2007. Realising
buying medicines online. Coordinated by that the fight against the online sale of illicit
Interpol, the annual operation brings together and counterfeit medicines required a global
customs, health regulators, national police and effort; this approach was introduced to some
the pharmaceutical industry from countries European member states via Interpol in 2008.
around the world. Activities target the three The MHRA Enforcement Group now
principal components used by illegal websites uses several different strategies to combat
operators to conduct their trade: internet the activities of criminals responsible for the
service providers (ISP), payment systems, illegal sale and supply of medicines online.
and delivery services (including ports). The This includes collaboration with the UK’s
operation has gained significant momentum Border Force to intercept medicines and
138 since its launch in 2008, growing from 10 medical devices at ports, for example, and uses
participating countries to 115 countries in intelligence analysis to adapt to the criminals’
2015. Operation Pangea VIII (9–16 June 2015) changing tactics.
resulted in the record UK seizure of 6.2 million In recognition of the growing threat
doses of falsified, counterfeit and unlicensed from cyber related criminality, the MHRA
medicines, with a total value of £15.8 million. has developed a specialist role of Internet
This marks an increase of 97% on the preceding Infrastructure Investigator, whose activities has
year’s operation. significantly reduced the number of websites on
Operation Pangea traces its origins back to the UK domain tree that illegally sell medicines.
a threat assessment conducted by the MHRA This disruption-based approach has forced
Enforcement Group that revealed a disturbing criminals to relocate their businesses outside
increase in internet-facilitated medicines UK jurisdiction, and transfer their wares from
crime between 2000 and 2005. At that time, manufacturers to the UK public – a tactic
approximately 85% of the total referrals to the known as drop shipping. Nevertheless, thanks
Enforcement Group were internet-facilitated to effective profiling through intelligence
analysis, the MHRA has helped to increase the
volume of seizures of unlicensed, falsified and
OPERATION PANGEA counterfeit medicines and devices.
VIII RESULTED IN THE The MHRA Enforcement Group also works
with forensic science providers to combat
RECORD UK SEIZURE OF pharmaceutical crime. By testing seized
6.2 MILLION DOSES OF medicines using various chromatographic and
spectroscopic analytical techniques, reports and
FALSIFIED, COUNTERFEIT witness statements are generated to support
AND UNLICENSED investigations and prosecutions. Scientists can
be called as expert witnesses, or help with
MEDICINES, WITH A TOTAL court proceedings by corroborating scientific
VALUE OF £15.8 MILLION findings and confirming criminality.
And many of these techniques are now being
COUNTERFEIT PHARMACEUTICALS AND METHODS TO TEST THEM

CONCLUSION
Producing counterfeit drugs is an easy
endeavour, requiring only a tablet press, a
printer, commonly-found household materials
and a malevolent mentality. In August 2015,
the US FDA approved for the first time a drug
made using 3D-printing technology32. This
technology is a potential danger in the hands
used in the field. Raman and near infra-red of counterfeiters. Enormous effort is spent
spectroscopy have helped to the increase in determining the most efficacious drug for
the volume of illicit medicine seizures treating a disease, and supporting its use in
since they were first used at the Coventry nationwide programs. It is essential that the
International Hub in Operation Pangea IV. quality of these drugs is monitored to maintain
When Raman equipment was used at the good quality, not least to avoid the development
Heathrow Worldwide Distribution Centre of drug resistance caused by falsified and
(HWDC) in Operation Pangea VIII, it substandard medicines.
resulted in the interception of approximately We need greater investment in developing
20,000 doses of unlabelled or unmarked and validating portable technologies that can be
tablets, which contained medicinal and used in the field, to ensure good-quality drugs
controlled substances indicated for weight reach the patient. The techniques mentioned in
loss, anxiety and hormone therapy. this article can be used to determine the quality
It is clear that Operation Pangea has been of drugs, but are not available in the majority of
a significant success story, and demonstrates resource-constrained countries. Hence, there are
the importance of working in partnership, few data to inform policy or interventions. 139
evidenced by the high volume of seizures We need more research funding to uncover
during the weeks of activities at the ports. the extent of the counterfeiting problem; to
But criminals continue to evolve their evaluate appropriate methods for drug-quality
methods: recent seizures of unlicensed assessment; and to estimate the impact of poor-
medicines by the MHRA Enforcement quality drugs used to treat various diseases.
Group indicate that consignments were In addition, better collaboration between
not imported via the known ports of entry academic researchers, the Pharmaceutical
and modes of transport. It is assumed industry, medicine regulatory authorities and
that criminals involved in this illicit trade law enforcement agencies will greatly help to
have turned to alternative fast parcel and ensure that the vulnerable are protected from
courier companies to avoid detection, which poor-quality medicines. Enhanced regulation
emphasises the importance of effective and quality assurance of genuine manufacturers
working relationships with the industry and would also help reduce the problems of
Border Force. substandard and falsified medicines.
Sensitive and specialised chemical techniques
(HPLC, dissolution testing, LC-MS, NMR and
MS), operated by experienced staff, are needed
in bio-analytical laboratories in disease-endemic
countries, so that they can be utilised relatively
quickly determine the quality of drugs to treat
fatal diseases.
Both national and international programs
must take steps to ensure that they use quality-
assured drugs in their effort to eliminate diseases
such as malaria and visceral leishmaniasis. As
more people travel around the world, there is an
urgent need to ensure that medicines available
globally are of good quality.
FORENSIC SCIENCE: BEYOND THE COURT

CASE STUDY

THE COUNTERFEITING OF
HEALTHCARE PRODUCTS

T
DAVID A TAINSH, Chief Product Quality Officer, NISHA MISTRY, Senior Investigator (R&D), GlaxoSmithKline

he counterfeiting of healthcare CASE STUDY 1


products represents an Raman microscopy highlights that even
unacceptable threat to counterfeits are not the same
patients’ welfare. There is In Raman spectroscopy, a monochromatic laser
no such thing as a ‘good’ counterfeit. A beam is shone onto (or through) a sample,
combination of inappropriate ingredients and the resulting scattered light is analysed for
and lack of adherence to strict conditions changes in wavelength. This leads to a spectral
of quality assurance, testing and hygiene in ‘molecular fingerprint’, highly sensitive to the
manufacturing mean they are never safe to structure and crystalline form of the material
use. As technology improves, counterfeit under investigation. With Raman microscopy, it
packaging becomes increasingly sophisticated is possible to collect Raman spectra from single
and more difficult to detect. Patients buying points on a sample as well as spectral maps from
140 or being given counterfeit medicines are larger areas.
unlikely to know that what they have is not In Figure 1, Raman microscopy has been used in
genuine and could be harmful. This risk is a fast, non-contact, non-destructive way to generate
par ticularly high when obtaining medicines mean fingerprints of a number of tablet samples
from unauthorised websites. purporting to be the same as the authentic tablet.
The prevention and detection of Not only do the fingerprints of the other tablets
counterfeits is primarily a matter for demonstrate that all the samples are counterfeit
national governments worldwide, but the – the counterfeits themselves appear to belong to
pharmaceutical industry has an impor tant four different types.
role to play in helping to minimise the
counterfeiting of its products. Forensic CASE STUDY 2
techniques, for example, can differentiate Fourier Transform-Infra Red Spectroscopy
genuine from counterfeit products. (FT-IR) and Liquid Chromatography-Mass
Medicinal tablets consist of the drug plus Spectroscopy (LC-MS) determine the active
other ingredients. These other ingredients drugs in the counterfeit
reflect how they are manufactured, and In IR spectroscopy, a beam of infra-red light
how they are designed to dissolve when is passed through a sample. The transmitted
swallowed. Counterfeit medicines may light from the sample shows how much
contain more or less of the originator drug, a energy is absorbed at each wavelength, and
different drug or no drug at all, together with this absorption gives information about the
any combination of other ingredients. The molecular structure of the sample. It can provide
possibilities are endless – but detectable. characteristic fingerprint spectra of a particular
In any investigation, a number of molecule in minutes, so the technique can be
techniques are used in combination to prove used to determine chemical identity.
or disprove authenticity. These two case In Figure 2, the FT-IR spectrum of a suspect
studies illustrate the power of individual headache powder highlights that there are
techniques to generate essential clues in the differences relative to the authentic product.
form of unique analytical fingerprints. In Figure 3, comparison of the counterfeit
product spectrum with the spectra of authentic
COUNTERFEIT PHARMACEUTICALS AND METHODS TO TEST THEM

Figure 1: Comparison of mean Raman spectra for an authentic


tablet and 4 counterfeit tablets

1,200
Authentic
Genuine

07100071
1,000
1
800

Intensity (cnt)
600
2

active ingredients – paracetamol, aspirin and 400

caffeine – reveal that aspirin is not present, 200 3


because characteristic peaks are missing in the
10150
0
counterfeit spectrum. 4
-200
LC-MS combines the ability of high- 2,000 1,800 1,600 1,400 1,200 1,000 800 600 400 200

performance liquid chromatography to separate Raman Shift (cm-1)

components of a mixture, with the ability of


mass spectrometry to provide information about
the mass of individual molecules. Using a high- Figure 2: FT-IR spectra shows that a suspect headache powder
resolution mass spectrometer with accurate does not match an authentic product
mass measurement enables investigators to
determine a specific molecular formula for each
component of a separated mixture. 141
In this example, investigators found that aspirin
(or acetylsalicylic acid) had been replaced by
salicylic acid, a different active ingredient that is
only used in products for the treatment of skin
conditions such as verrucae.
Other industries – particularly those in the
consumer products sector – apply similar forensic
analysis and investigative techniques to determine
product authenticity and to differentiate between
counterfeit and genuine products. For example, 4000.0 3600 3200 2800 2400 2000 1800 1600 1400 1200 1000 800 650.0
the food industry applies many of the same
techniques used in pharmaceutical investigations
to confirm authenticity of food products, including
the determination of whether products have Figure 3: FT-IR comparison shows that the suspect powder
been contaminated maliciously or inadvertently contains paracetamol and caffeine, but no aspirin
(see Chapter 11). The cosmetic industry applies
comparable tools to differentiate genuine products
from counterfeit cosmetics in the same way.
Ultimately, these are specialist means of
detection, but significant advances in technology Aspirin reference
and the widespread availability of portable
instruments mean that it is becoming much easier
to deploy them in mobile laboratories, or even
through the use of hand-held devices, so that real-
time determinations can be made in the field.

4000.0 3600 3200 2800 2400 2000 1800 1600 1400 1200 1000 800 650.0
FORENSIC SCIENCE: BEYOND THE COURT

CHAPTER 13

CONSUMER PRODUCTS
MELISSA DRING, Over the past 15 years, product counterfeiting has become one of the most prolific areas
ROBYN ELLISON of economic crime, enabled by the rapid growth of the internet. Investment in forensic
Director of Policy, analysis techniques and capability, as well as advanced anti-counterfeiting measures, is es-
and Policy Officer, sential to tackle this criminal threat – but it could also stimulate significant growth within
Chartered Trading genuine markets.

T
Standards Institute

he production and sale of internet to peddle their fakes. In fact, the OECD
counterfeit consumer goods accurately predicted that the Internet would:
damages both producers and • Make it easier for counterfeiters to conceal
consumers. It deprives our their true identities and lower the risk of
creators, inventors, artists and designers of detection
their just rewards; and means that consumers • Enable counterfeiters to establish enticing sales
spend money on fraudulent, sub-standard goods, sites and then quickly take them down or move
while exposing themselves to the potential to markets where enforcement is perceived to
harm caused by a disregard for safety standards be weaker
in counterfeit products. It also denies the • Provide opportunities for criminals to develop
government much needed tax revenue to fund vast numbers of illicit e-commerce sites and
essential public services. listings and make it very difficult to find and
142 In addition, Interpol and Europol have outlined take action against them
a clear connection between the trafficking of • Allow sellers to reach a huge global audience at
counterfeit goods and other types of organised low cost, 24 hours a day
crime1, with the profits from counterfeit products • Make software and images widely available to
being channelled into areas such as the trafficking make it easy for counterfeiters to create ‘clone’
of drugs and people, and related financial crimes websites, which look identical to legitimate
such as money laundering and corruption. online stores and sales platforms.
Over the past 15 years, product counterfeiting
has become one of the most prolific areas The OECD’s forecasts have largely proved to
of economic crime. As far back as 2009, the be true. Online shopping has snowballed, and
Organisation for Economic Co-operation the opportunity to buy and sell almost every
and Development (OECD) reported that conceivable type of product has burgeoned
global trade in fake goods was as high as $250 beyond anticipation. In the UK alone, it is
billion2. This amount was described as being predicted that online retail sales will reach over
larger than the national GDPs of approximately £52 billion in 2015 (ref. 3). This is over 15% of
150 economies. However, despite efforts by all retail sales made in the UK and means that, on
organisations such as the OECD, it is still not average, UK consumers will spend £1,174 online
possible to calculate the true scope, scale and in 2015, making us the most regular internet
impact of the problem. This makes it extremely shoppers in Europe.
difficult to influence enforcement agendas and Unfortunately, as the OECD also predicted,
key decision makers, and to focus resources legitimate traders have not been the only
correctly in order to take appropriate and ones to recognise the value and opportunities
decisive action. of e-commerce. Through the internet,
counterfeiters are now able to engage with
THE INTERNET EFFECT consumers directly and deliver millions of
As part of its study, the OECD highlighted why imitation products directly to their homes.
the situation was likely to worsen. It envisaged European Commission statistics back this
that a major threat would be the potential up. Its latest report on the subject, produced
for counterfeiters to increase the use of the in 2014, highlights the fact that over 35 million
CONSUMER PRODUCTS

CASE STUDY

MAKING THE MOST OF


TRADING STANDARDS SERVICES

E
MELISSA DRING, ROBYN ELLISON, Director of Policy and Policy Officer, Chartered Trading Standards Institute

nforcement and regulation can be April and December 2014, a staggering 1.9 million
incredibly challenging in this ever- non-compliant or unsafe goods were intercepted
evolving environment. Indeed, reflecting at UK ports through the ports project. Of those,
on the local authority model, it is clear over 670,000 were faulty or non-compliant
that the current structure of Trading Standards cosmetic products2.
services hampers enforcement in this specific area. Despite the successes of the project, it is
As discussed in this chapter, the manufacture and clear that these efforts are only really addressing
distribution of counterfeit goods has resulted in a the tip of the iceberg in terms of the types of
surge of large-scale criminal operations that cross dangerous consumer products entering the UK.
borders at both national and local authority levels. The patchwork of coverage provided by local
In recent years,Trading Standards services, as authority Trading Standards services remains of
with other local authority services, have adapted concern in terms of tackling locally-based online
in the face of austerity. On average, staff numbers sellers, who can easily move their operations 143
have dropped by 40% and budgets by 50% (ref. 1). from one locality to another in order to evade
However as the primary enforcement agency detection.
tasked with tackling the import and distribution Furthermore, for those Trading Standards
of dangerous counterfeit goods, Trading Standards and border agencies involved in the ports
services also have responsibility for the legislative project, it is clear that they are unable to open
enforcement of a diverse array of other consumer every container and intercept every potentially
protection issues, including underage sales, tackling dangerous import. Thus for the tens of thousands
rogue traders, combatting scams, animal health of products that are successfully intercepted and
issues and weights and measures. Some Trading seized by the team, there are many thousands
Standards services currently operate with just more that make it onto market stalls, into shops
one part-time member of staff, yet they must and directly through the doors of UK consumers.
still attempt to enforce all statutory legislation Technological advances that would enable
assigned to Trading Standards. Unfortunately, in automated verification of certain types of goods
this climate of diminishing resources and increased at UK borders would go a long way in helping to
legislative burdens, many individual Trading tackle the stream of counterfeit goods entering
Standards services are struggling to cope with the UK, especially during out-of-hours periods
tackling this large-scale cross-border crime. when Trading Standards inspectors are unavailable
In an attempt to address this issue, National to monitor imports.
Trading Standards has begun work to organise a Furthermore, outside of the work directly
more coordinated effort to tackle the distribution conducted at UK ports in tackling dangerous
of dangerous consumer goods with their Safety at counterfeits, advances in forensics that would
Ports and Borders project. The team works with make it easier and more cost-effective for Trading
14 local authority services across ports, airports Standards officers to test products that are
and postal hubs to intercept and detain unsafe manufactured and dispatched primarily within the
or illegal counterfeit consumer products. They UK would also enable quicker and more effective
also act as a single point of contact for border enforcement to tackle these issues at home.
authorities, and utilise an intelligence-led approach
to prioritise their resources effectively. Between
FORENSIC SCIENCE: BEYOND THE COURT

companies, but in reality they are mostly based in


OVER THE PAST 20 YEARS, China or Russia.
ENFORCEMENT IN THE UK HAS A more recent development that has aided
counterfeiters has been the attention given to
TENDED TO FOCUS ON REDUCING social media (see case study p147). Using multiple
THE VOLUME OF AVAILABLE auction sites, and social media platforms such as
COUNTERFEIT PRODUCTS. Facebook and Twitter, criminals are gaining the
confidence of users through images of genuine
goods, fake labels and packaging, and prices that
are actually close to those being charged for
fakes were detained at our borders, many of real products. This latest ploy is used to deceive
which were small parcels being delivered through buyers into believing they are getting a bargain.
express and postal traffic, as a result of internet However, the end result is that, once again, they
orders4. Demonstrating the increasing trend in often end up receiving cheap tat and potentially
globalisation for online retailing, over 83% of all having their identities stolen and their bank
counterfeits seized by customs authorities actually accounts infiltrated as well.
originated in China and Hong Kong.
Perhaps the most worrying fact produced A FORENSIC APPROACH
by the Commission was that over 25% of all Responding to the growing threat of
counterfeits detained at the borders were counterfeiting requires new and innovative
potentially dangerous to the health and safety of approaches and initiatives. Over the past 20
consumers. Many counterfeit electrical appliances years, enforcement in the UK has tended to
are sold without a ground-fault circuit interrupter focus on reducing the volume of available
144 (GFCI), which protects users against electrical counterfeit products. This has meant an
shock, for example in the event that a hair dryer emphasis on disrupting manufacturing,
falls into water. The purchase of counterfeit distribution and sales chains so that potential
batteries may damage genuine electrical buyers are unable to get access to products.
appliances such as tablets and smart phones. However, due to a run down on resources;
These batteries have not been subjected to the continuously extending enforcement
correct consumer tests, and have been known responsibilities (local authority Trading
to cause overheating, explode or event catch Standards services are tasked with enforcing
fire under conditions in which a genuine product over 250 pieces of statutory legislation); and
would survive. more effective manufacturing, transportation,
Counterfeiting can no longer be considered distribution and selling models used by
to be an innocuous, small time, criminal international criminals; it is clear that this work
sideshow. Moving massive volumes of product has been unable to effectively stem the supply
around the world, and evading enforcement for counterfeit goods. For more background
authorities in the process, requires vast on the Trading Standards situation, see the case
resources, wide-reaching transport chains and study on p143.
sophisticated networks. What has become clear Diverse legal frameworks across the world
in recent years is that the criminals involved in also contain obstacles that affect practices used
counterfeiting are extremely determined, and in enforcement and information exchange. The
have not only become adept at manufacture fact that penalties differ between jurisdictions
and distribution – they have become shrewd has an effect on the courts and the mind-set of
marketing and sales people. By building the general public in disparate ways.
impressive online websites and stores that As a result, there is a need for central
appear to sell original products at discounted government to work with enforcement
prices, they continually attract individual authorities to identify successful best
consumers and businesses to buy nothing practices and build greater understanding and
more than inferior and substandard replicas. collaborative strength to adopt alternative
The added attraction for buyers is that the strategies – including forensic analysis – that
sites appear to be owned by UK or EU-based focus on other areas. An increase in the
CONSUMER PRODUCTS

Table 1: Consumer products, potential safety concerns, and analytical techniques used in investigations

CONSUMER PRODUCT: ANALYSIS TECHNIQUES EMPLOYED


SAFETY CONCERN TO TEST PRODUCTS

Food products: presence of toxins, permitted and not Liquid Chromatography Mass Spectrometry (LCMS)
permitted colours and additives, sugar content and nutritional
value Analysis using chemical reagents

Gas Chromatography Mass Spectrometry (GCMS)


Imported food and animal feed products: high levels of residual
High Performance Liquid Chromatography (HPLC)
pesticides or heavy metals like mercury
Cold Vapour Atomic Absorption Spectrometry (CVAFS)

Counterfeit food products: authenticity HPLC


and harmful ingredients Gas Chromatography (GC)

Melamine kitchenware: release of formaldehyde Spectrophotometry

Inductively Coupled Plasma Atomic Emission Spectroscopy


(ICP-AES)
Toys: compliance with BS EN71 (the British Standard for toy
safety), including tests for heavy metals in paint, flammability Rate of spread of flame test within a flammability chamber
and detachability of small parts
Tension, torque, drop, impact, compression and soaking tests
to determine mechanical properties

145
Cosmetics: prohibited substances such as lead, mercury, Atomic Absorption Spectrometry
hydroquinone or phenol; restricted substance such as CVAFS
hydrogen peroxide or p-phenylenediamine (PPD); and levels
of permitted preservatives such as benzoic acid, sorbic acid, HPLC
phenoxyethanol and parabens Titration

availability of forensic data would help to define To ensure the authenticity of traded goods
the scope and methods of illicit goods trading in the UK, the local authority Trading Standards
in the UK, and focus the appropriate amount of services work in collaboration with the public
resources to stop illegal trade. In other words, analyst laboratories. Public Analysts provide
enforcement needs to be reshaped to change scientific and calibration services ensuring
perceptions and understanding, rather than product safety and compliance with all relevant
solely being aimed at wiping out the availability UK legislation. In doing so, they use a variety
of fake goods. of forensic techniques to both protect the
This strategy requires forensic analysis built consumer from harm and support enforcement
on robust statistics and certified measurement services, particularly Trading Standards Officers.
methods, and has enormous potential to Examples of forensic techniques used
strengthen the value of genuine goods. This in to identify and investigate issues relating to
turn ensures real financial advantages to the consumer products are detailed in Table 1.
manufacturing economy, on a huge scale: the sale
of counterfeit goods has a serious detrimental FUTURE OPPORTUNITIES
effect on the economy, with a projected cost of An important growth area in the forensic
thousands of jobs. This forensics-based approach analysis of consumer goods involves putting
would also inspire consumer confidence, the process of authenticity verification in the
and enable secure supply chains that result in hands of consumers, rather than relying on a
economic growth with an increase in employment. governmental body to validate genuine goods
FORENSIC SCIENCE: BEYOND THE COURT

company Quantum Materials Corp8, which has


IMPROVING THE SECURITY AND developed a technology that uses embedded
VERACITY OF SUPPLY CHAINS, nanocrystals within 3D inks to produce a
physically unclonable signature known only to
THROUGH THE USE OF ADVANCED the manufacturer of the product. While this
NEW TECHNOLOGIES, REQUIRES enables the secure identification of genuine
parts, it does not stop the production and use
INVESTMENT IN INNOVATION. of unauthorised copies.
In developing innovative technologies in
consumer protection, we must be mindful that
through targeted sampling within centralised these advances create the following benefits:
laboratories. • More focused and targeted deterrence of
Researchers at the Massachusetts Institute the trafficking of dangerous products and
of Technology (MIT) have recently developed organised criminality
inks using nanocrystals5, dyed with rare earth • Enable greater collaboration between the
minerals in unique polymer stream patterns, relevant authorities, such as those in the UK,
which can be used to identify legitimate EU, international enforcement bodies, and
products through the printing of unique policymakers (including Europol, Interpol,
security tags or barcodes. These patterns glow the World Customs Organization, and the
under UV light and can be detected with a European Commission)
smartphone. • Empower harm reduction tactics within local
Another important threat to the purchase of and global markets
genuine consumer goods is the growth in 3D • Facilitate assurance of provenance throughout
146 printing and additive manufacturing technology. the supply chain, from manufacturer to
Engineering firms are adopting these techniques consumer, to raise confidence and therefore
as a means of cheaper and more efficient value in genuine goods
manufacturing. But the technology can also
make it easier to produce counterfeit goods From the consumer viewpoint, more should
if the drawings for a genuine part are leaked be done to make the online shopping arena
online, or even reverse engineered. A striking a safer space. The most recent Ofcom
example of this can be found in a 2014 Communications Market report9 found that
Washington Post article6, which accidentally smartphones have now overtaken computers
published a leaked photograph of the US as the preferred method of browsing the
Transportation Security Administration’s master internet. While the use of virus protection and
key for its approved locks that are used on firewall software may be common knowledge in
millions of suitcases worldwide. Although the protecting computers from online attacks, few
photo was removed from the website within smartphone users install specialist smartphone
hours, a set of computer automated design security software and are therefore at risk of
(CAD) files had been uploaded to the internet fraud through malicious websites and phishing
in an equally short amount of time, with 3D attacks. Although dedicated store apps offer a
printed keys produced and successfully used to level of protection, not all companies have their
open TSA locks the same day. own apps and a large amount of trade is still
A recent report7 from the information carried out through browser-based shopping.
technology research and advisory company There are a number of accreditation schemes
Gartner predicted that the emergence of designed to enable safe internet shopping,
3D printing will create major challenges with including Brand-i10 (a shopping directory that
regards to intellectual property (IP) theft, only lists webstores selling genuine products),
resulting in a loss of “at least $100 billion per VeriSign Trust11 (a seal awarded to the website
year in IP globally” by 2018. New safeguarding when the company’s identity has been verified
techniques are required to counter the threat and the site has passed daily tests for malware),
from this novel technology. One possible and the Trusted Shops scheme12 (an online shop
solution has been put forward by the US certification system resulting the display of the
CONSUMER PRODUCTS

CASE STUDY

CONSUMER PROTECTION
AND SOCIAL MEDIA

T
MIKE ANDREWS, National Trading Standards eCrime Team

here is little doubt that efforts consumers to potentially significant risk of


to confront intellectual property injury.
(IP) infringement have seen The ultimate destination of the products
major changes in recent years. was traced to a warehousing and storage
Traditionally, Trading Standards was, quite facility in the south-west of England. Following
rightly, focused on counterfeit products being the execution of an entry warrant, further
offered for sale at car boot sales and local significant quantities of similar products were
markets. While this does still take place, the uncovered along with business records and
past decade has seen a significant shift towards various electronic devices such as laptops
online infringement. Initially centred on auction and mobile phones. As is routine in Trading
websites, this has moved in the past few years Standards cases, the electronic devices
towards social media. Indeed, the most recent were examined by digital forensic specialists
IP Crime Report1 makes specific reference to within the eCrime Team – a key component 147
the significant opportunities and challenges in successfully identifying and prosecuting
that social media present. Figures published offenders.
in the report show that products sourced Digital forensic examinations regularly
from social media are now the second-largest uncover evidence of the products’ supply
source of reports made to Crimestoppers chain; communications concerning their
regarding IP infringement. An unfortunate purchase; and evidence of the intended outlet
side-effect of this increase is an associated for the products. This is not only vital in
increase in issues of product safety. There securing successful prosecution outcomes,
are numerous recorded incidences of serious it is also a rich source of intelligence when
injury and even death associated with the sale trying to identify the wider organised crime
of counterfeit products bought online. networks that are known to be associated
A recent case investigated by the National with counterfeiting. In this case, the forensic
Trading Standards eCrime Team (NTSeCT) analysis uncovered details of the product
highlights the growing phenomenon of manufacturers in China, the shipping company,
products sold through social media. Initially, a the importer and evidence to indicate that the
quantity of potentially IP-infringing products products were ultimately destined for retail
was uncovered through the diligent work online through social media. This intelligence
of Trading Standards officers at one of the helped Trading Standards to prevent further
por ts of entry on the south coast of England. shipments from entering the UK, while
Intelligence suggested the products were ensuring that products already in the country
destined for sale online, so the case was were destroyed and prevented from entering
referred to NTSeCT. The products recovered the supply chain.
included various cosmetics, manicure kits and
associated electrical devices (nail-gel dryers
and electric nail-files etc). The electrical
products were of particular concern because
they were specifically intended for use in nail
salons, which would then expose countless
FORENSIC SCIENCE: BEYOND THE COURT

CASE STUDY

BLOCK CHAIN: AUTHENTICITY


AND PROVENANCE

P
JESSI BAKER, CEO of Project Provenance Ltd

roduct supply chains are often cryptographic signatures. Crucially, these


complex and opaque. It can be blocks are shared across a global peer-to-
difficult to prove where materials, peer network. This provides an open data
ingredients and products have platform that can deliver neutrality, reliability
come from, or how they were created. Up and security.
and down supply chains, there is a call for The basic block chain mechanism was
more transparency and an increasing demand originally proposed as par t of a solution for
for products with proven origin. Information administering the shared accounting ledger
about how products are made and used can underlying Bitcoin. Beyond this financial
inform better purchasing decisions – based application, block chains can be generalized
on more than just their price, quality and and used to implement arbitrary digital
brand – but that information needs to be contracts that no one – neither the users
148 both available and trusted. nor the operators of the system – can break.
This end-to-end transparency is almost This makes block chains a unique platform
impossible to achieve with existing systems, for applications involving multiple par ties
because the information would have to with little trust in each other : for example,
be pooled into large data silos. This has fragmented product supply chains or
technological, economic, and organisational complex chains of custody.
limitations: One key attribute of block chains that
• Pooling data creates a single point of make them well suited to storing and
weakness and failure that also acts as a transferring material is the public/private key
bottleneck; it can also lead to potential infrastructure. It mimics a physical signature
biases and selective disclosure by provably registering an identity with a
• The future costs of such data silo projects digital document or instruction, without
are highly opaque, and joint initiatives are giving others the ability to reproduce those
often impractical because there is little signatures. Consequently, it is possible to hold
incentive for individual par tners to join a small piece of data (known as a secret, or
when they can freely benefit from the private key), and use it to demonstrate that
results – for example, in a sprawling food you have explicitly sanctioned a par ticular
supply chain where middlemen may fear piece of information (a document, image,
being cut out if data is exposed order or other such digital item) without
• Par tners may fear an undesired disclosure ever uncovering that secret to another par ty.
of critical business information, causing a Provenance has developed a block chain
loss of competitive advantage to handle supply chain data. Suppliers,
• NGOs or third par ties that could be manufacturers, brands and cer tifiers can
commissioned as a neutral operator often employ this framework to access, publish
lack the technical exper tise to do so and transfer records of ownership of physical
assets, along with key information about their
Block chain technology now offers a solution. creation, transformation or ownership. This is
A block chain is a form of database that linked to physical items with smar t tags and
groups data into blocks, and links them using IDs (e.g. barcode and batch number).
CONSUMER PRODUCTS

European Trustmark). Research is needed to


ascertain whether a universal verification scheme
is achievable across all platforms: that would
require close collaboration between regulatory
bodies, banks, retailers and phone manufacturers.
Improving the security and veracity of supply
chains, through the use of advanced new
technologies, requires investment in innovation.
The first steps in this space were made with
the advent of radio-frequency identification
(RFID) technology, and stamping of goods
This framework provides an immutable, with holographic logos. Further advantages for
public (although pseudo-anonymous) increasing the efficiency and effectiveness of
record that is interoperable across all data operations within the supply chain are afforded
systems. It is also auditable, cost-efficient, through the use of block chain technology,
and offers guaranteed continuity because for example (see case study p148). Lab on a
it is independent of any single company or chip (LOC) technology, combined with the
data operator. This allows the authenticity rapid expansion of smartphone technology,
or provenance of an item to be tracked has shown great promise in transforming
along even the most complex chain of the biomedical landscape13. In this case, the
custody. analysis environment is shifting: from centralised
laboratories with long turn-around testing
routines, to point-of-care diagnostics that
INFORMATION ABOUT almost instantly put information into medical 149
HOW PRODUCTS practitioner’s hands. The same type of
technology could be leveraged to produce a
ARE MADE AND USED similar revolutionary change in the detection
CAN INFORM BETTER and policing of counterfeit goods.

PURCHASING DECISIONS CONCLUSION


– BASED ON MORE THAN In tackling the ever-growing issue of consumer
fraud, we should be mindful that advances in
JUST THEIR PRICE, QUALITY manufacturing and communications technology
AND BRAND – BUT THAT presents opportunity not just to the criminals
producing and distributing counterfeit goods,
INFORMATION NEEDS but can also stimulate significant growth within
TO BE BOTH AVAILABLE genuine markets.
By creating the right conditions within the UK
AND TRUSTED. to facilitate innovation in the area of forensic
evaluation of consumer goods, as well as expert
consumer protection services that can call upon
these to react to criminal threats, we create
value for the UK manufacturing market.

The authors would like to thank Kent Scientific Services and The
Anti-Counterfeiting Group for their assistance with the research for
this chapter.
FORENSIC SCIENCE: BEYOND THE COURT

CHAPTER 14

ENVIRONMENTAL FORENSICS
IAN L. BOYD We breathe, eat and drink other people’s pollution. Yet it has proved difficult to
Chief Scientific design market solutions to deal with this equitably, so that the individuals who cause
Adviser, Defra environmental degradation carry the costs of those actions. To promote good
environmental outcomes, micro-innovation in measuring environmental variables needs to

F
be matched by macro-economic innovation to build market-based solutions.

orensics is not a discipline commonly The rationale for setting environmental


associated with environmental issues. standards and measuring compliance is strongly
Whether tracing the source of driven by the concept of equity. Around half
environmental pollution based on a of some air pollutants in the UK come from
chemical signature or holding a nation to account other parts of Europe1 – and, of course, the UK
for its non-compliance with internationally-agreed contributes to the air quality problems of other
standards (e.g. in trans-boundary pollution), this European countries. Water contaminated by
requires measurements to assess whether the sewage washed out to sea has the potential to
law has been broken. In broad terms, this can be contaminate seafood, which could be distributed
described as ‘environmental forensics’. widely through the food chain. The choices
This chapter is addressed to policy developers, people make about how to dispose of waste can
regulators and NGOs. Like other developed have widespread effects, sometimes with long
countries, the UK is on a journey from time lags between the release of pollutants and
150 understanding that it is essential to regulate the the ultimate effect, and this has become an issue
effects that people have on the environment, driving global politics when it comes to different
to understanding how regulation can be national responses to the need to reduce carbon
implemented most effectively and efficiently. emissions.
UK environmental law is largely led from the We breathe, eat and drink other people’s
European Union, and the legal process has pollution. The ‘tragedy of the commons’ has a
not proceeded much beyond the imposition powerful presence across the environment. It
of legally-binding regulation, often measured has proved difficult to design market solutions
against standards and targets. Prevention to deal with these issues of equity, so that the
through improved behaviour would be a better individuals who cause environmental degradation
mechanism than regulation, but moving social and carry the costs of those actions. Indeed, costing
cultural norms to a position where environmental environmental degradation is itself difficult. It has
protection is part of the reward structure is still become a duty of government to hold polluters
a long way off. This chapter sets out where the to account for their compliance with standards
challenges lie for achieving this transition, and the of behaviour designed to try to account for
role of science in driving this progress. these costs.
The market itself is unsympathetic to this need
and the activities to cost them through regulation
WE BREATHE, EAT AND DRINK OTHER for public good are often one step behind market
innovations. Even establishing strong principles
PEOPLE’S POLLUTION. THE ‘TRAGEDY such as ‘the polluter pays’, which forms a basis of
OF THE COMMONS’ HAS A POWERFUL European environmental law, has a mild effect on
this process. There is a need to better align the
PRESENCE ACROSS THE ENVIRONMENT. common goods derived from the environment
IT HAS PROVED DIFFICULT TO DESIGN with market behaviours.
Measurement is at the root of providing
MARKET SOLUTIONS TO DEAL WITH assurance around compliance with standards,
THESE ISSUES OF EQUITY. and for invoking direct action to detect and
remedy environmental problems, sometimes
ENVIRONMENTAL FORENSICS

by prosecuting offenders. These measurements would be an important feature of any market-


span traditional forensics and involve: provision based mechanisms applied to a more generic
of post-hoc proof of illegal action, such as form of regulation. For the time being these
the release of toxic chemicals; preventative mechanisms largely do not exist, so it is for
monitoring through regular measurement and governments to safeguard the benefits through
reporting of compliance against a standard; and statutory, voluntary and regulatory mechanisms.
provision of evidence used to inform decisions This has led to the development of a doctrine
about environmental permitting. of market intervention in order to design
Forensic methods also apply where there is a environmental resilience.
need to control the emergence of bad outcomes. There is now a long and contentious history
The investigation that led to the understanding about how the safeguards have been built in to
of bovine spongiform encephalopathy (BSE) European and national legal and administrative
involved detailed analysis that ultimately enabled instruments, such as European Directives.
the detection and control of the disease agent. A A similar process has happened within the
similar kind of investigation led to the discovery of United States. The contentious nature of the
the tropospheric ozone hole and the subsequent issue has largely revolved around the absolute
establishment of the Montreal Protocol, which and relative valuations that different sections
regulates the release of ozone-depleting chemicals of society have placed on the environment.
in to the atmosphere; and to the identification of Individual actors operating rationally but with
tributyltin (TBT) as a potent endocrine disrupter, self-interest are rarely rewarded for acting in
which has now been eliminated from anti-fouling the wider public good. The lack of an agreed
paints used on ships. Forensics merges almost basis for constructing objective valuations of
imperceptibly with investigative epidemiology and environmental goods leaves a lot to play for, often
environmental science. seen in political debates that continue to the 151
present.
WHY TAKE A FORENSIC APPROACH Government regulation to prevent the
TO THE ENVIRONMENT? misallocation of environmental resources is
We value the environment for the benefits consequently a very blunt instrument. The
it provides. These benefits take many forms, resulting complex mesh of environmental
including the goods and services from the regulation has the characteristics of an over-
environment that support our health and welfare. engineered construction produced by designers
According to the Office for National Statistics who neither understood the forces they were
(ONS), nearly one-quarter of the net worth of attempting to control, nor the materials used
the UK is accounted for by the environment, to build the structure. Arguably, the designers
although this is likely to be only a partial view of were also unsure of the structure’s purpose. In
its true worth because it is difficult to estimate the absence of a common currency for valuing
the non-market values derived from the (and possibly trading) environmental assets,
environment. there is now a plethora of different variables
Recent work under the National Ecosystem used as end points, or objectives, in themselves.
Assessment2 and by the Natural Capital
Committee3 has gone a long way to improving
explicit valuation of the environment in ways that
could eventually result in environmental assets
appearing as part of a national infrastructure
balance sheet. In the long term, one objective
would be to build market-based mechanisms
to sustain environmental benefits. The corollary
of such a mechanism is that there would also
be mechanisms to cost the impact of different
activities on the environment, based on the rate
at which they would deplete the environmental
asset base. Ensuring that people pay this cost
FORENSIC SCIENCE: BEYOND THE COURT

CASE STUDY

ENVIRONMENTAL DNA ANALYSIS


FOR WILDLIFE CONSERVATION

S
PETER BROTHERTON, Director of Specialist Services and Programmes, Natural England

ome wildlife species are hard to find. £1000 per pond1. Natural England was quick to
When elusive creatures are also in approve the new technique, and industry was
decline and strictly protected under quick to respond. Over 2500 eDNA tests were
European law, difficulties in detecting carried out in 2015, suggesting that businesses
them can be problematic for conservationists are likely to have saved over £2 million in survey
and businesses alike. One such species is the costs this year alone thanks to the introduction
great crested newt (Triturus cristatus), our most of the eDNA test; time-related savings are likely
charismatic amphibian. Great crested newts to be even more significant. A growing number
have declined across Europe due to losses of of laboratories are also coming forward to offer
their ponds and other habitats, but they are still the test.
widespread and locally common in some parts Innovation feeds innovation. Our ability to
of the UK. As a European Protected Species, it is more easily detect great crested newts has
152 an offence to kill, injure or disturb great crested made it possible to engage the public in the first
newts or damage their habitat. To avoid com- national survey of the species, begun in 2015.
mitting an offence, businesses are required to Even more significantly, Natural England is now
assess whether they are present in any suitable working with local authorities to use eDNA to
ponds likely to be impacted by a development. develop a detailed understanding of local great
Traditionally, this assessment has been a skilled crested newt populations. This information will
and time-consuming process: each pond re- enable the piloting of a new, strategic approach
quiring at least four night-time visits during the to the conservation of the species across
breeding period by licensed surveyors who use planning authority areas, doing more to protect
three separate survey methods to search for the and enhance the most important locations
newts. The complexity of this traditional survey for the species, while making it easier for
technique imposes significant costs and delays development to proceed in other, less significant
on developers, while also making it hard to plan great crested newt areas. This transformative
their effective conservation. approach will see a shift in the emphasis of
In 2013, Natural England and the Natural England’s licensing decisions towards
Department for Environment, Food and achieving better conservation outcomes for
Rural Affairs (Defra) supported research to newt populations as a whole instead of seeking
investigate whether emerging environmental to protect newts in locations that are unlikely to
DNA (eDNA) techniques could offer a solution be viable in the long-term. This is good news for
to the problem of surveying for great crested business and good news for newts.
newts. eDNA is nuclear or mitochondrial As DNA detection techniques become more
DNA that is released from an organism into its advanced, we can expect to see a rapid growth
environment, and initial proof of concept studies in wildlife applications, from early detection
had demonstrated that its detection could of invasive species and diseases through to
be an effective survey technique in aquatic understanding soil communities. The innovations
environments. The government-funded study we are achieving with great crested newts are
conclusively showed that eDNA surveys were only the start of this story.
at least as effective as the traditional technique,
while also providing estimated savings of up to
ENVIRONMENTAL FORENSICS

Whether these actually reflect meaningful commonly used today. This doctrine suggests that
outcomes varies with circumstances, but in any changes caused by human presence must be
many cases the connection between these avoided, even if (as in this case) the changes most
and the values placed on the environment probably lie within the normal range of natural
by society are tenuous. These values are variability.
themselves inconsistent and therefore difficult Seen in this context, the direction of travel in
to compare; and, where conflict arises, it environmental forensics – towards measuring
becomes impossible to provide an objective and controlling more and more, at finer and finer
assessment of where priorities should lie. levels of detail, just in case it might be important
The implicit claim made of these variables in future – is clearly untenable.
is that they are surrogates for valuation, but This is the practical consequence of the
this sometimes lacks credibility. For example, ‘Precautionary Principle’, stimulated by a systemic
‘waste recycling’ is a measurement that has pessimism about the ways in which innovation
been treated as an end in itself, rather than can imperceptibly draw down environmental
one possible route to reduce residual waste capital without paying a proper cost, but without
and improve resource extraction. Focus on this also recognising that innovation has a double
measurement is potentially distorting action edge because it is both a threat and a solution.
away from reducing our use of resources and The need for the measurement or monitoring
reusing ‘waste’, both of which are the real of environmental indicators through time was
objectives. initially driven by a sincere search for those
Consequently, the UK is mandated to surrogate indicators within the environment that
measure an immense amount of information most effectively represented societal valuation.
about everything from the chemistry of rivers But this has gradually mutated into a process of
to the number of birds on farmland and the measurement and reporting of data as an end in 153
noise emitted by human activity in the ocean. itself, which supports the doctrine of designed
Efforts to focus attention on the features that resilience, often closely associated with the
genuinely inform us about the health of the doctrine of hazard avoidance. Both are hungrier
environment have been hampered by a lack of for evidence showing compliance to potentially
underlying knowledge about their impacts. For flawed standards than they are for evidence to
example, we know almost nothing about the improve the basis upon which those standards
consequences of man-made noise in the ocean, are designed. Across Europe, feeding the resulting
but we have created binding commitments to appetite for environmental data is now an
measure noise within certain sound frequency industrial-scale process requiring governments to
ranges – without even knowing whether those establish bodies like the UK’s Environment Agency,
frequency ranges are important, or what the which also has regulatory powers. At European
dose-response might be. In this particular scale, coordination and thought leadership is in the
case, we do not even know how the response hands of the European Environment Agency, while
might manifest itself, whether in fish, marine regulation sits with the European Commission.
mammals, plankton, corals, jellyfish, or seaweed. The data are used to prosecute the miscreants – a
Noise could affect any or none of these species, process known within the European structure as
and there is even uncertainty about whether ‘infraction’ – and to produce reports intended to
we need to study populations or individuals illuminate the state of the environment4. Some, like
in this context. The rationale for actions like the volume ‘Late Lessons from Early Warnings’5,
this hinges on the hazard-avoidance doctrine seemed intentionally designed to magnify the

THE UK IS MANDATED TO MEASURE AN IMMENSE AMOUNT OF


INFORMATION ABOUT EVERYTHING FROM THE CHEMISTRY OF RIVERS
TO THE NUMBER OF BIRDS ON FARMLAND AND THE NOISE EMITTED BY
HUMAN ACTIVITY IN THE OCEAN.
FORENSIC SCIENCE: BEYOND THE COURT

THE ABILITY TO REPORT MEASUREMENTS IN REAL TIME, AND AT A


REDUCED COST, IS MAKING SOME DATA MORE ACCESSIBLE, HELPING
DECISION-MAKING AT ALL LEVELS OF SOCIETY AND MOVING US
TOWARDS THE GOAL OF ENSURING THAT PEOPLE HAVE THE
INFORMATION THEY NEED

negative consequences of not adopting the more likely to achieve a culture of deterrence
doctrines of hazard avoidance and designed and build a sense of devolved responsibility than
resilience. the former, where there are few incentives for
individuals to take responsibility for their own
PREVENTION VERSUS DETECTION actions. Developing countries would be well
Functional environmental forensics can perhaps placed to benefit from such an analysis when
be seen to bifurcate along two interacting contemplating how to design their own systems
tracks. One track involves detecting and of compliance with environmental standards.
correcting incidents where an agreed standard A potential strength of the doctrine of
has been exceeded (detection); the other designed resilience and investment in prevention
uses feedback from forensic measurements to is the prospect it provides for progressive
change behaviours within society, thus reducing improvement of environmental quality. Ramping
the probability of exceedance in the first place up the thresholds of compliance over time
154 (prevention). has been critical to achieving reductions in
Detection is usually linked with operational residual waste, improved beach water quality
management to support trade regulations and and reduced vehicle emissions. This can only
protect human health, for example. Prevention be achieved against a background of effective
concerns long-term objectives that seek measurement using standardised methods.
progressive environmental improvement, or One example of the aggregated progress
attempt to prevent the slide towards declining enabled by this approach can be found in
baselines of environmental quality, a process improvements in air quality (see Figure 1).
that has been suggested to have happened for Although the speed of change in this and other
marine fish populations. cases is slower than many would wish for, the
Prevention is often seen to be the most rate of change is probably proportional to
cost-effective option; the very high costs of the rate of evolution of the delivery process.
environmental remediation often mean that This, in turn, is a complex function of several
investments in prevention are likely to be rate-limiting processes, including the rate
worthwhile. Consequently, the considerable of innovation in technology and business
infrastructure that has emerged to support systems; depreciation and obsolescence of
prevention within Europe probably has a strong past investments; and the discounting applied
economic rationale, although this has not, as to the future benefits derived from current
far as I am aware, been tested adequately investments. However, none of these would
against any counterfactual. The current range operate effectively unless there was a system
of different infrastructure and bureaucratic for setting evidence-based standards, and the
solutions applied to environmental regulation field of environmental forensics provides this
across the developed world provides an foundation.
opportunity to build a better understanding of
the relative merits of investment in detection WHAT SHOULD BE MEASURED?
and prevention. It is a moot point whether The environment is a complex place, with
prevention is always more effective than a many variables that could be measured to
combination of risk-based detection and assess compliance, control outcomes and adapt
proportionately large penalties. The latter is to emerging challenges. Environmental data
ENVIRONMENTAL FORENSICS

Figure 1: Annual emissions of major air pollutants relative to levels in 1970 (ref. 1). Solid lines show the measured relative
emissions. The introduction of measured standards and targets has been an important factor in achieving improvements in
air quality.

140

120

100
Index Line
Ammonia (1980=100)
Index (1970=100)

Ammonia
80
Non-methane
volitile organic
60 compounds
Nitrogen
Oxides
40

PM10
PM2.5
20
Sulphur Dioxide

0 155
1975 1980 1985 1990 1995 2000 2005 2010

are becoming increasingly accessible through carcinogenic. Because we can now measure
automated measurement and new sensors. glyphosate in food and other environmental
The ability to report measurements in real products to extraordinary precision, it follows
time, and at a reduced cost, is making some that we are increasingly aware of its presence
data more accessible, helping decision-making at very low doses. However, this does not
at all levels of society and moving us towards equate to the presence of a pharmacologically
the goal of ensuring that people have the important dose, and this point is often ignored
information they need to make decisions based by those making these kinds of claims.
on the costs of their actions. Increasing volume, The DPSIR (driver, pressure, state, impact,
accessibility and precision of measurements response) framework has provided a further
presents challenges to this goal, because data guide to the construction of environmental
are not equivalent to information for those measurement and the application of regulation.
without the expertise to interpret the data. DPSIR captures the concept of cause-effect,
Greater precision means that dose can be which is probably not sufficiently central to
measured to phenomenally low levels, but that thinking within the field of environmental
precision is not necessarily matched by the forensics. In principle, it is better to regulate the
same level of understanding of dose-response driver that creates an environmental pressure,
at these low levels.
The doctrine of hazard avoidance tends
to perpetuate and amplify ignorance of DNA IN THE WIDER ENVIRONMENT
the importance of dose. For example, it is CAN PROVIDE EVIDENCE OF THE
attractive to some environmental pressure
groups to play strongly on the recent PRESENCE OF KEY CRYPTIC SPECIES AT
assessments concluding that glyphosate, A SMALL FRACTION OF THE COST.
a commonly used herbicide, is probably
FORENSIC SCIENCE: BEYOND THE COURT

because it is earlier in the sequence of causation. TYPE AND QUALITY OF


The problem for many regulators is that MEASUREMENT
causation is often poorly understood, and the Technology is driving innovation in environmental
public perception of causation in contested forensics in the same way as it is in other
areas is susceptible to propaganda – as has forensic applications. Harnessing the power
happened with the controversy around of non-targeted analytical techniques such as
changes in populations of pollinators. In this metagenomics, isotope analysis, DNA finger
case the public perception is that some forms printing and next-generation sequencing is
of pesticide are responsible for declines in bee essential (see Chapter 10).
populations, whereas it is much more likely These can be applied to a wide range of
that a wide range of factors are responsible, approaches, including understanding the sources
including weather, long-term trends in land and legality of supply of food to timber and fish6.
use, increasing disease and poor data about DNA in the wider environment can provide
pollinator populations, as well as pesticides. evidence of the presence of key cryptic species at
That makes it difficult to develop regulations a small fraction of the cost of previous methods
that will help pollinator populations to (see case study on p152). Further examples
recover : not only are there many contributing of progressive technological improvements
drivers, but there is also uncertainty about include: rapidly increasing availability and spatial
the actual direction of change in many of and temporal resolution of Earth-observation
these populations, and there are asymmetrical data at declining cost; and intelligent, statistically-
views about causation amongst some of the robust sampling designs that make measurements
stakeholders who need to be persuaded to cheaper and more effective, and which allows
adapt their behaviour. In this case, forensics adjustment of precision to be scaled to the
156 provides the evidence that will shift behaviours appetite for risk.
in such a way as to achieve the objective – by The way in which the UK implements air
distributing the costs among those who value quality measurements is an example where
the benefits brought by pollinators, and by a sparsely distributed network of monitoring
incentivising those whose valuation is lower stations is supplemented by modelling of the
than the cost they would have to pay to dispersal process for different chemicals and
adapt their behaviours. These incentives are particles. This approach merges accurate, site-
often provided through direct payments for specific monitoring data with metrological
specific activities, as happens in environmental models. This system remains compliant with EU
stewardship schemes delivered under the regulations but costs significantly less to support
Common Agricultural Policy. than other more extensive air quality monitoring
The case of pollinators is perhaps an networks in other EU member states.
example of how market-based solutions may Genomics methods are used to help direct
tend to emerge in future. Public concern action, rather than to apply standards to improve
becomes reflected in a shift in the valuation water quality. This is especially the case when
of an environmental asset, leading to a greater distinguishing human and animal bacteria on
proportion of people being willing to carry a bathing water pollution, and the methods can
cost of supporting the asset. A similar process now also distinguish animal species, allowing more
may have begun with air quality. However, in targeted management responses at local scales.
each case there is a need to present good Greater capability to measure also has a double
quality evidence to the public in ways that edge. Forensic investigation of the presence
they can understand and act upon. of viruses and bacteria in shellfish, based on

THE MOVE TOWARDS BETTER, CHEAPER, SMALLER AND LOWER-POWER


SENSORS HAS THE POTENTIAL TO REVOLUTIONISE ENVIRONMENTAL
MEASUREMENT AND, WITH IT, TO CHANGE ENVIRONMENTAL FORENSICS.
ENVIRONMENTAL FORENSICS

genetic signatures, has driven a discussion about AS A FIELD, ENVIRONMENTAL FORENSICS


higher standards for shellfish flesh that would
impose significant impacts on the industry. HAS EXPANDED RAPIDLY IN THE PAST 30
There is no method for distinguishing live or YEARS AND IS NOW SUPPORTED BY AN
infectious material from dead or non-infectious
material, and deeper investigation often shows INDUSTRY THAT GENERATES THE
that tell-tale fragments of viral DNA do not FORENSIC DATA REQUIRED TO ASSESS
represent the presence of ‘live’ virus. Similarly
when Cryptosporidium entered the water supply THE ENVIRONMENTAL PERFORMANCE
to over 300,000 homes in Lancashire during OF EVERYTHING FROM INDIVIDUALS TO
August 2015, the local water company issued
a ‘boil notice’. There were no cases of illness MULTI-NATIONAL GOVERNANCE
that could be linked to the contamination, and PROCESSES, OR MACHINES TO ENTIRE
there was a strong suspicion that the oocysts
of Cryptosporidium, a protozoan parasite, were INDUSTRIAL PROCESSES.
unviable. Again, the detection methods had a high
sensitivity, but a low capacity to distinguish the
viability of the infectious agent.
The move towards better, cheaper, smaller to seek) market solutions that help to couple
and lower-power sensors has the potential to individual incentives to broader public goods
revolutionise environmental measurement and, derived from the environment. While the
with it, to change environmental forensics. Taking processes in place have been built for very sound
the laboratory to the field, and disseminating and pragmatic reasons, there is a need to shift
information from sensors embedded in everyday towards more risk- and market-based solutions. 157
devices such as cars and phones, will place the There will always be a need for regulation
power of detection and analysis in the hands of and statute in this field, and a strong role for
many more people. This will help to transfer government, but the nature of environmental
the power to make informed decisions closer to forensics needs to change. The current system,
those for whom the costs and benefits matter illustrated by the approaches adopted in
most, and could incentivise behavioural choices Europe and to some extent the United States,
in ways that reward individuals for working in the is arguably unaffordable in the long term,
common good. If car drivers had access to simple especially if it was to be rolled out across the
air quality measurements about their own car’s developing world. Technology innovation can
contribution to air pollution, it would probably help to sustain the system, by delivering more
create a very different culture of car ownership, data at greater precision closer to the events
and manufacturers would respond accordingly. that affect behavioural choices. But the down
sides associated with the interpretive capacity of
CONCLUSION decision-makers needs to be addressed through
Environmental forensics provides the supporting sophisticated information delivery processes.
evidence for a complex set of legislative, Micro-innovation in measuring environmental
regulatory and voluntary instruments that variables needs to be matched by macro-
support many of the normal functions within economic innovation to build market-based
society. As a field, environmental forensics has solutions. Internalising and accounting for the
expanded rapidly in the past 30 years and is now economic costs of alternative actions for the
supported by an industry that generates the environment – while providing forensic evidence
forensic data required to assess the environmental to support this approach – is most likely to be
performance of everything from individuals to the best way forward. Transitioning developed
multi-national governance processes, or machines economies such as the UK to this alternative way
to entire industrial processes. of working needs leadership and vision.
This rapid growth has been driven by the
joint doctrines of hazard avoidance and designed
resilience, a result of the failure to find (or even
FORENSIC SCIENCE: BEYOND THE COURT

158
SECTION 4:
SECURING THE FUTURE OF
UK FORENSIC SCIENCE
SECURING THE FUTURE OF UK FORENSIC SCIENCE

SECURING THE FUTURE


OF UK FORENSIC SCIENCE

The global market for The UK has a long-standing


traditional forensic science reputation for being at the
is predicted to reach forefront of forensic science
innovations, including
$17.7 billion developing fingerprinting
and DNA profiling.
by 2019. Digital forensics
promises further growth.

160

By 2020, there will be an estimated In-built security systems

5 billion
internet users and up to
could be developed that
connect smartphones to the
authorised user through

100 billion
connected devices worldwide.
digital biometrics. This could
be used to investigate
criminal activity.
In the future, we may be able to
identify a person’s activity or where
they have been by studying microbial
communities in their bodies, known
as the ‘microbiome’.

Advances in technology
that allow the human
genome to be mapped
in hours rather than
weeks will accelerate
The high cost and judicial the availability of
impact of failing to meet genetic information.
standards means forensic
techniques must be
validated and backed by 161
a strong evidence base
before being used.

Miniaturisation and
innovations such as
RapidHIT DNA or
paraDNA will bring
conventional laboratory
techniques closer to
crime scenes and speed
up the identification of
offenders.

Forensic investigators will


use ‘big data’ gathered
from the Internet of
Things and different
databases, using algorithms
to give advance warning
of events.
SECURING THE FUTURE OF UK FORENSIC SCIENCE

CHAPTER 15

FUTURE APPROACHES IN
ANALYTICAL SCIENCES
By 2025, forensic science will be transformed by large-scale data analysis, automation, novel analytical techniques,
and digital forensics. The UK has the potential to be at the forefront of these developments if basic science,
commercial technology development and government policy can be better coordinated.

NPCC FORENSIC SCIENCE AND FORENSIC SCIENCE SPECIAL HOME OFFICE


INNOVATION BOARD INTEREST GROUP DR STEVE BLEAY
NICK MCCOY, DR BARBARA DANIEL, DR NEIL COHEN
Head of Forensic Services,Warwickshire Kings College London PROFESSOR DICK LACEY
Police and West Mercia Police IAN ELKINS, SHAUN MALLINSON,
KEVIN MORTON, Crown Prosecution Service Partnerships and Funding
Director of Regional Scientific Support PETE MERRILL, Coordinator, CAST

L
Services,Yorkshire and the Humber Head of Sciences, National Crime Agency

ooking ahead to 2025, what are the • Admissibility: If the technique is to be used for
new technologies that are likely to purposes other than investigation, it needs to be
impact upon forensic science and its legally admissible within the rules of evidence
162 ability to keep pace with – or ahead • Affordability: While this should not be a barrier to
of – new forms of criminal activity? What is the delivering safe and secure justice, the cost of the
best way to manage that innovation? And how technique relative to the challenge it is meeting
can UK businesses benefit from innovations in is an important factor (you would not expect
forensic techniques? This chapter will address these expensive analytical time to be used for low-level
questions by considering the following points: minor crime, for example).
• The future technological trends that will help to
tackle criminal threats, and the changing face of Perhaps the largest transformation in forensic
crime, out to 2025 science over recent years has been the reduction
• The new sciences that might be relevant in the costs of analytical services. This has been
• The use of a wide range of digital traces to delivered through a blend of more effective
determine who is where, and when procurement and advances in automation and
• The challenges presented by new technologies, miniaturisation, as well as a much sharper focus on
and whether there is a point at which advances the needs of the end user. In this environment, this
in science become counter-productive trend will need to continue to provide comparable
• Automation of forensics and the wider legal services that are affordable, as well as developing
system, along with the impacts of managing large opportunities to be more effective and innovative
volumes of data in the way forensic science can be utilised as a
tool for public safety. There is a significant risk that
There are also several critical factors that we the drive to reduce costs will impact on future
need to consider when emerging technologies or capability, with limited investment in research and
sciences present opportunities to enhance public development activities. Short-term cuts in forensic
safety. These are: research and development will inevitably lead
• Credibility: Is the proposed method a credible to longer-term problems. The community and
technique that can be validated for use in the government should be considering the end-to-end
context of a legal arena, both criminal and civil? process of forensic techniques and the associated
• Accessibility: In order for the technique to be investments required to ensure that there is a
used, it should be accessible to legal professionals sustainable research and development capability.
from both a prosecuting and defence basis The UK has had a long-standing international
FUTURE APPROACHES IN ANALYTICAL SCIENCES

reputation for being at the forefront of forensic WITHOUT DOUBT, TECHNOLOGY


science innovations: for example, the application of
DNA in a criminal investigation and enhancement WILL PLAY A SIGNIFICANT ROLE IN THE
techniques for fingermarks, and it is of obvious FUTURE OF FORENSIC SCIENCE AND
importance that this should be maintained and
enhanced. HOW IT IS USED IN BOTH CIVIL AND
CRIMINAL APPLICATIONS. .
FUTURE TECHNOLOGY TRENDS
Without doubt, technology will play a significant
role in the future of forensic science and how it
is used in both civil and criminal applications. The in forensic investigations.
exponential growth of accessible electronic devices In the future, forensic investigators will be
has touched every aspect of everyday life, from gathering much larger amounts of data with far
the way we communicate through to business more complex analytical techniques. This is often
transactions that never see human interaction. referred to as ‘big data’, and it takes large amounts
While these advances bring opportunities, they of conventional processing power to convert
also come with the potential for risk and harm to this data into useful information. In complex
anyone engaged in using them. investigations this often exceeds current capability,
The speed of change in computer technology and the future of large-scale data analytics could
shows no sign of decreasing. Developments in be in grid computing, which is distributed across
mobile devices and storage technology now mean multiple processing facilities and unlocks rapid data
that data is no longer always stored on a dedicated analysis for investigators. Although this is probably
device but can be distributed over a variety of beyond the scale of high-volume crime (such
networks and devices located anywhere. This as burglary), it will be used in counter terrorism 163
development of cyber-based devices shows no and serious and organised crime. Add to this the
sign of slowing down. It is very difficult to predict potential of cognitive computing, which will make
where, for example, social media will develop in the autonomous decisions without human intervention;
next ten years, but it will clearly be operating at a as a result, many forensic processes providing
different level to that experienced today. There is interpretive evidence could be speeded up through
currently a global internet population of 2.4 billion automation, removing human error rates and
users that sends around 204 million email messages increasing efficiency.
and searches Google 4 million times every minute. There are already forensic identification
By 2020, there will be an estimated 5 billion processes in place using ‘lights out’ approaches,
internet users and up to 100 billion connected such as the confirmation of identity by checking
devices worldwide, representing a step change in ten-print fingerprint forms in the criminal record
the use of technology1. collection without any human intervention. In
These internet users will be linked through the addition, the ability to fuse datasets together,
internet of things (IoT), a vision to connect physical combining information from different databases so
devices and objects to a network that allows that they can be handled by a single analytical tool,
remote monitoring to gather information (see case will enable the interrogation of information across a
study p170). This trend towards connectivity of wide range of sources. The ‘fusing’ of the data could
everyday items will in the future provide links to identify valuable information that would be missed
criminal activity that could pinpoint an individuals’ when considering the data in isolation.
location through wifi, ZigBee, Bluetooth and RFID This will also lead to the development of
monitoring; provide information about physical algorithms that will be much smarter in predictive
characteristics such as exertion; and even monitor computing, able to interpret data in a way that can
personal metabolic information. This interaction start to give advance warnings of events based upon
could be through clothing that incorporates the analysis of a range of data sets. The value to
wearable technology, vehicles, or access control the Criminal Justice System is likely to be in spotting
systems, and there needs to be a balance between trends, particularly when linked with datasets from
public safety and the privacy of the individual to hospitals or social services, for example, to identify
gain public acceptance for using these data sources hidden crimes like child sexual abuse.
SECURING THE FUTURE OF UK FORENSIC SCIENCE

The analysis of data as a science is becoming and provide the potential for 24-hour operating.
more evident in government initiatives such as While robotics will not replace humans, in the
the Data Science in Government programme, future they have the potential to make processes
which emphasises the importance of a structured more efficient and effective.
approach and wider involvement of those outside
the traditional forensic communities. As the NEW SCIENCES RELEVANT TO
volumes of data increase, our understanding of FORENSICS
the complexities needs to grow concurrently. The In many cases, forensics sciences can be regarded
potential for poor analysis of large data sets to be as an applied use of a traditional scientific discipline.
masked by computer analytics can be mitigated by The use of DNA in investigations, for example, is
fostering the right blend of skills in those developing taken from conventional biology techniques but with
and performing the analysis. a different application. James Watson and Francis
There is an increasing trend for miniaturisation Crick first described the double helix structure of
of technology that will allow law enforcement DNA in 1953, and the discoveries that followed
and other users to bring conventional large-scale were applied in many disciplines before DNA
laboratory techniques closer to the scene of analysis was first used in a law enforcement context
crime. Examples that are being developed include in 1984.
rapid DNA units that provide one-stop analysis of It is therefore commonplace that the forensic
samples at the scene in less than two hours and world will utilise advances in other areas, because
portable hand held GCMS (gas chromatography- the level of research and development investment
mass spectrometry) equipment for rapid analysis in medicine, defence and food is far greater than
of drugs. These will evolve into more portable in forensic science. Advances in synthetic biology
integrated units that deliver real time information may speed up the process and offer new methods
164 to investigations through immediate on-site analysis of working that are far more efficient than current
linked remotely to databases that autonomously techniques. It may also complicate the analysis
identify people and materials. Improvements in through the introduction of manufactured genetic
energy sources beyond conventional lithium ion material. The challenge is to ensure that the
batteries will enable extended usage without the forensic world reacts to these developments in a far
need to connect to mains supplies. quicker and coordinated manner to maximise the
Advances in robotics offer a range of opportunities they present.
opportunities, including carrying out hazardous In a forensic context, current DNA technology
tasks and thereby reducing the risk of harm to is very effective at determining the probability of
human operators. Examples of this could be the two samples originating from the same source, by
initial assessment of chemical, biological, radiological, comparing a set of common genetic markers.We
nuclear and explosive (CBRNE) incidents using are pushing the boundaries of sensitivity to the point
intelligent robotic ground-based or aerial units with where background information is starting to interfere,
a sensor array that detects a range of hazardous creating complex mixtures that are uninterpretable.
materials and relays analytical information in Although UK forensic standards focus on seventeen
real time back to incident controllers. Other markers, there are around 23,000 genes within the
applications are the expansion of robotics in human genome that we largely ignore. The use of
laboratory and process functions, to automate tasks phenotypic profiling – studying the traits that result
from the expression of genes – is understood in
other sectors, and forensics should harness this
WE ARE PUSHING THE BOUNDARIES to allow the determination of information such
OF SENSITIVITY TO THE POINT WHERE as physical characteristics, susceptibility to medical
conditions and perhaps even behaviours.
BACKGROUND INFORMATION IS Advances in next-generation sequencing (NGS)
STARTING TO INTERFERE, CREATING technology currently produce information at a
greater rate than the computer processing can
COMPLEX MIXTURES THAT ARE deal with, so there will be a need in the future to
UNINTERPRETABLE. develop a means of processing large amounts of bio-
informatics data. The advances in technology that
FUTURE APPROACHES IN ANALYTICAL SCIENCES

allows the genome to be mapped in hours rather


than weeks will accelerate the availability of rapid
THE POTENTIAL IS THAT IN THE
genetic information. One of the significant barriers FUTURE WE MAY BE ABLE TO
is the ethical implications of further genetic sample IDENTIFY A PERSON’S ACTIVITY BY
analysis, which could provide sensitive information
that needs to be managed carefully. But the science THEIR MICROBIOME
does open up opportunities never seen before.
The analysis of biological material to determine its
origin is a valuable tool. However, there is potentially
even more information to be gleaned from ingredients of the sample. Although this will impact
biochemical analytical techniques that can identify evidence recovery, the wider societal benefits needs to
substances in secretions and other body fluids. The be considered. Conversely, products such as powders
future will bring us smaller portable equipment, such can be engineered at the nano-scale to be far more
as portable Raman infrared devices with live links to effective that conventional micron-sized powders
real-time libraries of source material, that will enable which increases performance and will become the
users to identify not only source material but also routine approach for developing powdering techniques
identify contaminants, building a unique picture of a to recover fingermarks at scenes.
person’s lifestyle and movements. These techniques Imaging has been used in the forensic world since
will also be utilised to consider the provenance of the early examinations of crimes in the 19th century,
samples in terms of origins and sources of material recording and preserving the scene for a range of
e.g. confirmation of genuine pharmaceutical or food different reasons. It enables those not present to
products, which is a growing problem for society visualise the scene from a distance, and the techniques
(see Chapter 12, case study p138; and Chapter 11, adopted over the years have improved significantly.
case study p125). There is now a step change available in bringing the 165
The human body is a complex machine made crime scene to the individual, rather than a physical
up of different cells that each contain copies of visit. The ability to provide a high-definition virtual
the human genome. But the body also contains crime scene using augmented reality that can be
microbial communities, collectively known as the visited by many experts and investigators without fear
human microbiome, which is largely unexplored of contamination or conflict has many advantages.
from a forensic context. We utilise examinations Transmission of information in real-time to
of this nature for the analysis of soil and vegetation investigators and specialists, with direct interaction in
but not for humans, which may provide a unique the examination, will revolutionise scene examinations
and diverse profile of an individual. The potential and prove to be a much more effective means of
is that in the future we may be able to identify recovering and analysing evidence. Other areas of
a person’s activity by their microbiome or even imaging that are emerging are the use of computed
identify where a person has travelled by testing for tomography (CT) and magnetic resonance imaging
characteristics within the microbiome (see Chapter (MRI) for forensic autopsies, which have the potential
11, case study p130). Early studies have been able to reveal far more information that conventional
to link office workers to their keyboards through examinations; and may in future reduce the need for
microbiological analysis, so although this approach surgical interventions, which will preserve the dignity
is still in its embryonic stages, it could offer valuable of the deceased and improve their family’s acceptance
information to end users. However, to exploit the of the investigation.
information available from the biome, we need As well as imaging techniques, we should also
to develop solid reference data sets before this consider imagery and video as a source of evidence
becomes a routine forensic activity. that comes directly from a wide range of sources,
Material sciences bring both threats and including CCTV, body-worn video and unmanned aerial
opportunities to the forensic world. The growing vehicles. Indirectly, there will be access to more imagery
trends of recycling and reusing materials means that from open sources on the internet such as Facebook
products are becoming less ‘pure’ and represent and YouTube uploads. The key issue is that there will
a more blended constituency. This makes it more be more higher-quality imagery available from more
difficult to maintain reference techniques for analysis, sources, which will require improved algorithms and
as they perform differently depending upon the software to deploy video analytical techniques. This
SECURING THE FUTURE OF UK FORENSIC SCIENCE

CASE STUDY

SKILLS AND COMPETENCY FOR

T
ANYA HUNT, CEO, The Chartered Society of Forensic Sciences

he Chartered Society of Forensic National Occupational Standards, while keeping


Sciences (CSFS) is the UK the costs of accreditation to a minimum.
professional body representing In 2004, the FSSoc piloted and launched its
the forensic sciences. With 3,000 Accreditation Scheme, which is now world-
members worldwide, it offers a huge resource renowned. The aim was to map and measure
of knowledge and experience that shapes the the forensic science content of full undergraduate
forensic sciences globally. The CSFS was formed in and postgraduate programmes (level 6–7)
1959 as the Forensic Science Society (FSSoc), and against recommended component standards
was renamed after being granted a Royal Charter that are recognised by industry. This has now
in 2013. The CSFS is at the forefront of standards being expanded to incorporate a recognition and
development, education and training, and is endorsement scheme for courses with a smaller
committed to supporting its members throughout amount of forensic content, and for courses
their career in forensic science. offered at levels 3–5. The overarching aim is to
give students and employers confidence in the
The society has developed a wide-reaching quality and quantity of forensic science educational
166 quality standards framework that includes: provision. While this scheme continues to develop
• An accreditation, recognition and endorsement and grow, the scheme does not attract any public
scheme for setting standards in forensic science subsidies and some valued educational institutions
education find the costs of accreditation preclusive.
• Competency assessment for graduates and
experienced forensic science practitioners COMPETENCY ASSESSMENT
• An extensive and expanding programme of In 2010, following the demise of the Council for
continuing professional development (CPD) the Registration of Forensic Practitioners (CRFP),
conferences and events the CSFS was approached by a number of niche
• A publication bundle with monthly releases of forensic practitioners looking for assurance
peer-reviewed and general interest content for that their discipline and its practitioners were
the dissemination, discussion and evaluation of recognised as professionals by the courts. This led
innovations in the field. to the society developing an ever-expanding suite
of Certificates of Professional Competence. The
The CSFS is a registered charity that receives aim is that individuals work with the society to have
no public funding, and is responsible for supporting their knowledge, experience and skills assessed
the entire forensic community with extremely independently against defined core standards.
limited resources. Indeed, many of its activities The assessment, together with a demonstrable
are unfunded, and rely on the good will of its commitment to CPD, builds towards the individual’s
members. professional portfolio of ongoing competency.
This potentially benefits the entire Criminal
EDUCATION Justice System, yet there are currently no tangible
In the mid-1990s, forensic science degree- resources available that would allow this scheme
level courses were being developed across the to grow. Countries such as the Netherlands have
country, many born out of failing analytical science benefitted from public funding to develop the
departments. As part of its 2004 inquiry ‘Forensic highly-acclaimed Nederlands Register Gerechtelijk
Science on Trial’1, the House of Commons Science Deskundigen (NRGD), or Netherlands Register of
and Technology Committee asked the FSSoc to Court Experts.
develop its accreditation system in line with UK In 2013, the changing forensic science
FUTURE APPROACHES IN ANALYTICAL SCIENCES

then opens up the possibilities of automated real-


time facial recognition, and a more widespread use

THE FUTURE of video analytics.


All the information gathered – whether it is
large volumes of data from genomic sources, right
through to fingerprint information – must be
interpreted in some way to identify an individual.
The volume of data suggests that there will be a
landscape resulted in a large-scale migration change in the standard approaches to calculating
of staff between different organisations in and presenting scientific evidence, for example by
the sector. Forensic employers, police and using Bayesian Networks (BNs). BNs are graphical
private-sector companies asked the CSFS to models that allow reasoning when uncertainty is
find ways to assess the suitability of potential present, even when the interdependence between
new entrants to the forensic profession, different types of evidence is very complex. A BN
based on their balance of educational approach can also model the strength of connection
achievement, skills and experience. As a result, between evidence types and update predictions
the society launched its Pre Employment (sometimes referred to as a probabilistic belief) as
Assessment of Competence (PEAC) scheme new information becomes available. This is just one
this year. The pilot saw 28 forensic science type of statistical model, and their use in general will
graduates undergo a range of assessments increase as it becomes impossible to provide the
to demonstrate their knowledge and skills in degree of uniqueness traditionally demanded of the
realistic case-work scenarios. PEAC is being forensic process by court presentation. An illustrative
well received by industry to assist in their example is the case of fingerprints. Historically,
recruitment process. fingerprint evidence was not presented with any 167
form of statistical basis, but improvements in the
PROFESSIONAL ACCREDITATION understanding of and advancements in statistical
The UK forensic science community is models could improve the way such identification
now more diverse than ever before, with a evidence is used.
mixture of sole traders, small and medium-
sized enterprises (SMEs), large multinationals, DIGITAL TRACES
and in-house police facilities. The Forensic In conventional forensic science, Edmund Locard’s
Science Regulator’s Code of Practice2 specifies principle that every contact leaves a trace is
that all organisations providing work for the fundamental to the application of scientific
prosecution must be accredited to the relevant techniques to connect physical items together. This
ISO standard by 2020. The society is engaged applies equally to the digital world, where at some
with practitioners across the sector to develop point there will be a connection that will leave a
resources to support them in achieving this digital trace. Everyone casts a digital shadow or
goal. footprint though their deliberate or inadvertent
By the end of 2015, for example, the CSFS interactions with technology.
will have a register of consultants (made up This could be as innocuous a carrying a mobile
of its highly experienced members) who will telephone, driving a vehicle, watching a smart TV or
be available to assist others with all aspects of surfing the internet – your presence will be left in
their accreditation journey, including bespoke some way unless you are extremely tech savvy and
support on validation and peer review where make a deliberate intention to block these traces.
such expertise is not available internally. Even then, with the right forensic analytical techniques,
Throughout 2015–2016, the CSFS is also traces can be found with enough effort. In the future,
working with the UK Accreditation Service it might be possible to delve deeper into technology
(UKAS) to develop a realistic, proportionate to reveal even more useful information (see case
accreditation model suitable for SMEs. These study p172). In this context we should consider how
efforts could have wide reaching implications, the forensic examination of these digital traces can be
and have an important role to play in used in delivering public safety.
ensuring a full and varied forensic provision. The trend towards storing data remotely from
SECURING THE FUTURE OF UK FORENSIC SCIENCE

mobile and network-based applications is increasing approvals and authority).


rapidly. The challenge lies in how to retrieve data It is clear that the availability of information from
that is stored in cloud systems and gain a complete open sources such as the internet are becoming
picture, as it may be distributed across different increasingly relevant to routine investigations, not
geographical locations and jurisdictions. There is just in what is considered as cybercrime. It may
a balance to be found between the privacy of well be that a person’s online identity (email or
individual’s data and the needs of law enforcement social media profile, for example) will be a more
to access data. There is active encouragement reliable source of identity than a physical address or
from government for manufacturers to make telephone number. Many people already retain their
devices more secure to reduce theft, but this makes email address longer than a physical address.
the legitimate interrogation of the devices more While conventional biometrics are
challenging. measurements used to uniquely identify a person,
The Internet of Things (IoT) will enable a hyper- digital biometrics are those captured through
connected world in which devices and objects electronic means. This includes voice, hand
interact with each other. The future city will operate geometry (see Chapter 6 case study p68), and
in an environment where the physical, digital and keystroke dynamics, along with the well-used face
virtual worlds converge, and communicate to and fingerprint biometrics. Many of these are
provide information across a range of platforms associated with verifying personal identity, which
connected to sensors gathering data. This volume then allows access to a system or physical space;
of data will provide a mass of information intended it could also be used as an investigative tool for
to make life easier and more efficient, but it also corroboration purposes.
offers opportunities for a safer community. In an
extreme case, this could involve intelligent sensor IMPACT OF AUTOMATION
168 networks that take advantage of connected real- Advances in robotic technology will allow humans
time analysis to monitor for explosive traces in to be removed from a range of forensic processes.
public areas such as transport hubs; or automatically These could be repetitive laboratory processes or
monitoring changes in the home and reporting hazardous tasks that present problems to human
them to a person’s smart phone. This may offer operatives, digital examinations of electronic data or
more novel sources of evidence in an investigation. assessments of CBRNE incidents. There are many
The smart phone of the future will be very positives in automating some activities, but there are
different to that of today. It will evolve into a more downsides: the initial development and outlay costs
flexible, longer-lasting device that brings functions can be expensive, and removing humans from the
that interface with the IoT, offering rapid access process could lead to a deskilling of the workforce.
through the next generations of wireless mobile Although this could actually reduce the costs over
connectivity. In-built security could be developed the whole lifecycle of the automation programme,
that directly connects the device to the authorised it really depends whether there is sufficient appetite
user through a range of digital biometrics, such as to manage the risk of investment.
vein identification or heartbeat monitoring. The Other areas to consider are improved
phone will develop further into a digital assistant productivity, as machines would be able to work
that allows you to control many aspects of life with 24/7 to produce DNA profiles, for example.
verbal communication. These digital interactions Unless the whole process of interpretation and
will leave an electronic trail that tracks your financial identification is automated, however, the initial
interactions, social habits, locations and lifestyle benefits may not be realised. Consistency and
habits, all of which could be interrogated and used reliability will be improved by removing humans
to investigate criminal activity (subject to the correct from these processes, leading to more accurate

EMERGING TECHNOLOGIES AND APPROACHES TO APPLYING SCIENTIFIC


METHODS IN FORENSIC DISCIPLINES CLEARLY OFFER GREAT
OPPORTUNITIES, BUT THEY ALSO BRING CHALLENGES.
FUTURE APPROACHES IN ANALYTICAL SCIENCES

results that are not subject to any form of cognitive THE FIRST USE OF DNA IN A FORENSIC
bias that may influence the decision making process.
The use of robotics and automation of CONTEXT IN 1984 REVOLUTIONISED THE
hazardous processes will enable a far safer working WAY THAT CRIME WAS INVESTIGATED,
environment to be developed. The de-risking
of activities deemed too dangerous for human AND HAS PROVED TO BE A MAINSTREAM
intervention will mean that hazardous crime-scenes TECHNIQUE WITH THE FORMATION OF
– which may not be fully examined today – could
in the future be subject to the same recovery of A NATIONAL DATABASE.
evidence afforded to less hazardous scenes.
One of the areas requiring automation is the
management of large volumes of data that cannot
be effectively processes using current capabilities. As boundaries of sensitivity have been stretched to
we recover and produce greater volumes of data, the point where it becomes increasingly difficult
grid computing will become an important way to to separate the sample from the background
manage this information. mixture. There needs to be careful consideration
that further sensitivity, in its current form, will need
CHALLENGES: NEW TECHNOLOGY advanced analytical software to interpret the
AND SCIENCES complex information present in a sample to ensure
Emerging technologies and approaches to applying that DNA profiling not become counter-productive.
scientific methods in forensic disciplines clearly offer
great opportunities, but they also bring challenges. CONCLUSION
The application of new scientific methods to any The UK has a vibrant science base that has
illicit activity will require the courts to accept these generated many advances in science across 169
methods. This will involve a full validation and a range of sectors. It is clear that there is
accreditation process to provide reassurance to significant opportunity to consider where there
the courts that the technique is fit for purpose and is transferrable science that can be applied in a
sufficiently reliable to, in extreme cases, take away forensic context: for example, the medical and
a person’s liberty for many years. It is therefore agriscience fields are already very advanced in their
essential that the technique is safe, secure and use of Next Generation Sequencing, which the
reliable. The evidence threshold for civil courts is forensic community could learn from. There needs
lower, but the science should still be valid if it is to to be a mechanism that enables the identification
be used. of transferrable science. This could be through
The first real breakthrough in applying science to virtual networks of academic institutions or the
criminal investigations came in the late 19th century, formation of a dedicated research institute across
when fingerprints were used to investigate crime existing capability that considers both digital and
on the basis of their uniqueness. This has been traditional forensic future requirements.
accepted over the years as a primary identifier, and In terms of the functional challenges, any
in the UK we identify roughly 50,000 offenders from significant innovation in forensic science will
crime scenes each year using fingerprints. be disruptive to a certain extent. The key is to
The first use of DNA in a forensic context in consider the benefits against the disruption, and
1984 revolutionised the way that crime was only then can the decision be made. Any innovation
investigated, and has proved to be a mainstream needs to be cost effective in its application, and
technique with the formation of a national database. while early adopters of innovation may pave the
This required a step change in our approach, which way for others, this can be done in a controlled
disrupted business processes, infrastructure manner through structured coordination. This will
requirements, cultural acceptance as well as identify all the issues such as affordability, regulatory
significantly changing the operating model for forensic constraints, and future-proofing workflow impact,
science. But it has brought significant benefits to as well as the wider societal impact such as public
public safety, and there are 25,000 DNA matches acceptance and privacy concerns.
between crime scenes and offenders each year. The relevant professional community will
We are, however, now at a point where the scrutinise any new innovation to critically review
SECURING THE FUTURE OF UK FORENSIC SCIENCE

CASE STUDY

FORENSICS AND
THE INTERNET OF THINGS

T
ALASTAIR COOK, Director of Critical Insight Security Ltd

he Internet of Things (IoT) mobile had charge in its battery, but had been
increasingly connects people remotely wiped by an unknown person using
and services to a plethora an app that was supplied with the phone’s
of wireless-enabled devices, operating system (see Figure 1).
presenting opportunities for both investigators To enable a productive digital forensic analysis,
and criminals. Appropriate treatment and use of investigators need a high-integrity method
data generated by IoT devices could yield crucial to obtain, store, share and analyse the data
leads in a complex investigation, and in some associated with these devices, so that they can
circumstances it could be the primary source of use this knowledge to infer the sequence of
evidence. events that led to the crime. These methods
Consider a scenario where three murder could include:
victims are found in a park, with signs of a
170 struggle plus a number of items left by at least 1 A trusted framework that allows the data to
one other party at the scene. Although some be imported and preserved in its original form,
mobile phones were present at the scene, one while also enabling a team of investigators
has been intentionally smashed. The second with varying technical skills to interact with it.

Figure 1: Crime scene evidence

Victim B

• Connected
heart-rate monitor Victim C
Victim A
• Unknown worn & • Smar t watch, Brand M,
• High-fidelity fitness implanted paired GPS enabled
device on wrist, Brand X medical devices • Security key worn
• Mobile phone • Embedded devices on finger of the right hand
smashed at scene in trainers • No mobile
• No mobile

Jacket
Holdall • Wearable device
embedded in collar
• Embedded device for
security and identification • Not activated
• Evidence of tampering • Smar tphone in pocket
with device with 20% battery remaining
FUTURE APPROACHES IN ANALYTICAL SCIENCES

As some of the data may not be immediately “The team found that the 3 victims regularly
available – it might be stored in public or shared the same running route. On the day
private clouds, for example – this environment of the crime they exhibited elevated signs of
must be ‘live’, so that diverse sources of data stress and changed their route 16 minutes into
relevant to the investigation can be imported the run. There were indicators of a physically
as they become available. intense struggle for the last 3 minutes of the run.
A security device on the hand of one victim was
2 At the point of import, any relationships in linked to a car that was infrequently used by the
the data should be automatically discovered, victim and some other, subsequently identified,
tagged and highlighted to the team. Linked persons linked to the crime. The bag was
Data techniques (which allow semantic procured in Europe, and carried a device that a
analysis by both machines and investigators) non-UK criminal gang used to track the delivery
can be used to generate human and machine- of stolen assets or weapons. The jacket was 171
readable statements about the data and its procured in Antwerp and had been worn in the
context. Using terminology and identifiers that UK for 3 weeks prior to the crime. This allowed
are recognised by the team, as well as open a possible CCTV image of the wearer to be
source or internationally-recognised standards, obtained. It appears that Victim B was followed
would significantly increase the utility of the by the wearer of the jacket for 2 days prior to
data and draw upon global knowledge in a the crime.”
way that is almost impossible with current Such information could routinely enhance
methods. investigations if the three highlighted methods
can be implemented alongside forensic advances
3 Semi-automated identification of appropriate in other domains. This will allow investigators to
analytic techniques could allow niche methods adapt to changes in technology, users’ behaviour
to advance the investigation, or associate and criminals’ tactics at a scale that current
people and places with the devices. This methods cannot achieve. It should also provide
may draw on international data sets or a sound basis for the scientific scrutiny and
online services that have greater statistical investigative integrity that should be expected of
significance, better reference methodologies all areas of forensics.
and more rigorous scrutiny than national
or regional teams would be able to achieve.
Some of these may not be from the forensics
community – they could include online SEMI-AUTOMATED IDENTIFICATION OF
medical or personal fitness services, for APPROPRIATE ANALYTIC TECHNIQUES
example.
COULD ALLOW NICHE METHODS TO
This approach could efficiently yield the ADVANCE THE INVESTIGATION, OR
following summary of assertions that inform an
investigation, and may be of sufficient integrity ASSOCIATE PEOPLE AND PLACES WITH
to identify participants in the crime, or even be THE DEVICES.
admissible in a criminal prosecution:
SECURING THE FUTURE OF UK FORENSIC SCIENCE

CASE STUDY

NEXT-GENERATION
DIGITAL FORENSICS

C
GRAHAM BROMELOW, MCM Solutions

hild sexual exploitation and removable USB devices, provide non-technical


abuse (CSEA) was reported in investigators with a lightweight portable
every UK policing region in 2014 tool that dramatically cuts investigation
(ref. 1), and remains a priority in lengths. The most powerful extraction tool
police investigations. Digital forensics is at the (a patented capability originally developed as
heart of investigations into indecent images a military capability) can forensically ‘image’
of children (IIOC), and ‘traditional’ digital a 1TB laptop in under 35 minutes; another
data recovery (triage) and analysis tools are ‘military’ tool enables IIOC content to be
used throughout UK law enforcement and located on a target computer within a few
intelligence agencies. minutes. This offers non-technical investigators
The evolution from complex and slow the capability to perform the initial
‘traditional’ forensic tools to next-generation investigations themselves, producing reliable
172 IIOC solutions has allowed investigators to court-admissible results on their own.
close the opportunities criminals have to hide Simple-to-use user-interfaces allow the
illegal data on their devices. The development non-technical investigator to run a full digital
of cutting-edge extraction and analysis tools is acquisition, or effortlessly select granular
an iterative one, with constant feedback and search criteria for a ‘sniper forensic’ analysis.
consultation from end users and organisations. Unskilled users could potentially damage
The challenge is to develop an easy-to-use digital evidence during a traditional triaging
and reusable system that handles complexity, process, making it redundant in a cour t case.
can be deployed from on-scene to lab based Now, highly configurable search profiles
environments, and rapidly extract or process ensure that such ‘collateral digital intrusion’ is
large amounts of data while maintaining eliminated, assisting with compliance and any
a high-quality output. Alongside these warranty issues of IIOC investigations.
challenges, new technologies are helping to Advanced technologies have simplified
overcome barriers such as budget cuts, lack and streamlined the process of analysing
of manpower and socio-political reluctance items with evidential value. Despite criminals
to arm first responders with forensic skill sets. becoming better at hiding IIOC content,
Indeed, the business case for moving to next- innovative technologies can rapidly uncover
generation IIOC solutions is a ‘no brainer’: it them with techniques including skin tone and
can bring down the costs of prosecuting a face detection (see Chapter 6 case study p68),
single case from approximately £40,000 to video frame caching, checking video signatures,
less than £1,000. EXIF extraction (file metadata), preconfigured
As the amount of IIOC content grows, file signatures, keyword lists, and many more.
along with the proliferation of personal Another challenge within digital forensics
devices and data storage, both front line is helping to overcome the growing concerns
and rapid laboratory-based forensics are from social networking sites, cloud storage,
now critical in preserving life and convicting email file sharing, online gaming platforms and
criminals while decreasing the length, budgets search engines that digital environments use
and backlogs of investigations. New, easy- to store and share CSEA and IIOC content.
to–use digital technologies, licenced on Equally as concerning is the expansion of Tor
FUTURE APPROACHES IN ANALYTICAL SCIENCES

the validity of the science or technology, in order


to determine if the approach is scientifically sound.
The end users will review this and assess the outlay
costs, business benefits and impact of introducing
a disruptive innovation. The legal professionals will
consider the use of innovations in the context of
the current legislative framework, and decide if
it needs to be amended to accommodate such
changes. The policymakers will consider the
societal impact and the maintenance of public trust
in the context of the political environment. The
anonymity software, which masks users’ industry approach is critical, in that it must take
identities and makes it harder to locate account of all these factors: ultimately, there has
IIOC users and distributors. to be a product or service that can be converted
Nevertheless, the National Crime Agency from an innovative idea into a marketable
recorded1 a decline in open searches to commodity that will generate income.
access IIOC, which is now even lower due The introduction of new sciences and
to web giants Google, Facebook and Twitter automation to forensic techniques will not remove
removing millions of IIOC images from the scientist from the equation. But the forensic
the internet in 2015. Analytical tools can scientist of the future will be a very different person
now dive deep into hundreds of internet to those of previous years (see case study p166).
ar tefacts, such as instant messaging and chat They will interact with more automated processes,
apps, browser history, Facebook and Twitter have a greater understanding of the complexities of
feeds to recover and display evidence. large-scale data analytics, and present their findings 173
Our digital evidence is so powerful utilising statistical methodology. This will require a
that most people charged with possessing step change to the development programmes that
IIOC material plead guilty when shown are building the future forensic scientists. In line with
a repor t detailing what was found on this, the judiciary will need to be far more aware
their computers. The judicial system is of the implications of science and technology in
also suppor ting these new capabilities the court room. All of this must operate within an
and making changes so that offenders appropriate regulatory framework that maintains
are subject to speedier justice. Other the standards required for the delivery of assured
technological developments can ensure science.
victims of abuse can be identified more The UK has traditionally held a strong position
quickly. globally in the field of forensic science, and we need
The evolution of computer technology to ensure that this global position is maintained
and the internet has undoubtedly led to and enhanced through government support to
a growth in the number of of educated academia, industry and the end users of such
computer criminals. They are now using a innovations. This can only be done by providing
range of anti-forensic techniques and tools an open innovation channel that ensures academic
– including cryptography, disk cleaning and research is supported and, where appropriate,
file wiping utilities that focus on destroying converted into commercial opportunities that the
and altering data – to affect the integrity end user community will buy into. That means
of an investigation and the reliability of providing access to test databases that act as
evidence in court., Law enforcement and operational environments to provide a far better
intelligence agencies will have to face this understanding of the requirements. This applies as
growing challenge over the next 5 to 10 much to the civil applications of forensic science as
years. it does to the criminal uses. Greater coordination
of a tripartite arrangement, focussed on forensic
science and technology driven by government
policy, will enable the UK to grow both capability
and reputation on a national and international basis.
SECURING THE FUTURE OF UK FORENSIC SCIENCE

CHAPTER 16

ENCOURAGING INNOVATION
GERAINT MORGAN The UK has a strong track record of innovation in forensic science, and its forensic
The Open University science providers have a close working relationship with the police. Engaging all of the
THOMAS BASSINDALE, partners involved in taking innovations through to market adoption – including academia,
Sheffield Hallam industry, end users and government – gives the UK an opportunity to become a global
University leader in the forensic science market. The government now has an important role to play
MARK PEARSE in helping innovators to bridge the ‘valley of death’ as they seek to turn proof-of-principle

F
LGC techniques into commercial products.

orensic science is a multidisciplinary MAPPING THE INNOVATION


field that relies on technologies and LANDSCAPE: FROM CONCEPT TO
methodologies from a wide range IMPLEMENTATION
of sectors. Although it primarily According to the Crown Prosecution Service’s
addresses questions relating to crime, it also (CPS) Code for Crown Prosecutors, evidence
covers a wider spectrum of activities such as may only be used in court if the prosecutor
consumer and environmental protection, health is satisfied that it is reliable, credible and
and safety, the authenticity and provenance of admissible. The high cost and judicial impact
goods, and civil proceedings such as breach of of failing to meet these standards means that
contract and negligence. Intelligence, gathered any forensic technique must be validated to
overtly or covertly, can also predict when crimes a high level, and backed by a strong evidence
174 are about to take place, enabling pre-emptive base, before it is used in criminal investigations.
interventions or better evidence-gathering. As That makes the innovation landscape for
a result, forensic science makes a significant forensic science more complex, with a diverse
contribution to our justice and security systems, range of stakeholders at all points on the
ensuring our economic stability. route from concept development through
The UK has a strong track record to implementation (see Box 1). Chapter
of innovation in this area, including the 17 contains a more detailed look at these
development of fingerprinting, and more recently stakeholder groups, and their interactions.
DNA profiling. Forensic science provides This complexity and diversity means that
innovators with potential opportunities in a no two stakeholders have the same strategic
diverse range of disciplines, as well as a truly priorities or pressures, and all have different
global market for its scientific and technological perspectives and interpretations about what
developments. Moreover, England and Wales forensic science is, and what it can and cannot
remain the only countries to have privatised do. Another consequence, not unusual in
all of their forensic science services. This has multidisciplinary innovation, is the lack of a
created a closeness between the private sector common taxonomy.
and police service users that is relatively unique All stakeholders need to engage and
compared with the rest of the world. communicate directly with all other members
These factors mean that the UK could of the value chain. In particular, the pull from
become the best place in the world to the Criminal Justice System (CJS) must not
commercialise forensics innovations in the future be lost in the noise. Engagement should take
– as long as the right market dynamics can be place in the context of a national strategy,
created. In particular, all of the partners involved with universal buy-in. Scientific excellence,
in taking proof-of-principle innovations through commercial success and just outcomes will
to market adoption – including academia, depend on consistent implementation of
industry, end-users and government – need to government strategy, including sufficient funding
work together to bridge the ‘valley of death’ that and open communication. Potential mechanisms
so often prevents high-technology products from for such engagement are discussed further in
realising their commercial potential. the chapter.
ENCOURAGING INNOVATION

RISKS, BARRIERS AND CHALLENGES FORENSIC SCIENCE PROVIDES


TO INNOVATION
In 2014, The Government Chief Scientific Adviser
INNOVATORS WITH POTENTIAL
has previously said1: OPPORTUNITIES IN A DIVERSE RANGE
“Advances in science and technology can yield
significant societal benefits and drive economic
OF DISCIPLINES.
growth. The challenge for society is to channel
existing evidence about innovative technologies
and their risks to improve decision making in the technology from the laboratory to the
area of regulation and policy making.” real world (e.g. degradation of analytical
This accurately summarises the cost-benefit performance, in terms of reproducibility and
analysis that must be completed before new false positives or false negatives)
technologies are applied within the forensic • The sources of financial input at each stage
science sector. This poses several challenges for of innovation
any innovator or technology developer, who
must identify: Courts require that forensic evidence is based
• The unmet need within forensic science that can on processes and scientific principles that have
provide a suitable return on investment and that very little uncertainty. This inevitably means
is compatible with their existing capabilities that there will be some inertia against new
• The customer s that require and are willing to technologies, due to the serious impacts caused
pay for the service or product by the failure of a forensic method. These
• The key opinion leaders within the sector that risks can be reduced by ensuring that any
will champion the innovation through to its new innovations are compliant with existing
eventual implementation standards and best practice, in particular the 175
• The value proposition of providing such a Forensic Science Regulator’s Codes of Practice
solution, i.e. what level of investment is required, and Conduct, CPS guidance, and the relevant
and how long before a return is achieved legislation. These codes include guidance on the
• Who are the main competitors processes to be used for validation, accreditation
• The regulator y hurdles prior to implementation and implementation of an innovation, from the
• The risks associated with translating the initial research and development phase, followed

Box 1: Forensic science stakeholders in the UK


• Academia
 (e.g. universities)
• Funding bodies (e.g. Research Councils UK, Innovate UK, Police Innovation Fund)
• Forensic service providers, including larger companies (e.g. LGC Ltd, Key Forensic
Services Ltd, Cellmark Forensic Services) and small and medium-sized enterprises (SMEs)
• Law enforcement agencies (e.g. Police service, National Crime Agency, Operational Counter
Terrorism users)
• Government departments (e.g. Home Office, Ministry of Defence)
• Regulators (e.g. Forensic Science Regulator)
• Guidance and best-practice providers (e.g. Crown Prosecution Service, College of Policing,
National Police Chief Council, Centre for Applied Science and Technology, Defence Science and
Technology Laboratory, Forensic Science Special Interest Group, European Network Forensic Science
Institute)
• Accreditation Providers (e.g. UKAS: see Chapter 3 case study p34)
• Networking (Chartered Society of Forensic Science, Association of Forensic Science Providers,
Forensic Science Special Interest Group, European Network Forensic Science Institute)
• End users (Crown Prosecution Service, Courts, Counter Terrorism and Intelligence)
• Journalists
• General public, including victims of crime
SECURING THE FUTURE OF UK FORENSIC SCIENCE

by pilot studies, use on live samples, first CPS and ultimately the innovator. This monetisation
case management and its first test in court. could be through the provision of a service
The codes also detail how the whole process directly to the customer, or more likely through
should be monitored and reviewed. Direct the licensing of the intellectual property to one
communication between scientists and end-users of the leading service providers in the sector.
in the CJS is key to ensuring that innovation is For any innovation to be widely implemented, it
implemented in a timely manner. must either speed up a current methodology or
Other potential end-users of forensic satisfy an unmet need; have limited competition;
science are the military, counter-terrorism and be successfully transferred from the
and intelligence agencies. Their operational controlled environment of the laboratory into
needs are likely to be different from those the real world, where it can be used by non-
of the courts, and therefore a dialogue with experts. The overall cost of implementing the
organisations such as the Defence Science and technology into the forensic workflow will also
Technology Laboratory (Dstl) and the Centre need to be minimised to avoid driving up costs
for Defence Enterprise (CDE) are essential to to the customer.
establish end-user needs and ensure that the It is clear from both case studies in this
innovation will be fit for purpose. Forensic tools chapter that securing funding to move from
can also be used to determine authenticity in the initial research and development phase
areas including clothes, foods or perfumes, which at an academic institution, through to the
require liaison with industry and regulatory development of a commercial product, remains
bodies. difficult (see case studies on p179 and p181).
But the primary customers (and budget Partnerships between academic institutions
holders) for most innovations in forensic science and end-users can help to guide innovations
176 are law enforcement agencies or forensic through this development process. Potential
service providers (FSPs). Increasingly, police innovators – who may be new to the
forces are bringing more forensic services within sector – should be made aware of the
their organisations, blurring the lines between wider global markets, and their high esteem
themselves and FSPs. The main risk for the law for UK forensic science; as well as existing
enforcement agency is that their investment networking opportunities. For example, the
results in a procedure that is not suitable for use Forensic Science Special Interest Group (FoSci
in the Criminal Justice System. Once again, early SIG) is a community that includes everyone
engagement between scientists and the CJS is key. involved in forensic science, and enables
For an FSP, there is an additional risk that closer networking and better communication
their investment in an innovation does not between all stakeholders for improved research
provide a return. That financial return is only and development. FoSci SIG is run by the
possible if the innovation is monetised and Knowledge Transfer Network (KTN) and was
adopted by a sizeable market, with a proportion set up in July 2012 following a recommendation
of the revenue returned to the service provider in June 2011 by the Home Office Chief
Scientific Adviser in his review of ‘Research and
Development in Forensic Science’. FoSci SIG
FOR ANY INNOVATION TO BE WIDELY has an online searchable database of challenges
IMPLEMENTED, IT MUST EITHER SPEED in forensic science, which helps to match key
questions with innovators’ potential solutions2.
UP A CURRENT METHODOLOGY OR
SATISFY AN UNMET NEED; HAVE LIMITED TURNING SCIENCE INTO FORENSIC
SCIENCE
COMPETITION; AND BE SUCCESSFULLY Fundamental ‘blue skies’ research usually
TRANSFERRED FROM THE CONTROLLED takes place in universities with the support
of research council funding. Some of these
ENVIRONMENT OF THE LABORATORY activities will result in capabilities that may be of
INTO THE REAL WORLD. benefit to forensic science. The challenge for
the community is in identifying those projects,
ENCOURAGING INNOVATION

ACADEMIC RESEARCHERS NEED TO HAVE A CLEAR UNDERSTANDING


OF THE REALITIES OF THE END-USER NEEDS AND ENVIRONMENT,
WHICH CAN ONLY BE GAINED THROUGH INTERACTION WITH AN
END-USER, AND IDEALLY WITH THE WIDER STAKEHOLDER COMMUNITY.

especially when the innovation is initially applied funding from agencies such as Innovate UK. The
in a different discipline. Network+ schemes being organised by the
If the project is more applied, then the Science and Technology Facilities Council (STFC)
academic researchers need to have a clear and the Engineering and Physical Sciences
understanding of the realities of the end-user Research Council (EPSRC) provide such funding,
needs and environment, which can only be but the field also needs a forensic science
gained through interaction with an end-user, and champion for these schemes, with a proven
ideally with the wider stakeholder community. track record of engaging with the other key
Increasingly, the importance of applied research stakeholders in the sector.
is being acknowledged within universities and the Any intellectual property generated by this
research councils. All research council proposals research could be exploited in two ways. It could
must demonstrate ‘Pathways to Impact’, including be licensed to an FSP or commercial organisation,
how researchers will communicate, engage and which would then develop the product and take it
collaborate with stakeholders and potential to market, eventually providing a revenue stream
beneficiaries of the research. to the university. Alternatively, the academics
There is also a growing expectation within involved could form a spin-out company to further 177
universities that research should be translated, develop their value proposition, with a view
with any revenue generated being returned to either providing a service directly or exiting
to the university. This strategy is further through a trade sale.
encouraged through the Quality Related- Very few academics choose the latter
Business Research Element (QR-BRE) funding option. But those who do take this brave
from the Higher Education Funding Councils of step need financial support and mentoring.
both England and Wales, and by the fact that Incubation centres such as the STFC/European
an assessment of impact now makes up 20% Space Agency Business Incubation Centre in
of the Research Excellence Framework, and Harwell, and the associated funding available
therefore directly influences future mainstream from Innovate UK through the Harwell Space
Quality Related (QR) research funding in all UK Launchpads, offer an excellent model of how
universities. start-up companies can develop if they have
However, it should also be acknowledged a funding roadmap to facilitate growth and to
that the current requirement for an academic support it in securing investment capital.
to achieve traditional ‘outputs’ for their research The Security Innovation and Demonstration
(80% weighting) is also a barrier to investing Centre (SIDC)3, launched by the Home Office in
time in activities such as validation, which may 2014, could provide another important incubation
not be publishable in peer-reviewed journals facility for forensic science. As an open innovation
but is crucial for the end-stage of adoption of a centre focused on security challenges, it will
technology. enable innovators to access end users and their
To help these applied projects, it is important environments for rapid real-world evaluation
that the sector establishes and supports of new concepts, using a shared laboratory and
events that actively engage all stakeholders and demonstration space hosted at the Home Office’s
generate opportunities for networking; offers Centre for Applied Science & Technology (CAST).
funding for proof-of-principle studies and/or staff The SIDC aims to support start-ups through
exchanges; and provides commercial training on links to mentors and investors, thereby de-risking
how to develop an initial idea into a business the introduction of new technologies. It will also
plan, so that innovators can attract follow-on host demonstrations to overseas delegations to
SECURING THE FUTURE OF UK FORENSIC SCIENCE

INNOVATION IS NOT JUST ABOUT OPPORTUNITIES FOR THE UK IN A


GROWING MARKET
MAKING BREAKTHROUGHS OR Some police services are now approaching
DEVELOPING A NOVEL INVENTION. universities to undertake research projects on
their behalf. Regional meetings (e.g. in Yorkshire
INCREMENTAL INNOVATIONS ARE and the Humber) have allowed universities
FAR MORE COMMON, AND RESULT to present their capabilities and the possible
analytical tools they have available, and for the
IN IMPROVED PERFORMANCE FOR police to present the problems they would like
EXISTING TECHNOLOGIES. to investigate. A simple summary of what police
services typically require is: “What we do now,
but quicker and on site, please”.
As par t of its remit to enable closer
support UK security exports. networking and better communication
More established companies typically decide between forensic science stakeholders, the
whether to develop a new technology based FoSci SIG promotes an annual networking
on an assessment of strategic need, and the event called the Forensic Science Technology
potential return on their investment. A purely Showcase. The aim is to bring together
commercial environment, where market funders and potential buyers so that
forces alone drive the agenda, may hamper innovators can showcase new technologies, in
further development of an existing technique order to help them find a market4.
for several reasons. Some companies may be Innovators can also make these
unwilling to invest in a new ‘market leading’ connections through the Char tered Society
178 technology if the legal process requires that the of Forensic Sciences, which has members
methodology is disclosed, thus allowing other from all aspects of forensic practice, crime
companies to develop rival products. Or they scene investigation, policing, military, medical,
may wish to only employ members of staff who dentistry and legal professions5. It offers
directly provide services (and therefore bring continuing professional development (CPD),
in income). As a consequence of these factors, scientific meetings (with CPD points),
in the future most commercial companies may qualifications, social and networking events,
not have dedicated research and development professional recognition and scholarships. The
departments to bring through innovative new society also provides an accreditation system
technologies or methods. for academic institutions that deliver forensic
But innovation is not just about making science undergraduate and postgraduate
breakthroughs or developing a novel invention. courses (see Chapter 2 case study p30).
Incremental innovations are far more common, The Association of Forensic Service
and result in improved performance for existing Providers (ASFP) could also play an impor tant
technologies. They may offer better accuracy role. It is an independent, representative body
or precision, lower the limit of detection, or that seeks to facilitate the effective delivery
improve reproducibility; or they can increase of justice and promote public confidence in
the throughput of an analytical process, or forensic science6. The AFSP was constituted
reduce costs. One recent example is the on 1 July 2010 with a mission to represent
availability of commercial robotic auto-samplers the common views of the providers of
that interface with gas chromatography-mass independent (i.e. non-police) forensic science
spectrometers, which now enable the majority within the UK and Ireland, while maintaining
of sample preparation and analysis to be and developing best-practice in forensic
performed automatically, without the need for science and providing exper t opinion in
skilled human intervention. However, the source suppor t of the justice system, from scene to
of funding for such incremental developments cour t. As such, it could act as a single voice
remains an open question, especially as one for FSPs in the UK and Ireland, help to share
moves further away from the market and the international best practice, and promote
level of risk increases for the innovator. global market oppor tunities.
ENCOURAGING INNOVATION

CASE STUDY

INNOVATE UK AND THE


FORENSIC SCIENCE SPECIAL
INTEREST GROUP

B
MEEZ ISLAM, Teesside University

lood represents one of the most


frequently encountered and useful
THERE IS A NEED FOR A MORE
types of physical evidence found at RELIABLE MEANS OF DETECTING
violent crime scenes. Investigators
typically identify the presence of blood by using
AND IDENTIFYING BLOOD STAINS AT
‘presumptive tests’: these indicate whether CRIME SCENES OR FROM RECOVERED
a substance is likely to be blood, but do not
offer absolute proof. Current methods such
EVIDENCE, IN A NON-CONTACT,
as the Kastle-Meyer test, the leuco-malachite NON-DESTRUCTIVE MANNER.
green test, and the luminol test, all use indicator 179
chemicals that either change colour or glow
when exposed to haemoglobin.
Although these tests are useful in many and Technology Showcase events have allowed
circumstances, they are also subject to false us to demonstrate our instrument to relevant
positives (i.e. they can indicate blood when end users in the police service, as well as
none is actually present) and they may also forensic service providers. This has allowed us to
detrimentally affect subsequent DNA tests. make useful contacts and get valuable feedback
There is consequently a need for a more reliable on our prototype.
means of detecting and identifying blood stains FORSIG highlighted relevant funding calls
at crime scenes or from recovered evidence, in and was instrumental in pushing for a relevant
a non-contact, non-destructive manner. Recent Small Business Research Initiative (SBRI) phase
research by my group at Teesside University has 1 funding call from the Home Office. They
investigated the potential of visible-wavelength provided advice which allowed us to make a
hyperspectral imaging, which can identify the successful bid for proof-of-concept funding from
spectral signature of haemoglobin in blood, with that call, which has led to further development
high specificity and sensitivity. Using a prototype of our prototype.
instrument, we have obtained promising FORSIG also suggested that we set up a
preliminary results showing that hyperspectral spin-out company to help commercialise our
imaging can detect and identify both visible and technology. Consequently, we have recently
latent blood stains on a range of backgrounds1. founded Chemicam Ltd, which currently consists
Since obtaining our initial results, we have of five partners and which aims to develop
faced a number of challenges in disseminating a commercial blood detection instrument.
our results to the police service and forensic Significant challenges remain before we
laboratories; making contact with potential end commercialise the technology – we are looking
users; and in obtaining funding to develop our for more funding, and need to clear various
prototype. Fortunately we have received support regulatory hurdles, for example – but Innovate
from Innovate UK, through its Forensic Science UK and FORSIG have clearly helped us to get
Special Interest Group (FORSIG). Its meetings closer to that goal.
SECURING THE FUTURE OF UK FORENSIC SCIENCE

THE LIMITED SIZE OF THE FORENSIC THE ROLE OF GOVERNMENT


The government has an important role to play
SCIENCE MARKET IN ANY ONE COUNTRY in helping forensic science innovation to thrive
MEANS THAT INNOVATORS AND SERVICE in the UK. Its CAST and SIDC can help to bring
innovations through to market-readiness. And
PROVIDERS MUST ALSO CONSIDER the Home Office is currently establishing a
OPPORTUNITIES AND NEEDS IN THE National Strategy for Forensic Science that will
provide direction on the future opportunities
GLOBAL FORENSIC SCIENCE MARKET. for innovation, taking into consideration all
members of the stakeholder community. In
developing this, the Home Office may wish
to explore how the UK healthcare sector has
The main growth market for UK forensics is recently addressed the issue of clinical innovation
likely to be in: and adoption. The NHS Five Year Forward
• Digital forensics: Many crime investigations View sets out additional steps that the NHS
now involve mobile phones (tracking will take to accelerate innovation to find better
someone’s whereabouts, for example, or video ways of delivering health and care. This strategy
evidence of an incident); or crime committed includes the establishment of fifteen regional
through the internet (see Chapters 7 and 15). Academic Health Science Networks (AHSN), a
These all need better approaches to retrieving similar number of Clinical Research Networks
and analysing electronic data. (CRNs) and the recent global call for the
• Rapid Identification of Offenders: The establishment of five ‘test beds’ that will receive
Association of Chief Police Officers (ACPO) national support for implementing high-potential
180 Live-time Forensics strategy aims to speed innovations that respond to local clinical needs.
up the identification of offenders by using Each of the AHSNs has been given significant
innovations such as RapidHIT DNA or funding and a five-year license from NHS
paraDNA analysis. England to “facilitate the adoption of innovative
practices, products and services at scale and
But the limited size of the forensic science more quickly than has previously been achieved
market in any one country means that innovators in the NHS”.
and service providers must also consider The NHS has also recognised that “too often,
opportunities and needs in the global forensic new technologies have been tested alone, in
science market. Potential routes for innovators to isolation from complementary innovations in
access overseas markets, in addition to the above how NHS services are delivered, limiting the
named organisations, include: value they produce”. AHSN, CRNs and test beds
• The Science and Innovation network, funded are seen as the mechanism by which this can
by the Foreign and Commonwealth Office be addressed, and similar bodies could have a
and the Department for Business, Innovation positive impact on forensic science.
and Skills A national strategy for the sector is essential,
• Innovate UK along with appropriate funding. That strategy
• UK Trade and Investment should include mechanisms for academia,
• Other UK government departments – such as industry, customers, end-user communities and
Ministry of Defence – that share best practice the government to engage and communicate
with other nations more effectively, to ensure that innovations
• European Network of Forensic are fit-for-purpose and that CJS requirements
Science Institutes are not over interpreted, potentially stifling
• Horizon 2020 Secure Societies programme, innovation.
which includes calls in ‘big data’ analysis; in situ
forensic tools for the crime scene; remote
control technologies for monitoring and
examining scenes; internet forensics; ‘stand-off ’
body scanning
ENCOURAGING INNOVATION

CASE STUDY

BIOSENSORS IN FORENSICS

I
BARBARA DANIEL, Head of Forensic Science Unit, King’s College London

n January 2006, our group at King’s OUR TECHNOLOGY COULD RESULT IN


College London (KCL) was awarded a
£178,613 research grant from the Engi- A FIFTY-FOLD REDUCTION IN THE TIME
neering and Physical Sciences Research AND EXPENSE SPENT ON ROUTINE
Council (EPSRC) under its ‘Think Crime’ funding
programme. Our research proposal had been BIOLOGICAL SEARCH METHODS.
prompted by a discussion with the Director of
Forensic Services at the Metropolitan Police
Service (FS-MPS), who asked whether it was
possible to detect a 5-microlitre blood spot been resolved much more quickly if a better
somewhere on a black tracksuit. Quite a chal- method for the detection of body fluids was
lenge – but one we thought we could over- available. In the case of Stephen Lawrence, a
come by using fluorescently-labelled antibodies minute trace of blood was missed and only
that would bind specifically to red blood cell discovered after many years, following hours of
surface antigens. painstaking searching by an exceptional forensic
The major problem, in this forensic context, scientist. Meanwhile, the blood spot missed 181
was how to get rid of any antibodies not on the shoe of Damilola Taylor’s assailant was
specifically bound to the blood on the tracksuit. attributed to human error.
We came up with the idea of attaching the Our technology could result in a fifty-fold
antibodies to magnetic nanoparticles and reduction in the time and expense spent on
removing the excess with a magnet, a method routine biological search methods. In light
that worked surprisingly well, even on fabrics. of these advantages for policing, the Police
In 2009, we applied for follow-on funding to Innovation Fund awarded a grant to the FS-
develop the technology, but it was deemed to MPS and KCL in August 2014 to develop this
be too far away from the market to be eligible. method. The results are promising1, and we
We then fell into a gap where the research was are currently seeking industrial partners to fully
either ‘not innovative enough’ or ‘too far from develop the technique.
the market’. This illustrates an all-too-common Biosensors rely on substrate-specific
difficulty in bringing forensic science techniques recognition moieties (similar to antibodies)
from the laboratory into routine use. capable of working efficiently within a mixture,
We continued to work on the problem, without cross-reacting or giving false-positive
with the cost of consumables covered by results. They must also be able to perform
the FS-MPS. This resulted in some positive under the many and varied conditions
proof-of-concept work in the development encountered in forensic investigations.
of biosensors for the detection of body fluids Developing these moieties is essential but
in a forensic context, and formed the basis time-consuming, and is therefore particularly
of an application for funding to the EPSRC vulnerable to falling into the ‘funding gap’ well
in 2013. This application was unsuccessful, known to researchers.
after a reviewer from the forensic community Fundamental research may be high risk
reported that new technology would have little and complex, but is important for the
impact on forensic science because existing forensic community and funding bodies to
methods for body fluid detection are available recognise that it is vital to the implementation
and effective. of revolutionary approaches to forensic
Yet two very high profile cases would have investigation.
SECURING THE FUTURE OF UK FORENSIC SCIENCE

CHAPTER 17

ACCESSING FORENSICS
AS A NEW MARKET
MARK LITTLEWOOD, Although the UK market for forensic science is small and declining, the global
co-ordinator of the market continues to grow and expand into new areas of science. The UK
Forensic Science Special should maintain its current high standing in the traditional forensic disciplines,
Interest Group; while seeking opportunities to access overseas markets and developing new
GILLIAN TULLY, Forensic expertise in emerging areas such as digital forensics.

T
Science Regulator

his chapter examines the forensic million, the Home Office indicating £70 million
science sector as a new market, to £80 million, and the Association of Chief
and offers insights into some Police Officers (ACPO – now called the
of the key considerations of National Police Chiefs’ Council) £63million to
bringing a new technology into the Criminal £70 million. Various explanations for this decline
Justice System (CJS). It describes the size and have been offered, including disproportionate
growth rate of the sector, potential areas for cuts to forensics compared with other police
knowledge transfer, the processes involved and work; lower crime rates resulting in a reduced
how to interact with key stakeholders, ethical demand for forensic services; and a reduction in
182 considerations and resources to facilitate market costs due to technological advances3. Previous
entry. This chapter draws extensively on, and attempts at estimating the size of the in-house
uses updated sections from ‘Taking Forensic market have proved inconclusive4.
Science R&D to Market’1, a report by Gillian The global market has been predicted
Tully and Kevin Sullivan that was published by to grow at a compound annual growth rate
the Forensic Science Special Interest Group (CAGR) of 8.34% between 2014-2019 (ref.
(FoSci SIG) in 2013. It offers a much more 5) to reach $17.7 billion6, with developed
comprehensive view of what is involved in countries accounting for more than 50% of the
bringing a new technology to market. total market. However, automated processing is
likely to force down the costs of standardised
MAPPING THE FORENSIC MARKET tests, reducing the total spent on forensic
The forensic market can be divided into two technologies in these regions. This, combined
sectors: traditional forensics and digital forensics. with increased investment in infrastructure,
modern equipment, DNA databases etc in
1. Traditional forensics developing countries, will see the Asia-Pacific
Forensic science provision in the UK is and other regions outside North America
fragmented, making it difficult to estimate the and Europe accounting for 60% of the global
current size of the market. This, combined with forensic science market in the future6.
differing approaches across the world, mean that The forensic technologies market has been
a global figure is even more elusive. The forensic segmenting into 4 broad categories6:
science market is further complicated by the • DNA Profiling
split between external and in-house work such • Biometrics / fingerprint analysis
as scene of crime analysis and fingerprinting. • Chemical analysis (drugs / explosives /
The UK’s external market was predicted to fall toxicology)
from £170 million to £110 million between • Firearms identification and analysis
2009 and 2015 (ref. 2). However, more recent
estimates have been more pessimistic, with Of these, DNA profiling and chemical analysis
the largest forensic service providers indicating typically account for the vast majority of the
a 2015 market value of £70 million to £100 market (see Figure 1).
ACCESSING FORENSICS AS A NEW MARKET

Figure 1: North American forensic technologies market 2011-2019, by services (USD Million)6.
Data for the UK and rest of the world are not currently available.

DNA Profiling Controlled Substances/Drugs, Toxicology, Trace Evidence


Biometrics/Fingerprints Firearms/Toolmarks Other Forensic Requests

2,495

1, 846

2011 2012 2013 2014 2015 2016 2017 2018 2019

Source: KOL Opinions, Expert Interviews, Press Releases and TMR Analysis

2. Digital forensics the global market continues to grow and


The data above do not include the field of expand into new areas of science. The UK
digital forensics, which is becoming an ever should maintain its current high standing in
more significant part of forensic investigations. the traditional forensic disciplines, seeking 183
The use of smart phones and tablet computers opportunities to access overseas markets while
is growing exponentially, and along with developing new expertise in emerging areas
technologies such as smart home and smart such as digital forensics.
vehicle systems they generate and contain
masses of data, which can be used to investigate PROCESS STEPS NEEDED TO BRING
a suspect. A NEW TECHNOLOGY TO MARKET
Forensic specialists face huge difficulties in this The Criminal Justice System (CJS) has
area, considering: requirements that must be met before a
• The number of devices that could be new technology will be adopted by the
associated with a single suspect police service, courts and other stakeholders.
• The number of different devices on the market, Technologies not only need to produce
which would each require a protocol to admissible evidence, they also need to be
analyse their contents accepted as being credible. To demonstrate
• Operating systems with different encryption, credibility, technologies need to be fully validated
each having regular updates that could change and documented to allow the potential for all
the analysis protocols development materials to be reviewed in future
• The globalised nature of the digital world: these court cases.
devices are probably manufactured overseas,
which may make it more difficult to seek 1. Key stakeholders and how to interact
support for them with them
In order to more effectively target limited
Thus, greater resource is likely to be put into R&D funding, constructive dialogue between
digital forensics in the future. This might grow innovators, end users and stakeholders is
the total forensic market, or could take financial required. The nature and timing of dialogue will
resources away from traditional forensic vary depending on the drivers for the research,
disciplines. its strategic importance and its distance from
In summary, the UK market for forensic market. For example, if research is required
science is small and declining. However, to build strategic capability, the Forensic Policy
SECURING THE FUTURE OF UK FORENSIC SCIENCE

Group should provide appropriate leadership. College of Policing (CoP)


Conversely, fundamental academic research • Priorities: As the professional body for
is required in all disciplines to generate the policing, the CoP partnered with the
knowledge and understanding that is essential Economic and Social Research Council
for a new generation of ideas for forensic (ESRC) to establish the What Works Centre
applications to emerge. This fundamental for Crime Reduction, funding academic
research should not be constrained by current research into crime reduction7
needs for policing or defence, and needs no • Pressures: Looking to establish an evidence-
approval from forensic science stakeholders. based profession with tight budgets; forensic
Whatever the nature of the innovation, science is a very small part of the CoP’s remit
continuing end-user input is required throughout
the development cycle. Key requirements of Crown Prosecution Service (CPS) and
the dialogue between innovators, end users and Courts
stakeholders include: • Priorities: All researchers in this field should
• Shared set of values based on supporting open be familiar with the Code for Crown
justice and enhancing public safety Prosecutors8 – novel scientific methods
• Segregation of market engagement from sales will need to pass the tests within the code.
and marketing or procurement activity, to Researchers also need to know the principles
ensure that: of case management9 and streamlined
• end users have no commitment to buy at forensic reporting (SFR)10, to ensure that
market engagement stage any methods they develop are tailored to
• the same information is made available to the process; CPS guidance to summarise
all groups innovating in the same field requirements for FSPs should be followed11
184 • the innovators’ intellectual property is • Pressures: CPS restructuring and reductions
respected in resource.
• Understanding the strategic and operational
priorities of, and the pressures on, all parties, Defence Science & Technology Laboratory
both public and commercial sector (see below (dstl)
for examples). • Priorities: “To maximise the impact of science
and technology for the defence and security
2. Stakeholder landscape, priorities and of the UK”12. Dstl manages the roughly
pressures £400 million Defence Science & Technology
No two stakeholders have the same strategic Programme, outsourcing where possible
priorities or pressures, so to aid effective to industry and academia (about 60%) and
communication a brief summary is given below. internally providing capability for chemical
and biological defence, counter-terrorism
Academia and counter-insurgency, as well as analysis for
• Priorities: High-quality and high-impact evidence-based decision making
publications are required for the Research • Pressures: Dstl is facing challenges from the
Excellence Framework; fundamental research ongoing efficiencies and streamlining within
as well as applied research is critical the Ministry of Defence, central government
• Pressures: Funding environment is very and the wider public sector; there are
challenging; university business development challenges in coping with cuts while demand
offices keen to commercialise research remains strong

Chartered Society of Forensic Sciences Forensic Service Provider (FSPs)


• Priorities: Accrediting university courses, • Priorities: Quicker, cheaper, more
working to promote links between academic discriminating, more automated tests that
researchers, liaising with funding councils can offer a competitive advantage
• Pressures: Rapid expansion of forensic science • Pressures: Intense competition, reduced
degree courses (see Chapter 2, case study margins, and demand for faster results have all
p30), changing forensic science landscape increased companies’ need to show a return
ACCESSING FORENSICS AS A NEW MARKET

CASE STUDY

BRINGING A FORENSIC
PRODUCT TO MARKET
MICHAEL HEFFERNAN KIM SANDQUIST PETER SCHAD JOHN OWEN

T
CEO of ArroGen CSO Chemistry CSO Biology Managing Director

he UK’s forensic science marketplace challenge to bring the technique to market.


has undergone major changes Companies such as ours first need to identify
in recent years, and presents customers’ requirements for the technique, and
a challenging environment for understand their differing requirements around
companies. The market has been commoditised the world. That requires us to spend sizeable sums
under the National Forensic Framework, with on running and attending numerous specialist
forensic companies competitively tendering for conferences, and gathering feedback from police
individual ‘lots’ of work. Each lot comprises a forces and other law enforcement agencies. In
number of very specific ‘products’ with associated this respect, ArroGen has benefitted from having
‘service specifications’. operations in the United States as well as the UK.
But financial cuts have placed significant pressure The technology must then be tailored to
on police budgets, causing the police service to meet customers’ needs. In our case, ArroGen has 185
dictate which scientific tests are carried out rather developed FMID Crime Scene and FMID Slide kits,
than working with forensic scientists to develop taking into account the standard fingerprint and
the most appropriate strategy for the case. There DNA requirements.
is pressure to carry out the minimum amount Forensic technology providers also need to
of work, with less interpretation of the findings validate their techniques in each of the countries
in the context of the case. This is compounded where they will be used. Our FMID system went
by the police’s drive to deliver work in-house. through initial proof-of-concept studies, followed
Consequently, developing a new technique and by validation on fingerprints left by volunteers (an
then bringing a new service to market – with all of exercise that requires careful consideration of all
the associated validation and accreditation costs – the legal implications involved). We are now field-
entails significant resource and expenditure, and a testing the technique within a true crime scene
not inconsiderable amount of commercial risk. environment.
Meanwhile, a decline in the use of traditional The UK forensic market has seen a welcome
evidence types – such as fibres, paint and glass focus on accreditation, the final step for any
– along with a growing reliance on DNA and forensic product. We hope that FMID will achieve
fingerprints, has focused companies’ research and that by demonstrating appropriate peer review and
development budgets on new, innovative services suitability for evidential use in the Criminal Justice
that will give them a commercial edge and generate System. Meanwhile, the company is preparing
financial returns. for service delivery; we have developed a pricing
For example, ArroGen has developed a model and e-commerce site; instrumentation is
technique called Fingerprint Molecular Identification in place; and new staff have been recruited and
(FMID) that relies on mass spectrometry to trained.
provide a molecular profile of latent fingerprints Our work on FMID illustrates the considerable
at a crime scene. This allows investigators to effort involved in bringing a new forensic
combine latent fingerprint examination with product to market, but we believe that it offers
chemical analysis, which can potentially identify illicit real potential to provide valuable intelligence
drugs, medications and their metabolites, gender, and corroborative evidence to support law
explosives and more. It has, however, been a enforcement agencies and the courts.
SECURING THE FUTURE OF UK FORENSIC SCIENCE

on investment, while reducing the emphasis e.g. by crossing over to security and counter-
on R&D Delays in implementation have a terrorism markets or medical markets. Funding
major impact on business to bridge the gap from academic work is often
required
Forensic Science Regulator (FSR) • Pressures: The global downturn means that
• Priorities: Validation must conform to standards access to capital for investment has been
within Codes of Conduct and Practice; for a limited. Requirement to show a return on
completely new field, quality standards will investment. Delays in implementation have a
need to be defined major impact on business
• Pressures: Rapidly changing and fragmented
forensic science landscape National Crime Agency (NCA)
• Priorities: The NCA’s goal is to tackle serious
Funding Bodies and organised crime, using a combination of
• Priorities: The UK’s seven Research Councils approaches such as: traditional law enforcement
fund academic research judged to be methods; gathering high-quality intelligence to
excellent, and which has an impact on the know where, when and how to strike with best
growth, prosperity and wellbeing of the UK. effect; monitoring serious career criminals and
A variety of mechanisms are used, including confiscating criminals’ assets
support for international collaborations, • Pressures: Delivering operational priorities;
support for academic career development disruption of criminal markets; systematic
and development of scientific infrastructure. management of persons of interest involved
Innovate UK seeks to promote UK innovation in organised crime; and delivery of more law
and hence economic growth enforcement activity against more organised
186 • Pressures: Maximising the impact of research criminals
funding is increasingly important, and
partnerships between funding organisations Police
such as the Research Councils, Innovate • Priorities: At the highest level, the police
UK, the UK’s Higher Education Funding service’s goal is to improve public safety, so it
Councils, business, government, and charitable wants to know how science can make people
organisations have been established. safer; and when things do go wrong, how can
it help to identify offenders and bring them to
Home Office justice?
• Priorities: The Home Office is committed • Pressures: intense budgetary pressure; new
to producing a forensic science strategy by Policing and Crime Commissioners; police
the end of 2015, in which 5 areas have been reform; reform of the NPCC; closure of the
considered: legitimacy, market/supply chain, National Policing Improvement Agency and
digital forensics, forensic futures, skills and establishment of the CoP
knowledge
• Pressures: Closures of the Forensic Science Operational counter-terrorism (CT) users
Service (FSS) and National Policing • Priorities: The government has laid out its
Improvement Agency (NPIA); National DNA counter-terrorism strategy in CONTEST13
Database (NDNAD) now within Home Office • The strategy is based on four areas of work:
Science; public sector spending cuts; reduction • Pursue: to stop terrorist attacks
in spending on forensic science; criticism from • Prevent: to stop people becoming
House of Commons Science and Technology terrorists and supporting terrorism
Committee. • Protect: to strengthen our protection
against a terrorist attack
Industry • Prepare: to mitigate the impact of a
• Priorities: The UK is a small and decreasing part terrorist attack
of a relatively small global market in forensic
science. Ideally, technology needs to feed more Forensic science has a significant part to play in
than one market to increase attractiveness much of that strategy.
ACCESSING FORENSICS AS A NEW MARKET

3. Ethical considerations THE FORENSIC SCIENCE MARKET IS


Use of forensic science is governed by the state
of the science, the legislative framework, the MORE COMPLICATED THAN OTHER
policy framework (including funding), interaction SECTORS BECAUSE THERE IS A LARGE
with society (including civil society groups) and
commercial actors.
NUMBER OF STAKEHOLDERS TO
INTERACT WITH; A NEED TO TEST A
This happens at two levels:
• Sites of operation: where forensic science is
TECHNOLOGY IN BOTH RESEARCH
applied (labs, crime scenes etc) and developed AND REAL-WORLD SCENARIOS;
within a case, involving interaction between
many players
DOCUMENTATION AND VALIDATION
• Sites of deliberation: where legislative and PROCESSES; AND ETHICAL QUESTIONS
policy decisions are made
TO CONSIDER.
Social and ethical decisions arise at both levels.
Ethical oversight is essentially a collaborative
process, shaped by all participants in forensic grow the UK economy”. As discussed above,
science. Historically, ethical considerations in forensic science is a relatively small market, and
forensic science have lagged far behind ethical therefore not a priority for Innovate UK funding.
considerations in medical research. A lag in public Nonetheless, there are options where funding
engagement and debate has arguably contributed can be applied to the forensic sciences, as
to challenges at the European Court of Human discussed below.
Rights14, resulting in policy changes regarding the 187
retention of samples and data on the National 1. Research Council funding
DNA Database. It is therefore important that Academic institutions and some independent
innovators in the forensic science field ensure research organisations are eligible. Beacuse the
that the social and ethical issues arising from their employment of specialist staff or staff exchanges
work are highlighted and debated (see ref. 1 for a between organisations are eligible as costs for
more extensive review of ethical considerations). realizing the impact of research, academics
In summary, the forensic science market is applying for funding should consider at the
more complicated than other sectors because outset whether to budget for forensic scientist,
there is a large number of stakeholders to police or other end-user input in their ‘Pathways
interact with; a need to test a technology to Impact’ proposal.
in both research and real-world scenarios;
documentation and validation processes; and Biotechnology and Biological Sciences
ethical questions to consider. Research Council (BBSRC)
The BBSRC’s strategic priorities are food
RESOURCES TO FACILITATE MARKET security, industrial biotechnology and bioscience
ENTRY underpinning health. Grant proposals in
Due to the diverse range of technologies that responsive mode will have an advantage if
might offer solutions to the forensic sciences, the they address one of these priorities, although
funding landscape in this area is fragmented. The research excellence remains the overriding
majority of academic funding is provided through priority.
the UK Research Councils (RCUK), as detailed The BBSRC also prioritises building
below. However, RCUK’s main remit is to fund partnerships: proposals that include
‘blue skies’ research, whereas forensics is a more collaborative research with users, research to
applied science. Similarly, most UK funding for inform public policy or increased international
businesses goes through Innovate UK, whose collaboration would be well suited to forensic
main remit is to “work with people, companies science. Schemes for new academics may also
and partner organisations to find and drive the be of value for forensic scientists commencing
science and technology innovations that will an academic career.
SECURING THE FUTURE OF UK FORENSIC SCIENCE

CASE STUDY

CYBER SCIENCE AND


CONSUMER INTELLIGENCE

T
STEPHEN HAY, Director, Pilot Lite Ventures

he work of Lancaster University is separate company, Relative Insight Limited, was


a prime example of how forensic spun out from the university to commercialise
science research can be exploited this work. While it continues to operate with
to contribute to the UK economy law enforcement, it has adapted the technology
in numerous ways. The Security Lancaster re- for use in a marketing context, turning language
search centre, one of the UK’s Academic Centres into data to give brands valuable intelligence on
of Excellence in Cyber Security Research, has consumers and competitors. Relative Insight’s
pioneered a new field in online child protection platform allows efficient analysis of a brand’s
called Digital Persona Analysis (DPA). messages, and the language that people use to
DPA was developed over a decade and is talk about them. This offers insights into overall
the product of interdisciplinary research that consumer attitudes toward brands, as well as how
combines computer and behavioural science with those attitudes shift over time, allowing brands to
188 linguistics – it has already delivered significant accelerate their research, develop better-informed
impact in the fields of law enforcement, education marketing strategies, and measure campaign
and internet governance. It automates the process success.
of detecting sexual predators online by using Relative Insight Limited is currently undergoing
comparative language algorithms. DPA analyses its third venture capital funding round having
large amounts of data to identify and report received earlier backing from the North West
individual personas and behaviours of concern. Fund for Venture Capital, Lancashire’s Rosebud
It relies on a system known as the Isis Toolkit, Fund, and other investors. In a little over a year it
developed to detect criminals who hide behind has developed a blue-chip client list, working with
multiple identities (often adults posing as children). corporations such as Microsoft, Unilever, Twitter
Live trials have been carried out with various and many of the world’s leading advertising
UK police forces, and separate evaluations have agencies. The world-class marketing department
shown that the Isis Toolkit can detect with 94% at Lancaster University also helped to develop
accuracy an adult masquerading as a child. this client base by introducing Relative Insight to a
The initial research was funded by grants number of key agencies and brands. In return, the
from the Engineering and Physical Sciences company contributes to marketing courses run
Research Council (EPSRC) and the Economic by the university and is already recruiting from its
and Social Research Council (ESRC). In 2012 a student pool as the business expands.
The development and exploitation of DPA
highlights the significant commercial value
THE DEVELOPMENT AND EXPLOITATION that can be created by the translational and
OF DPA HIGHLIGHTS THE SIGNIFICANT multidisciplinary approach inherent to forensic
science. In commercial terms, forensics is the
COMMERCIAL VALUE THAT CAN BE science of identification, and the market for its
CREATED BY THE TRANSLATIONAL AND applications will grow rapidly with increasing
demand for more effective solutions to the
MULTIDISCIPLINARY APPROACH challenges posed by such issues as terrorism,
INHERENT TO FORENSIC SCIENCE. food contamination, counterfeiting and data
management and security.
ACCESSING FORENSICS AS A NEW MARKET

Engineering and Physical Sciences Research • Helps create successful new products,
Council (EPSRC) processes and services
EPSRC has a number of highly relevant themes
for forensic science research, including: Feasibility Studies
• Digital economy • A single-company or collaborative R&D grant
• Engineering scheme
• Global uncertainties, including cybersecurity, • Lets businesses investigate the technical
disasters and emergencies, CBRN proliferation, feasibility of a new idea
terrorism, threats to infrastructure and • Winners showcase and share their ideas at
transnational organised crime Collaboration Nation events (see Chapter 16,
• Healthcare technologies case study on p179)
• ICT
• Mathematical sciences Innovation vouchers
• Physical sciences • Encourage businesses to look outside their
network for new knowledge
Economic and Social Research Council • Available for UK start-ups and small- and
(ESRC) medium-sized enterprises (SMEs)
ESRC’s strategic priorities are: • A £6 million fund to help stimulate innovation
• Economic performance and sustainable growth where few businesses invest. One of the
• Influencing behaviour and informing current priority areas for innovation vouchers
interventions is cybersecurity
• A vibrant and fair society
Knowledge Transfer Partnerships (KTPs)
Innovative, high-quality collaborative proposals • KTPs let businesses work in partnership with 189
between social scientists and physical scientists academic institutions
may find cross-research council funding. • This allows businesses to access knowledge,
technology and skills
Medical Research Council (MRC)
Although medical research may be peripheral Small Business Research Initiative (SBRI)
to forensic science, areas such as understanding • Uses the power of government procurement
the genetic determinants of complex traits, or to drive innovation
major genetic studies, have potential forensic • Lets companies engage with the public sector
applications. Collaborative research may be to solve problems
able to demonstrate impact in both health and • 100% of the funding is provided through a
forensic applications. contract not a grant

Natural and Environmental Research Smart


Council (NERC) • Funding for innovation projects in high-growth-
Niche areas such as development of methods potential SMEs
to detect crime against endangered species may • Grants let you assess the commercial viability
find funding through NERC of a project
• Smart funding is available to single companies
2. Innovate UK
Innovate UK’s funding is aimed at industry, 3. Horizon 2020
particularly SMEs, although precise eligibility Horizon 2020 is the funding mechanism to
differs between schemes. realise the EU’s Europe 2020 goals. It is open
to companies, research organisations, academic
Collaborative R&D institutions or individuals in EU member states,
Encourages businesses and researchers to work associated countries, EU candidate countries
together on innovation and selected other countries. Innovate UK
• Co-funds partnerships between businesses, coordinates all Horizon 2020 activity in the UK.
and business and academia Horizon 2020 aims to ensure that more good
SECURING THE FUTURE OF UK FORENSIC SCIENCE

A COMPANY APPROACHING Key areas of forensics and potential


technologies for knowledge transfer
FORENSIC SCIENCE FOR THE FIRST The Knowledge Transfer Network (KTN) is
the UK’s Innovation Network. Its remit is to
TIME NEEDS TO HAVE A STRONG connect people to speed up innovation, solve
BUSINESS CASE, IDEALLY BASED problems and find markets for new ideas. The
ON MULTIPLE JURISDICTIONS, TO KTN exists to accelerate innovation, stimulating
and facilitating the conversion of ideas into
ENSURE THAT THE EFFORT WILL new products and services that benefit the
YIELD A RETURN ON INVESTMENT. UK economically, socially and environmentally.
KTN spans all technology domains and
applications, and connects end-user problems
/ opportunities with people who can deliver
ideas get to market, and as such will fund more solutions.
near-to-market solutions than its predecessor, Innovate UK established KTN through a
FP7. Its key objectives are: supporting the grant in April 2014, following the merger of 14
EU’s excellent science base; building industrial separate networks that each had a separate
leadership in Europe; and tackling societal remit to address individual business and
challenges for a better society. Horizon 2020 technology sectors that are important to the
will simplify participation by having a single set UK economy. Many communities represented
of rules for all participants, a single funding rate by KTN could have an impact on innovation
190 of 100% of eligible costs, and reduced process in the forensic sciences, but the main sectors
complexity. offering immediate opportunities could include:
There have been a number of opportunities • Biotechnology
for funding for forensic science research under • Improved recovery of DNA
the Secure Societies theme. Future calls are • Amplification of low copy number DNA
also expected to contain a significant interest in • More rapid production of DNA profiles
forensics. • Health
• Use of biomarkers for identification
4. Other government funding • ICT & mathematics
Centre for Defence Enterprise (CDE) • Tools and techniques for the management of
CDE calls are open to a broad range of science large datasets
and technology providers, including academia • Encryption tools for digital forensics
and SMEs, and can be applied for through two applications
routes: • Algorithms to improve the speed and
• Enduring Challenge: a competition that is accuracy of identification
always open for applications for proof-of- • Materials and chemistry
concept research funding • Techniques for the analysis of materials – age,
• Themed competitions origin etc
• Electronics, sensors and photonics
Police Innovation Fund • Biosensors for biometric analysis
For the past few years, the government has been • Handheld devices for the characterisation of
setting aside significant amounts of money to fund samples at the crime scene
projects aimed at transforming policing through
innovation and collaboration. In 2014, £50 million In his review of research and development
was provided; this increased to £70 million in in forensic science in 2011 (ref. 15), Bernard
2015. Although this fund covers the whole of Silverman recommended that “the Technology
policing, forensics projects are included. Projects Strategy Board should consider whether
should be led by a UK Police Force, but can forensic science could be facilitated through
involve both academic and industrial partners. a Knowledge Transfer Network or similar
ACCESSING FORENSICS AS A NEW MARKET

mechanism”. The KTN’s Forensic Science into areas such as health. Thus ever more data
Special Interest Group (FoSci SIG) was on the individual will be collected, which is
formed to fill this role, acting to improve useful to the Criminal Justice System but also
communication and work to build a forensic poses privacy issues. There is much to learn
community through collaboration with existing from other areas, such as the clinical sciences, in
organisations. The FoSci SIG is a focal point the ethical management of data.
for innovation and has a remit to facilitate All new techniques and procedures need to
knowledge sharing across disciplines. be backed up by full, traceable and auditable
Even though there are options for support validation studies. Documentation of these
from the public purse, the diverse and studies must be disclosed if the techniques are
multidisciplinary nature of the forensic sciences, ever challenged in the courts. While academics
along with its small market size, means that and companies will routinely keep records of
funding forensic science is not a priority for their research, the requirements of the Criminal
most agencies. Recent use of the SBRI scheme Justice System are much more stringent
has seen a handful of funding calls in the than in other fields. Missing or inaccurate
forensic areas, but these are rare. Perhaps the documentation can result in evidence being
best opportunity is to access the Horizon 2020 thrown out and confidence in a technology
Secure Societies funding calls. disappearing.
Technologies from different disciplines need While there is little direct public funding
to be brought to bear on forensic science for new forensic products, there are some
problems, thereby leveraging work that has sources from government agencies in the UK.
already taken place. The UK has a mechanism Help is also on hand from the Knowledge 191
to do this through KTN and, in particular, the Transfer Network and the FoSci SIG. The UK is
FoSci SIG. historically strong in both the forensic sciences
and in the development of new technologies
CONCLUSIONS for use in other markets. The KTN and the SIG
Accessing the forensic science market is can help to bring the two together, by pulling
not straightforward. The market is small, technologies proven in different sectors over
fragmented and, in many countries, the main to forensics, and leveraging funding that has
customer base is the police service or other already been committed from other areas.
government agencies. A company approaching
forensic science for the first time needs to
have a strong business case, ideally based on THE RISE (AND PROJECTED
multiple jurisdictions, to ensure that the effort INCREASE) IN THE USE OF BIOMETRIC
will yield a return on investment. However, the
UK’s Forensic Science Special Interest Group TECHNIQUES IN THE FORENSIC
(FoSci SIG) has invested in mapping the key SCIENCES MEANS THAT ETHICS
stakeholders involved, and detailing the process
steps required to bring a new technology to AND PRIVACY CONSIDERATIONS
market. BECOME EVER MORE IMPORTANT.
Two of the main considerations are ethics
and validation. The rise (and projected
increase) in the use of biometric techniques
in the forensic sciences means that ethics and
privacy considerations become ever more
important. Researchers are developing DNA
techniques that will allow them to determine
details of a suspect’s physical characteristics
(eye colour, ethnicity, hair colour etc), along
with other biomarkers that could offer insights
REFERENCES ence Services in England and
Wales’ Policing 2014: volume 8,
pages 254-264. Available from
http://policing.oxfordjournals.org/
SECTION 1 evidence and the police: The content/8/3/254
CHAPTER 1: effects of scientific evidence on 14. Committee on Identifying the
FORENSIC SCIENCE IN criminal investigations’ National Needs of the Forensic Sciences
CONTEXT Institute of Justice 1984. Available Community, National Research
1. House of Commons Science and from https://www.ncjrs.gov/pdf- Council ‘Strengthening Forensic
Technology Committee files1/95704.pdf Science in the United States: A
‘The Forensic Science Service: 8. Roman JK and other s ‘The DNA Path Forward’ 2009. Available
Seventh Report of Session 2010- field experiment: Cost-effective- from https://www.ncjrs.gov/pdf-
2012’ HC855. Available from ness analysis of the use of DNA files1/nij/grants/228091.pdf
http://www.publications.parliament. in the investigation of high-vol-
uk/pa/cm201012/cmselect/cm- ume crimes’ Justice Policy Center, Case Study: A paradigm shift in UK
sctech/855/855.pdf Urban Institute 2008. Available forensic science
2. House of Commons Science and from https://www.ncjrs.gov/pdf- 1. Committee on Identifying
Technology Committee files1/nij/grants/222318.pdf the Needs of the Forensic
‘Forensic Science: Second Report 9. Pyrek K ‘Forensic science under Sciences Community, National
of Session 2013–14’ HC610. siege: the challenges of forensic Research Council ‘Strength-
Available from http://www.publica- laboratories and the medico-le- ening Forensic Science in the
tions.parliament.uk/pa/cm201314/ gal death investigation system’ United States: A Path Forward’
cmselect/cmsctech/610/610.pdf Elsevier Academic Press 2007 2009. Available from https://
3. Hester M ‘Making it through the (Amsterdam). www.ncjrs.gov/pdffiles1/nij/
192 grants/228091.pdf
Criminal Justice System: Attrition 10. Strom KJ and Hickman MJ (ed-
and Domestic Violence’ Social itors) ‘Forensic Science and the 2. The Royal Society ‘The par-
Policy and Society 2006: volume Administration of Justice: Critical adigm shift for UK foren-
5, pages 79-90. Issues and Directions’ Sage sic science’ 2015. Available
Available from http://jounals.cam- Publications 2014. from https://royalsociety.org/
bridge.org/action/displayAbstract?- 11. Burrows J and others ‘Under- events/2015/02/forensic-science/
fromPage=online&aid=378481&- standing the attrition process 3. Nic Daeid N and Black S
fileId=S1474746405002769 in volume crime investigations’ (editors) ‘Discussion meeting
4. Ministr y of Justice ‘Transforming Home Office Research, Develop- issue: The paradigm shift for
the CJS: A Strategy and Action ment and Statistics Directorate forensic science’ Philosophical
Plan to Reform the Criminal November 2005: Home Office Transactions B 2015: volume
Justice System’ June 2013. Availa- Research Study 295. Available 370, issue 1674. Available from
ble from https://www.gov.uk/gov- from https://www.gov.uk/govern- http://rstb.royalsocietypublishing.
ernment/uploads/system/uploads/ ment/uploads/system/uploads/ org/content/370/1674
attachment_data/file/209659/ attachment_data/file/115828/ 4. The Royal Society ‘The par-
transforming-cjs-2013.pdf hors295.pdf adigm shift for UK forensic
5. Fuller S ‘Kuhn Vs.Popper: The 12. Independent Police Commisson science – further discussion’
Struggle for the Soul of Science’ ‘Policing for a Better Britain’ 2014: 2015. Available from https://
Icon Books Ltd 2003 Appendix 10: Forensic science royalsociety.org/events/2015/02/
6. Peterson JL and Sommers I services for the forensic-science-satellite/
‘The Role and Impact of Forensic Criminal Justice System of
Evidence in the Criminal Justice England and Wales, pages 211- CHAPTER 2:
Process’ National 225. Available from http://inde- FORENSIC SCIENCE IN
Institute of Justice 2010. Available pendentpolicecommission.org.uk/ PRACTICE
at https://www.ncjrs.gov/pdffiles1/ uploads/37d80308-be23-9684- 1. National DNA Database
nij/grants/231977.pdf 054d-e4958bb9d518.pdf Strategy Board ‘Annual Report
7. Peterson JL and others ‘Forensic 13. Gallop A and Brown J ‘The 2013-14’ Home Office 2014.
Market Future for Forensic Sci- Available from https://www.

GO_Science_Innovation_REFS_PRINT.indd 192 30/11/2015 16:46


gov.uk/government/uploads/sys- Case Study: Forensic science in higher Council ‘Strengthening Forensic
tem/uploads/attachment_data/ education Science in the United States: A
file/387581/NationalDNAdata- 1. Quality Assurance Agency Path Forward’ 2009. Available
base201314.pdf for Higher Education ‘Subject from https://www.ncjrs.gov/pdf-
2. Law Commission ‘Expert evi- benchmark statement: Forensic files1/nij/grants/228091.pdf
dence in criminal proceedings science’ 2012. Available from
in England and Wales’ 21 March http://www.qaa.ac.uk/en/Publica- CHAPTER 3:
2011, Law Com Number 325. tions/Documents/Subject-bench- ASSURANCE — STANDARDS,
Available from lawcommission. mark-statement-forensic-science. VALIDATION AND
justice.gov.uk/areas/expert-evi- pdf ACCREDITATION
dence-in-criminal-trials.htm 2. Rankin BWJ, Taylor G and 1. Criminal Procedure Rule Com-
3. Forensic Science Regulator Thompson TJU ‘Should Higher mittee ‘Criminal Procedure Rules’
‘Codes of Practice and Conduct Education respond to recent Ministry of Justice 2015
for forensic science providers changes in the forensic science 2. ISO ‘ISO/IEC 17025:2005 General
and practitioners in the Crimi- marketplace?’ New Directions requirements for the competence
nal Justice System’ August 2014. 2012: volume 8, pages 27-32 of testing and calibration labora-
Available from https://www.gov. 3. Times Higher Education ‘Teach- tories’
uk/government/publications/foren- ing Excellence Framework 3. ISO ‘ISO/IEC 17020:2012 General
sic-science-providers-codes-of-prac- (TEF): everything you need criteria for the operation of var-
tice-and-conduct-2014 to know’ 2015. Available from ious types of bodies performing
4. Ministry of Justice ‘Rules and Prac- https://www.timeshighereducation. inspection’
tice Directions’ October 2015. co.uk/news/teaching-excellence- 4. Criminal Procedure Rule Com-
Available from https://www.justice. framework-tef-everything-you- mittee ‘Criminal Procedure
gov.uk/courts/procedure-rules/crimi- need-to-know Rules 2014 and Criminal Prac-
nal/rulesmenu-2015 4. The Chartered Society of tice Directions’. Available from 193
5. Cour ts and Tribunals Judiciary Forensic Sciences ‘The Accred- https://www.gov.uk/government/
‘Criminal Practice Directions: itation Process’ 2015. Available publications/criminal-proce-
Amendment No.2’ July 2014. from http://www.csofs.org/accred- dure-rules-2014-and-criminal-prac-
Available from https://www. itation tice-directions
judiciary.gov.uk/publications/crim- 5. Forensic Science Regulator.
inal-practice-directions-amend- Case Study: The commercial providers’ Available from https://www.gov.uk/
ment-no-2/ perspective government/organisations/foren-
6. R v. Doheny & Adams [1997] 1 1. National Audit Office ‘Briefing sic-science-regulator/about
Cr. App. R. 369; (CA Crim Div) for the House of Commons 6. Home Office ‘Government
7. European Network of Forensic Science and Technology Com- response to the consultation
Science Institutes ‘ENFSI guideline mittee: The Home Office’s on new statutory powers for
for evaluative reporting in foren- oversight of forensic services’ the Forensic Science Regulator’
sic science’ 2015. Available from December 2014. Available from July 2015. Available from https://
https://www.unil.ch/esc/files/live/ http://www.nao.org.uk/wp-content/ www.gov.uk/government/uploads/
sites/esc/files/Fichiers%202015/ uploads/2015/01/The-Home-Of- system/uploads/attachment_data/
ENFSI%20Guideline%20Evalua- fice%E2%80%99s-oversight-of-fo- file/447338/2015-07-15_-_Gov-
tive%20Reporting rensic-services.pdf ernment_response_to_the_consul-
8. House of Commons Science and 2. Science and Technology Com- tation_on_new_statutory.pdf
Technology Committee ‘Forensic mittee ‘Forensic Science’ Second 7. Forensic Science Regulator ‘Our
Science: Second Report of Ses- Report of Session 2013-14: Governance’. Available from
sion 2013–14’ HC610. Available HC 610. Available from http:// https://www.gov.uk/government/
from http://www.publications.parlia- www.publications.parliament. organisations/forensic-science-regu-
ment.uk/pa/cm201314/cmselect/ uk/pa/cm201314/cmselect/cm- lator/about/our-governance
cmsctech/610/610.pdf sctech/610/610.pdf 8. Forensic Science Regulator
3. Committee on Identifying the ‘Codes of Practice and Conduct
Needs of the Forensic Sciences for Forensic Science Providers
Community, National Research and Practitioners in the Criminal

GO_Science_Innovation_REFS_PRINT.indd 193 30/11/2015 16:46


Justice System, version 2.0’ August Available from http://www.bipm. _evidence/core_foundation_princi-
2014. Available from https://www. org/en/committees/cipm/joint-work- ples_for_forensic_science_provid-
gov.uk/government/collections/foren- ing-groups.html ers/
sic-science-providers-codes-of-prac- 18. ILAC ‘Modules in a Forensic Sci- 26. The Chartered Society of
tice-and-conduct ence Process’ ILAC G19:08/2014. Forensic Sciences ‘Membership’.
9. Home Office ‘Consultation on Available from http://ilac.org/news/ Available at http://www.csofs.org/
new statutory powers for the ilac-g19082014-published/ membership/accredited
forensic science regulator’ 2013 19. ISO ‘Information technology --
10. International Organization for Security techniques -- Guidelines Case Study: UKAS accreditation:
Standardization (ISO). Available for identification, collection, acqui- providing confidence in forensic science
from http://www.iso.org/iso/home. sition and preservation of digital 1. ISO/IEC 17025:2005 ‘General
html evidence’ ISO/IEC 27037:2012. requirements for the competence
11. United Kingdom Accreditation Available from http://www.iso. of testing and calibration laborato-
Service ‘UKAS Guidance on the org/iso/catalogue_detail?csnum- ries’. Available from http://www.iso.
Application of ISO/IEC 17025 ber=44381 org/iso/catalogue_detail.htm?csnum-
Dealing with Expressions of 20. Home Office ‘Research and ber=39883
Opinions and Interpretations’ Development in Forensic Science: 2. ISO/IEC 17020:2012 ‘Conformity
LAB13. Available from http://www. a Review’ 2011. Available from assessment - Requirements for
ukas.com/download/publications/ https://www.gov.uk/government/ the operation of various types
publications-relating-to-laborato- uploads/system/uploads/attach- of bodies performing inspection’.
ry-accreditation/LAB13ed2.pdf ment_data/file/118916/foren- Available from http://www.iso.
12. Laboratory Accreditation Bureau sic-science-review-report.pdf org/iso/catalogue_detail?csnum-
‘Program Requirements: Forensic 21. Forensic Science Special Interest ber=52994
Science Laboratory Accreditation Group ‘Forensic Science UK Inno- 3. ILAC-G19:08/2014 ‘Modules
194 Program’ LABPR 413 2012. Avail- vation Database’. Available from in a Forensic Science Process’.
able from http://l-a-b.com/wp-con- https://connect.innovateuk.org/web/ Available from http://ilac.org/news/
tent/uploads/LABPR-413-Foren- forensics/innovation-database ilac-g19082014-published/
sic-Science-Rev-2-5-29-12.pdf 22. National Audit Office ‘Briefing 4. Forensic Science Regulator
13. UKAS ‘M3003:The Expression for the House of Commons ‘Codes of Practice and Conduct
of Uncertainty and Confidence Science and Technology Com- for forensic science providers
in Measurement’ 2012. Available mittee:The Home Office’s and practitioners in the Criminal
from http://www.ukas.com/down- Oversight of Forensic Services’ Justice System’ (Version 2.0 Au-
load/publications/publications-re- December 2014. Available from gust 2014). Available from https://
lating-to-laboratory-accreditation/ http://www.nao.org.uk/wp-content/ www.gov.uk/government/uploads/
M3003_Ed3_final.pdf uploads/2015/01/The-Home-Of- system/uploads/attachment_data/
14. Forensic Science Regulator ‘Guid- fice%E2%80%99s-oversight-of-fo- file/351197/The_FSR_Codes_of_
ance:Validation’ FSR-G-201, 2014 rensic-services.pdf Practice_and_Conduct_-_v2_Au-
15. ILAC ‘Application of ISO/IEC 23. House of Commons Science and gust_2014.pdf
17020:2012 for the Accred- Technology Select Committee
itation of Inspection Bodies’ ‘The Forensic Science Service CHAPTER 4:
ILAC P15:06/2014. Available - Science and Technology Com- COGNITIVE AND
from http://ilac.org/news/il- mittee: 2. The forensics market’. HUMAN FACTORS
ac-p15062014-published/ Available from http://www.publica- 1. Matlin M ‘Cognition’ 8th Edition,
16. ILAC AIC and BIPM ‘Joint ILAC – tions.parliament.uk/pa/cm201012/ Wiley Press 2013
CIPM Communication regarding cmselect/cmsctech/855/85505. 2. Posner MI ‘Foundations of Cogni-
the Accreditation of Calibration htm tive Science’ MIT Press 1989
and Measurement Services of 24. UK Accreditation Service. Availa- 3. Dror IE ‘Practical Solutions to
National Metrology Institutes’ ble from http://www.ukas.com/ Cognitive and Human Factor
2012. Available from http://www. 25. CPS ‘Core Foundation Principles Challenges in Forensic Science’
bipm.org/utils/common/pdf/il- for Forensic Science Providers’ Forensic Science Policy & Man-
ac-cipm_joint_communication.pdf 2010. Available from http://www. agement 2014: volume 4, pages
17. BIPM ‘Joint Working Groups’. cps.gov.uk/legal/s_to_u/scientific 105-113

GO_Science_Innovation_REFS_PRINT.indd 194 30/11/2015 16:46


4. Dror IE ‘The paradox of human POST-PB-0015#fullreport. 2014: volume 54, pages 208–214
expertise: Why experts get it 13. Dror IE ‘Cognitive neuroscience 23. Osbourne NKP and others
wrong’ in Kapur N (Ed.) ‘The Para- in forensic science: Understanding ‘Does contextual information bias
doxical Brain’ Cambridge Universi- and utilising the human element’ bitemark comparisons?’ Science
ty Press 2011, pages 177-188 Philosophical Transactions of the & Justice 2014: volume 54, pages
5. Raymond NS ‘Confirmation Bias: Royal Society 2015: volume 370, 267–273
A ubiquitous phenomenon in 20140255 24. Kerstholt JH and others ‘Shoe
many guises’ Review of General 14. Berger v. United States, 295 U.S. print examinations: effects of ex-
Psychology 1998: volume 2, pages 78, 88 (1935) pectation, complexity and experi-
175–220 15. Kozinski A. Criminal Law 2.0, 44th ence’ Forensic Science Internation-
6. Alameddine M and others ‘The Annual Review of Criminal Pro- al 2007: volume 165, pages 30–34
intensive care unit work envi- cedure. Georgetown Law Journal, 25. Kerstholt J and others ‘Does sug-
ronment: Current challenges and 44, iii-xliv (2015) gestive information cause a confir-
recommendations for the future’ 16. Mnookin JL, Cole SA, Dror IE, mation bias in bullet comparisons?’
Journal of Critical Care 2009: Fisher BA, Houck MM, Inman K, Forensic Science International
volume 24, pages 243–248 Kaye DH, Koehler JJ, Langenburg L, 2010: volume 198, pages 138–142
7. Dror IE and others ‘Cognitive Risinger M, Rudin N, Siegel J, and 26. Dror IE and others ‘Contextual
issues in fingerprint analysis: Stoney DA. (2011). information renders experts
Inter-and intra-expert consistency The need for a research culture in vulnerable to making erroneous
and the effect of a ‘target’ compar- the forensic sciences. UCLA Law identifications’ Forensic Science
ison’ Forensic Science Internation- Review, 58 (3), 725-779. International 2006: volume 156,
al 2011: volume 208, pages 10-17 17. R v Shahiriar Firouzian, case pages 74–78
8. Dror IE and Cole S ‘The vision in T20110667, Blacfriars Crown 27. Laber T and others ‘Reliability
‘blind’ justice: Expert perception, Court. assessment of current methods in
judgment and visual cognition in 18. Edmond G and others ‘Contextu- bloodstain pattern analysis’ Final 195
forensic pattern recognition’ Psy- al bias and cross-contamination in Report for the National Institute
chonomic Bulletin & Review 2010: the forensic sciences:The corro- of Justice. Award # 2010-DN-
volume 17, pages 161-167 sive implications for investigations, BX-K213: 2014. Available from
9. Dror IE and Hampikian G ‘Sub- plea bargains, trials and appeals’ https://www.ncjrs.gov/pdffiles1/nij/
jectivity and bias in forensic DNA Law, Probability, and Risk 2015: grants/247180.pdf
mixture interpretation’ Science & volume 14, pages 1-25 28. Bieber P ‘Measuring the impact
Justice 2011: volume 51, 204-208 19. Found F ‘Deciphering the human of cognitive bias in fire investi-
10. Coble M ‘Interpretation Errors condition: the rise of cognitive gation’ International Symposium
Detected in a NIST Inter-labo- forensics’ Australian Journal of on Fire Investigation Science and
ratory Study on DNA Mixture Forensic Sciences 2015: volume Technology 2012: pages 3–15.
Interpretation in the U.S. (MIX13)’ 47, pages 386-401 Available from http://thearson-
Presentation at the International 20. Dror IE and Rosenthal R ‘Meta-an- project.org/charm/wp-content/
Symposium on Forensic Science alytically quantifying the reliability uploads/2013/12/Cognative_Bias_
Error Management – Detection, and biasability of forensic experts’ ARP.pdf
Measurement and Mitigation. Journal of Forensic Sciences 2008: 29. Murrie D and others ‘Are forensic
Washington DC 2015 volume 53, pages 900-903 experts biased by the side that
11. Uler y BT and others ‘Repeatability 21. Bressan P and Dal Mar tello MF retained them?’ Psychological
and Reproducibility of Decisions ‘Talis Pater,Talis Filius: Perceived Science 2013: volume 24, pages
by Latent Fingerprint Examin- resemblance and the belief in 1889–1897
ers’ PLoS ONE 2012: volume 7, genetic relatedness’ Psychological 30. Dror IE and Mnookin J ‘The use
e32800 Science 2002: volume 13, pages of technology in human expert
12. Stammers S and Bunn S ‘Unin- 213–218 domains: Challenges and risks
tentional bias in forensic investiga- 22. Nakhaeizadeh S and others ‘Cog- arising from the use of auto-
tion’ Houses of Parliament 2015: nitive bias in forensic anthropol- mated fingerprint identification
POSTbrief PB-15. Available from ogy:Visual assessments of skeletal systems in forensics’ Law, Prob-
http://researchbriefings.parliament. remains is susceptible to con- ability and Risk 2010: volume 9,
uk/ResearchBriefing/Summary/ firmation bias’ Science & Justice pages 47-67

GO_Science_Innovation_REFS_PRINT.indd 195 30/11/2015 16:46


31. Dror IE and other s ‘The impact to forensic science examinations’ www.biteproject.org/documents/
of human-technology coopera- 2015. Available from https:// EU_Biometrics_at_the_Frontiers.
tion and distributed cognition in www.gov.uk/government/uploads/ pdf (accessed September 2015)
forensic science: Biasing effects system/uploads/attachment_data/ 6. Zhu Y and others ‘Biometric
of AFIS contextual information file/470549/FSR-G-217_Cogni- personal identification system
on human experts’ Journal of tive_bias_appendix.pdf based on iris pattern’ Chinese
Forensic Sciences 2012: volume Patent Application 1999: number
57, pages 343-352 SECTION 2 9911025.6
32. Stacey RB ‘Report on the erro- CHAPTER 5: 7. Kisku DR and others ‘Advances
neous fingerprint individualization THE CHANGING NATURE OF in Biometrics for Secure Human
bombing case’ Journal of Forensic CRIME Authentication and Recognition’
Identification 2004: volume 54, CRC Press (Florida) 2013
pages 706-718 Case Study:Trojan opens the gates to 8. International Biometric Group
33. Campbell A ‘The Finger- company cash ‘Biometrics Market and Industry
print Inquiry Report’ 2011. 1. PwC . ‘2015 Information Security Report 2004-2008’ (2006). Availa-
Available from http://www. Breaches Survey’. http://www.pwc. ble from http://www.ereleases.com/
webarchive.org.uk/wayback/ar- co.uk/assets/pdf/2015-isbs-techni- pr/international-biometric-group-re-
chive/20150428160103/http:// cal-report-blue-03.pdf leases-biometrics-market-and-in-
www.thefingerprintinquiryscotland. dustry-report-20042008-3254
org.uk/inquiry/files/TheFingerprintIn- CHAPTER 6: (accessed September 2015)
quiryReport_Low_res.pdf IDENTITY AND 9. Planet Biometrics ‘Global biom-
34. The High Court Of Justice Court IDENTIFICATION etric forecast to 2012’ (2011).
Of Appeal (Criminal Division), 1. Fearon JD ‘What is identity (as Available from http://www.rncos.
Regina and Peter Kenneth Smith we now use the word)’ (1999). com/Report/IM140.htm (accessed
196 2011: EWCA Crim 1296. Available from http://www.seminar- September 2015)
35. Garrett BL and Neufeld PJ ‘Invalid io2005.unal.edu.co/Trabajos/Fearon/ 10. Galloway V and Charlton D
forensic science testimony and What%20is%20identity%20(as%20 ‘Fingerprints’ in ‘Forensic Human
wrongful convictions’ Virginia Law we%20now%20see%20the%20 Identification: An Introduction’
Review 2009: volume 95, pages world).pdf (accessed September (editors Thompson T and Black S)
1-97 2015) CRC Press (Florida) 2007, pages
36 Dror IE and other s ‘Context 2. Black SM and Nic Daeid N ‘Time 57-72
management toolbox: A linear to think differently: Catalysing a 11. Murphy E ‘The new forensics:
sequential unmasking (LSU) paradigm shift in forensic science’ Criminal justice, false certainty and
approach for minimizing cognitive Philosophical Transactions B 2015: the second generation of scientific
bias in forensic decision making’ volume 370, article 20140251 evidence’ California Law Review
Journal of Forensic Sciences 2015: 3. Harper J ‘Identity Crisis: How 2007: volume 95, pages 721-797
volume 60, pages 1111-1112 Identification is oOverused and 12. Campbell A ‘The Fingerprint
37. Kassin SM and others ‘The foren- Misunderstood’ CATO Institute, Inquiry’ 2011. Available from http://
sic confirmation bias: Problems, Washington International Associa- www.thefingerprintinquiryscotland.
perspectives, and proposed solu- tion for Biometrics 2006 org.uk/inquiry/3127-2.html (ac-
tions’ Journal of Applied Research 4. Bandyopadhyay SK and others ‘In- cessed September 2015)
in Memory and Cognition 2013: formation security and assurance’ 13. Jain AK and Ross AA ‘Introduction
volume 2, pages 42-52 ISA 4th International Conference, to Biometrics’ in ‘Handbook of
38. Dror IE and others ‘New applica- Springer-Verlag (Berlin) 2010: Biometrics’ (editors Jain AK, Flynn
tion of psychology to law: Improv- pages 108-115 P and Ross AA) Springer (New
ing forensic evidence and expert 5. European Commission ‘Biomet- York) 2008: pages 1-23
witness contributions’ Journal of rics at the frontiers: Assessing the 14. Jain AK and Ross AA ‘Bridging the
Applied Research in Memory and impact on society’Transportation gap: From biometrics to forensics’
Cognition 2013: volume 2, pages Research Board of the National Philosophical Transactions B 2015:
78-81 Academies,Technical Report volume 370, article 20140254
39. Forensic Science Regulator Series 2005: accession number 15. Black SM and others ‘SuperIden-
‘Cognitive bias effects relevant 1010900. Available from http:// tity: Fusion of identity across real

GO_Science_Innovation_REFS_PRINT.indd 196 30/11/2015 16:46


and cyber domains’ Refereed Pro- doorstep’ 2013. Available from Available from https://www.gov.uk/
ceedings of ‘ID360: Global Issues in https://www.cifas.org.uk/secure/ government/uploads/system/uploads/
Identity’ (Texas) 23-24 April 2012 contentPORT/uploads/documents/ attachment_data/file/409774/14-
16. Wilson C ‘Vein Pattern Recogni- External-IDcrime_onyourdoorstep_ 1230-internet-of-things-review.pdf
tion: A Privacy Enhancing Biomet- Cifas_OS.pdf (accessed September 3. Foreign and Commonwealth
ric’ CRC Press (Florida) 2010 2015) Office ‘Convention on Cybercrime’
17. Wagley J ‘Vein Recognition Use 25. Techweek Europe “ Floodgates Budapest, 23 November 2001,
Grows’ Security Management have opened” for biometrics indus- Cm8309. Available from https://
2011. Available from http://www. try following Christmas demand’ www.gov.uk/government/uploads/
securitymanagement.com/article/ 22 December 2014. http://www. system/uploads/attachment_data/
vein-recognition-use-grows (accessed techweekeurope.co.uk/e-innovation/ file/238194/8309.pdf
September 2015) biometrics-mobile-payments-christ- 4. National Commission on Forensic
18. Black SM and others ‘Forensic mas-157920 (accessed September Science ‘Scientific Literature in
hand image comparison as an 2015) Support of Forensic Science and
aid for paedophile investigations’ 26. Sahoo SK and others ‘Multimodal Practice’ January 2015. Available
Police Professional 2009: volume biometric person authentication: from http://www.justice.gov/sites/
184, pages 21-24 A review’ IETE Technical Review default/files/ncfs/pages/attach-
19. Ferguson PR and Raitt FE “If a pic- 2012: volume 29, pages 54-75 ments/2015/01/21/scientificlitera-
ture paints a thousand words….”: 27. Rodrigues RN and others ‘Evalu- tureviewsdocumentfinaljan2015.pdf
The development of human iden- ation of biometric spoofing in a 5. FBI ‘FBI Testimony on Microscopic
tification techniques in forensic an- multimodal system’ from ‘Biom- Hair Analysis Contained Errors
thropology and their implications etrics:Theory applications and in at Least 90 Percent of Cases
for human rights in the criminal systems’ 4th IEEE International in Ongoing Review’ April 2015.
process’The International Journal Conference 27-29 September Available from https://www.fbi.gov/
of Evidence & Proof 2013: volume 2010: pages 1-5 news/pressrel/press-releases/fbi-tes- 197
17, pages 127-156 28. Zelazny F ‘The evolution of India’s timony-on-microscopic-hair-analysis-
20. Law Commission ‘Expert UID program’ CGD 2012: policy contained-errors-in-at-least-90-per-
Evidence in Criminal Proceedings paper 008. Available from http:// cent-of-cases-in-ongoing-review
in England and Wales’The Station- www.cgdev.org/files/1426371_file_ 6. Zatyko KR ‘Commentary: De-
ery Office (London) 2011: report Zelazny_India_Case_Study_FINAL. fining Digital Forensics’ Forensic
number 325 pdf (accessed September 2015) Magazine January 2007. Available
21. Pyrek KM ‘Forensic Science Under from http://www.forensicmag.com/
Siege:The Challenges of Forensic Case Study: Emerging biometrics in the articles/2007/01/commentary-defin-
Laboratories and the Medico-Le- courtroom ing-digital-forensics
gal Investigation 1. Black S, Macdonald-Mcmillan B 7. Zatyko KR and Bay J ‘The Digital
System’ Academic Press and Mallett X ‘The incidence of Forensics Cyber Exchange Princi-
(California) 2007 scarring on the dorsum of the ple’ Forensic Magazine 2011. Avail-
22. CIFAS ‘Fraudscape: UK fraud hand’ International Journal of Legal able from http://www.forensicmag.
trends’ 2014. Available from Medicine 2014: volume 128, pages com/articles/2011/12/digital-foren-
http://www.cifas.org.uk/secure/ 545-553 sics-cyber-exchange-principle
contentPORT/uploads/documents/ 8 International Information System
External%20-%20Fraudscape%20 CHAPTER 7: Security Certification Consortium
main%20report%20for%20website. CYBER FORENSICS ‘Leadership for the Field of Cyber
pdf (accessed September 2015) 1. Detica and the Office of Cyber Se- Forensics’. Available from https://
23. CIFAS ‘Fraudscape: Depicting curity and Information Assurance learning.isc2.org/sites/learning.isc2.
the UK’s fraud landscape’ 2014. in the Cabinet Office ‘The Cost of org/files/CCFP-WEB.pdf
Available from https://www.cifas. Cyber Crime’ 2011. Available from 9 NIST ‘NIST Cloud Computing
org.uk/secure/contentPORT/uploads/ https://www.gov.uk/government/pub- Forensic Science Challenges’ June
documents/Cifas%20Reports/Exter- lications/the-cost-of-cyber-crime-joint- 2014. Available from http://csrc.nist.
nal-Cifas-Fraudscape-2014-online. government-and-industry-report gov/publications/drafts/nistir-8006/
pdf (accessed September 2015) 2. Government Office for Science draft_nistir_8006.pdf
24. CIFAS ‘Identity crime on your ‘The Internet of Things’ (2014). 10 Zatyko KR and Cohen A ‘Trust no

GO_Science_Innovation_REFS_PRINT.indd 197 30/11/2015 16:46


one: fighting the hackers abroad barcouncil.org.uk/media/210686/ DNA Data Exchange’ Northum-
and at home’ Intellectual Property bar_council_of_e__w_response_to_ bria University Final Report 2015.
Magazine July 2014. Available from hl_inquiry_on_opt-out_2014final.pdf Available from http://nrl.northum-
http://www.intellectualproperty- 7. Interpol ‘Interpol network links fo- bria.ac.uk/23383/1/Final_report.pdf
magazine.com/patent/trust-no-one- rensic laboratories in G8 countries’ 15. Rienzo C and Vargas-Silva C
fighting-the-hackers-abroad-and-at- 6 July 2007. Available from http:// ‘Migrants in the UK: an Overview’
home-101781.htm www.interpol.int/News-and-media/ 2014. Available from http://www.
News/2007/PR029 migrationobservatory.ox.ac.uk/brief-
CHAPTER 8: 8. ICMP ‘ICMP joins INTERPOL in ings/migrants-uk-overview
THE GLOBAL PERSPECTIVE Responding to Malaysian Airlines 16. Commissioner for the Retention
1. The author is grateful for informa- Flight MH 17 Crash’ 19 July 2014. and use of Biometric Material ‘An-
tion and assistance from Susan Available from http://www.ic-mp. nual Report 2014’. Available from
Ballou and Mark Stolorow, NIST; org/press-releases/icmp-joins-inter- https://www.gov.uk/government/
Professor Peter Bilous, Eastern pol-mh-17-crash/ uploads/system/uploads/attach-
Washington University; Sophie 9. Federal Bureau of Investigation ment_data/file/387573/Biomet-
Carr, Faculty of Health and Life ‘CODIS Brochure’. Available from ricsAnnualReport201314Print.pdf
Sciences, Northumbria University; https://www.fbi.gov/about-us/lab/ 17. Home Office ‘Serious and
Dr Patrick Jeuniaux, NICC, Dr biometric-analysis/codis/codis_bro- Organised crime Strategy’ 2015.
Elisabet Leitet, Swedish National chure Available from https://www.gov.uk/
Forensic Centre; and Dr Michael 10. The Council of the European government/publications/serious-or-
Stockdale, Director NCECJS, Union ‘Council Decision of 6 ganised-crime-strategy
Northumbria University. April 2009 establishing the Eu- 18. Netherlands Forensic Institute
2. Finch T and others ‘Global Brit: ropean Police Office (Europol) ‘Dutch DNA database has result-
Making the most of the British (2009/371/JHA) Official Journal of ed in 25,000 international match-
198 diaspora’ Institute for Public Policy the European Union 15 May 2009: es’ 2015. Available from http://
Research 2010, page 7 L121/37 www.forensicinstitute.nl/about_nfi/
3. Baker S and others ‘Review of 11. The Council of the European Un- news/2015/dutch-dna-data-
the United Kingdom’s Extradition ion ‘Council Decision 2008/615/ base-has-resulted-in-25000-interna-
Arrangements’ Home Office JHA of 23 June 2008 on the tional-matches.aspx
2011. Available from https:// stepping up of cross-border co- 19. Information provided by the
www.gov.uk/government/uploads/ operation in combating terrorism Nationaal Instituut voor Crimi-
system/uploads/attachment_data/ and cross-border crime’ Official nalistiek en Criminologie (NICC)
file/117673/extradition-review.pdf Journal of the European Union 6 / Institut National de Criminal-
4. Goudge ST ‘Inquiry into Paediatric August 2008: L210/1 istique et Criminologie (INCC)
Pathology in Ontario’ 2008: vol- 12. Ministr y of Justice ‘Criminal Justice from work undertaken by Dr
ume 1, page 36. Available at http:// Statistics Quarterly Update to Patrick Jeuniaux under the PIES
www.goudgeinquiry.ca March 2015: England and Wales’ project - The Prüm Implementa-
5. Heijnen W ‘DVI aspects of forensic 13 August 2015. Available from tion, Evaluation, and Strengthening
investigation’ Plenary session iv, 7th https://www.gov.uk/government/ of Forensic DNA Data Ex-
European Academy of Forensic uploads/system/uploads/attach- change (HOME/2011/ISEC/AG/
Science Conference, 11 Septem- ment_data/file/453309/crimi- PRUM/4000002150)
ber 2015 nal-justice-statistics-march-2015. 20. House of Commons Science and
6. The Bar Council of England and pdf.pdf Technology Committee ‘Forensic
Wales ‘Response to the Select 13. Johnson D ‘E.U. migrant criminal Science on Trial’ HC 2004–05:
Committee on the European Un- activity: Exploring spatial diversity volume 1, pages 74-80. Available
ion Sub-Committee E (Justice, Insti- and volume of criminal activity from http://www.publications.parlia-
tutions and Consumer Protection) attributed to inter EU migrants in ment.uk/pa/cm200405/cmselect/
and Sub-Committee F (Home England’ Applied Geography 2014: cmsctech/96/96i.pdf
Affairs, Health and Education) Call volume 50, pages 48-62 21. Lundy v R [2013] UKPC 28
for Evidence on the UK’s 2014 14. Johnson D and others ‘The Prüm 22. Forensic Science Regulator
Opt-out Decision (Protocol 36)’ Implementation, Evaluation and ‘Forensic science providers: codes
2012. Available from http://www. Strengthening (P.I.E.S.) of Forensic of practice and conduct, 2014’.

GO_Science_Innovation_REFS_PRINT.indd 198 30/11/2015 16:46


Available from https://www.gov. BMJ Open 2015: volume 5, article Thomas of Cwmgiedd ‘Criminal
uk/government/publications/foren- e007307 Bar Association Kalisher Lecture’
sic-science-providers-codes-of-prac- 31. Zhao J and others ‘The establish- 2014. Available from http://www.
tice-and-conduct-2014 ment of Multiplex PCR-Capillary judiciary.gov.uk/wp-content/up-
23. Salet R and Terpstra J ‘Critical electrophoresis method for loads/2014/10/kalisher-lecture-ex-
Review in Criminal Investigation: forensic algae test’ Presentation at pertevidence-oct-14.pdf
Evaluation of a Measure to Pre- the 7th European Academy of Fo- 43. Comparative GDP Data from the
vent Tunnel Vision’ Policing 2014: rensic Science Conference 2015 World Bank website: http://data.
volume 8, pages 43–50 32. Council Framework Decision worldbank.org/country?display=-
24. Kloosterman A and others ‘The 2009/905/JHA of 30 November graph Accessed 06.11.15
interface between forensic science 2009 on Accreditation of forensic
and technology: how technology service providers carrying out Case Study:Wildlife Crime
could cause a paradigm shift in laboratory activities. 1. United Nations Office on Drugs
the role of forensic institutes in 33. Council Decision 2008/615/JHA and Crime ‘Wildlife and Forest
the criminal justice system’ Phil. of 23 June 2008 on the stepping Crime’. Available from https://www.
Trans. R. Soc. B 2015: volume up of cross-border cooperation, unodc.org/unodc/en/wildlife-and-for-
370, article 20140264. Available particularly in combating terror- est-crime/
from http://dx.doi.org/10.1098/ ism and cross-border crime 2. CITES ‘What is CITES?’. Available
rstb.2014.0264 34. Directive 2010/64/EU of The from https://cites.org/eng/disc/what.
25. Committee on Identifying the European Parliament And of The php
Needs of the Forensic Sciences Council of 20 October 2010 on 3. http://www.sasa.gov.uk/wildlife-envi-
Community, National Research the right to interpretation and ronment/wildlife-crime
Council ‘Strengthening Forensic translation in criminal proceedings; 4. Huffman JE and Wallace JR
Science in the United States: A and Directive 2012/13/EU of The ‘Wildlife forensics: methods and
Path Forward’ 2009. Available European Parliament and of The applications’Volume 6, John Wiley 199
from https://www.ncjrs.gov/pdf- Council of 22 May 2012 on the & Sons 2012
files1/nij/grants/228091.pdf right to information in criminal 5. Forensic Working Group ‘Wild-
26. Champod C ‘Fingerprint identifi- proceedings life crime: A guide to the use of
cation: advances since the 2009 35. Lynch M and others ‘Truth Ma- forensic and specialist techniques
National Research Council report’ chine:The Contentious History in the investigation of wildlife
Phil.Trans. R. Soc. B 2015: volume of DNA fingerprinting’ University crime’. Available from https://www.
370, article 20140259. Available of Chicago Press 2008: pages gov.uk/government/publications/
from http://dx.doi.org/10.1098/ 332-333 wildlife-crime-forensic-and-special-
rstb.2014.0259 36. Wilson TJ and Gallop AMC ist-techniques
27. Information from a briefing by Dr ‘Criminal Justice, Science and the 6. Ogden R ‘Forensic science, genet-
Elisabet Leitet, Swedish National Marketplace:The Closure of the ics and wildlife biology: getting the
Forensic Centre. Forensic Science Service in Per- right mix for a wildlife DNA foren-
28. House of Commons Science and spective’The Journal of Criminal sics lab’ Forensic science, medicine,
Technology Committee ‘Current Law 2013: volume 77, page 63 and pathology 2010: volume 6,
and Future Uses of Biometric 37. Rober ts P and Zuckerman A pages 172-179
Data and Technologies’ HC ‘Criminal Evidence’ 2nd edition, 7. Linacre A and others ‘ISFG:
2014–15 Oxford University Press 2010: recommendations regarding the
29. Zhu Y and others ‘Mortality 60-61 use of non-human (animal) DNA
among drowning rescuers in Chi- 38. Stephen Hamilton v R [2014] in forensic genetic investigations’
na, 2013: a review of 225 rescue EWCA Crim 1555 44 Forensic Science International:
incidents from the press’ BMC 39. Fr ye v US, 54 App DC 46; 113 S Genetics 2011: volume 5, pages
Public Health 2015: volume 15, Ct 2786 (1923) 501-505
page 631 40. Dauber t v Merrell Dow L 25 Ed 8. Society for Wildlife Forensic
30. Yin Z and others ‘Burden and 2d 46; 293F 1013 (1993) Science. Available from http://www.
trend analysis of injury mortality 41. R v. Clarke [1995] 2 Cr App R wildlifeforensicscience.org/
in China among children aged 425 429 9. NIST ‘Organization of Scientific
0–14 years from 2004 to 2011’ 42. The Lord Chief Justice, Lord Area Committees’. Available from

GO_Science_Innovation_REFS_PRINT.indd 199 30/11/2015 16:46


http://www.nist.gov/forensics/osac/ International Crime Victims Survey Property Crime, 2013/14 Release’.
index.cfm and the European Survey on Available from http://www.ons.gov.
Crime and Safety’ Intervict,Tilburg uk/ons/dcp171776_386643.pdf
CHAPTER 9: University 2008. Available from 5. BBC News ‘Mobile-phone ‘sting’
DESIGNING OUT CRIME http://papers.ssrn.com/sol3/papers. reveals honesty of Sussex pubgo-
1. Lord Thomas of Cwmgiedd cfm?abstract_id=1117972 ers’ 17 July 2012. Available from
‘Expert evidence: the future of 8. Sherman L and others ‘Prevent- http://www.bbc.co.uk/news/uk-eng-
forensic science in criminal trials’ ing Crime: What Works, What land-sussex-18871267
Criminal Bar Association Kalisher Doesn’t, What’s Promising’ Report 6. Farrell G ‘Preventing phone theft
Lecture 14 October 2014. Avail- to US Congress, National institute and robbery: the need for gov-
able from https://www.judiciary.gov. of Justice, July 1998: pages 7-48. ernment action and international
uk/wp-content/uploads/2014/10/ Available from https://www.ncjrs. coordination’ Crime Science 2015:
kalisher-lecture-expert-evi- gov/pdffiles/171676.PDF volume 4, article 4. Available from
dence-oct-14.pdf 9. Car ter C ‘Shoppers steal billions http://www.crimesciencejournal.com/
2. Committee on Identifying the through self service tills’ Daily Tel- content/4/1/4
Needs of the Forensic Sciences egraph 29 January 2014. Available 7. Behavioural Insight Team ‘Reducing
Community, National Research from http://www.telegraph.co.uk/ Mobile Phone Theft and Improv-
Council ‘Strengthening Forensic finance/personalfinance/house- ing Security’ 2014. Available from
Science in the United States: A hold-bills/10603984/Shoppers-steal- http://www.behaviouralinsights.
Path Forward’ 2009: page 7. Avail- billions-through-self-service-tills.html co.uk/publications/reducing-mo-
able from https://www.ncjrs.gov/ 10. House of Lords Select Committee bile-phone-theft-and-improving-se-
pdffiles1/nij/grants/228091.pdf on Science and Technology ‘Higher curity/
3. Crime Survey for England & Education in Science,Technology, 8. Mailley J and other s ‘Phone
Wales (available from http://www. Engineering and Mathematics theft index’ Security Journal
200 crimesurvey.co.uk/) (STEM) subjects’ 2nd Report 2008: volume 21, pages 212-
4. Home Office ‘Police recorded 2012-13. Available from http:// 227. Available from http://www.
crime and outcomes open data www.publications.parliament.uk/pa/ palgrave-journals.com/sj/journal/v21/
tables’ (available from https:// ld201213/ldselect/ldsctech/37/37. n3/full/8350055a.html
www.gov.uk/government/statistics/ pdf 9. Office for National Statistics
police-recorded-crime-open-data-ta- ‘Crime in England and Wales,Year
bles) Case Study: Designing out mobile phone Ending March 2015’. Available from
5. The 34th Annual Cumberland crime http://www.ons.gov.uk/ons/rel/crime-
Lodge Police Conference ‘Policing 1. Clarke R and others ‘Controlling stats/crime-statistics/year-ending-
Professionalism: Leadership, Ethics, cell phone fraud in the US’ Securi- march-2015/index.html
Public Confidence’ April 2015. ty Journal 2001: volume 14, pages
Available from http://www.cum- 7-22 SECTION 3
berlandlodge.ac.uk/Resources/Cum- 2. Fisher BS and Lab SP ‘Encyclo- CHAPTER 10:
berlandLodge2011/Documents/ paedia of Victimology and Crime AUTHENTICITY AND
Programme/Reports/Police%20 Prevention’ Sage 2010:Volume 1 PROVENANCE
Conference%20Summary%20Re- 3. Hall P ‘Mobile phone ownership 1. OECD ‘The economic impact of
port.pdf and theft’ in ‘Home security, mobile counterfeiting and piracy’ 2008
6. House of Commons Public phone theft and stolen goods: Sup- 2. Frontier Economics ‘Estimating the
Administration Select Committee plementary Volume 3 to Crime global economic and social impacts
(PASC) ‘Caught red-handed: Why in England and Wales 2007/08’ of counterfeiting and piracy’ 2011
we can’t count on Police Record- Home Office, London, May 2009: 3. Walker MJ, Burns M and Thorburn
ed Crime statistics’ 2014: HC760. pages 31-49. Available from Burns D ‘Horse meat in beef
Available from http://www.publica- webarchive.nationalarchives.gov. products, species substitution’
tions.parliament.uk/pa/cm201314/ uk/20110218135832/rds.homeof- Journal of the Association of Public
cmselect/cmpubadm/760/760.pdf fice.gov.uk/rds/pdfs09/hosb1009.pdf Analysts (Online) 2013: volume
7. John van Kesteren ‘Some main 4. Office for National Statistics ‘Chap- 41, pages 67 – 106
results on international compar- ter 1: Property Crime - Overview’ 4. Deisingha AK ‘Pharmaceutical
ison and trends: results from the in ‘Crime Statistics, Focus on counterfeiting’ Analyst 2005: vol-

GO_Science_Innovation_REFS_PRINT.indd 200 30/11/2015 16:46


ume130, pages 271-279 Chemistry 2010: volume 398, stride’ Nature Methods 2012:
5. Arslan MM and others. ‘Analysis pages 2779-88 volume 9, pages 541–544
of methanol and its derivatives 15. For example, Rubert J, Lacina O, 24. Comley J ‘ELISA Assays: recent in-
in illegally produced alcoholic Fauhl-Hassek C and Hajslova J novations take analyte detection
beverages’ Journal of Forensic and ‘Metabolic fingerprinting based to new levels’ Drug Discovery
Legal Medicine 2015: volume 33, on high-resolution tandem mass World Fall 2012: pages 23-45
pages 56-60. spectrometry: a reliable tool for 25. Van Oorschot RAH, Ballantyne
6. McKee M, Adany R and Leon DA wine authentication?’ Journal KN and Mitchell RJ ‘Forensic trace
‘Illegally produced alcohol’The of Analytical and Bioanalytical DNA: a review’ Investigative Ge-
British Medical Journal (Clinical Chemistry 2014: volume 406, netics 2010: volume 1, article 14
Research Edition) 2012: volume pages 6791-803 26. For example, Lachenmeier
344, page e1146. 16. Hudson S and others ‘Use of high DW, Przybylski MC and Rehm J
7. Gowland MH and Walker MJ resolution mass spectrometry to ‘Comparative risk assessment of
‘Food Allergy, a summary of 8 detect reported and previously carcinogens in alcoholic beverag-
cases in the UK criminal and civil unreported cannabinomimetics es using the margin of exposure
courts: effective last resort for vul- in “herbal high” products’ Journal approach’ International Journal
nerable consumers?’ Journal of the of Analytical Toxicology 2010: of Cancer: volume131, pages
Science of Food and Agriculture volume 34, pages 1 -9 E995-E1003.
2015: volume 95, pages 1979-19 17. Government Chemist techni- 27. Benson S, Lennard C, Maynard P
8. National Criminal Intelligence cal note ‘Cumin analysis: DNA and Roux C ‘Forensic applications
Service ‘The National Intelligence test for mahaleb developed’. of isotope ratio mass spectrom-
model’ 2000 Available from https://www.gov. etry – A review’ Forensic Science
9. MHRA ‘Alerts and recalls for uk/government/news/cumin-analy- International 2006: volume 157,
drugs and medical devices’. Avail- sis-dna-test-for-mahaleb-developed pages 1-22
able from https://www.gov.uk/drug- 18. Vashist SK ‘Immunodiagnostics: 28. Loeffen PW, Maskall G, Bonthron 201
device-alerts Major Advances and Future In- S, Bloomfield M, and Tombling
10. World Health Organisation sights’ Biochips and Tissue Chips C ‘Chemical and explosives
‘Essential medicines and health 2013:Volume 3, Issue 2 point detection through opaque
products - Drug Alerts’. Available 19. Waltho A, Wilkes T, Nixon G, containers using spatially offset
from http://www.who.int/medicines/ Bushell C, and Burns M ‘Testing Raman spectroscopy (SORS)’
publications/drugalerts/en/ Wheat Grain Authenticity with Chemical, Biological, Radiological,
11. European Commission ‘The Fast, Non-destructive Multispec- Nuclear, and Explosives (CBRNE)
Rapid Alert System for Food and tral Image Analysis” LABMATE Sensing XII. Proc. SPIE 8018,
Feed’. Available from http://ec.eu- online: March 2015 80181E (2011)
ropa.eu/food/safety/rasff/portal/ 20. Kalyanaraman R, Dobler G and 29. Dawnay N, Ahmed R and Naif
index_en.htm Ribick M ‘Portable spectrometers S ‘The ParaDNA® Screening
12. Riedl J, Esslinger S, and Fauhl-Has- for pharmaceutical counterfeit System – A case study in bringing
sek C ‘Review of validation and detection’ American Pharmaceu- forensic R&D to market’ Science
reporting of non-targeted fin- tical Review April 2010 and Justice 2014: volume 54,
gerprinting approaches for food 21. Guin U, Huang K, DiMase D, pages 481– 486
authentication’ Analytica Chimica Carulli JM,Tehranipoor M, and
Acta 2015: volume 885, pages Makris Y ‘Counterfeit integrated Case Study: Notions of Purity: an
17-32. circuits: A rising threat in the glob- Anthropological Perspective
13. Wishart DS ‘Quantitative metab- al semiconductor supply chain’ 1. Frazer JG ‘The Golden Bough’.
olomics using NMR’Trends in An- Proceedings of the IEEE 2014: New York: Macmillan (1890)
alytical Chemistry 2008: volume volume 102, pages 1207-28. 2. Rober tson Smith W ‘The Religion
27, pages 228–237 22. Molloy J and Naftalya M ‘Wool of the Semites’. University of Ab-
14. Neumann S and Böcker S ‘Com- textile identification by terahertz erdeen: Burnett Lectures (1894)
putational mass spectrometry spectroscopy’The Journal of The 3. Durkheim É ‘Elementary Forms
for metabolomics: Identification Textile Institute 2014: volume of the Religious Life’. New York:
of metabolites and small mole- 105, pages 794-798 Macmillan (1954 [1912])
cules’ Analytical and Bioanalytical 23. Baker M. ‘Digital PCR hits its 4. Ahern E ‘The power and pollution

GO_Science_Innovation_REFS_PRINT.indd 201 30/11/2015 16:46


of Chinese women’, in Wolf A 15. Douglas M ‘Purity and Danger: 26. Gusterson H ‘Nuclear Rites: A
(ed), ‘Studies in Chinese Society’. An Analysis of the Concepts of Weapons Laboratory at the End
Stanford: Stanford University Press Pollution and Taboo’. London: of the Cold War’. Berkeley: Cali-
(1978) pages 269-90 Routledge & Kegan Paul (1966) fornia University Press (1996)
5. Fuller C ‘Gods, priests and purity: page 29 27. Latour B ‘The Pasteurization of
on the relation between Hindu- 16. Kravel-Tovi M ‘National mission: France’. Cambridge, Mass: Harvard
ism and the caste system’ Man biopolitics, non-Jewish immigration University Press (1988)
(1979) volume 14, pages 459-76 and Jewish conversion policy in 28. Haraway D ‘Modest_Witness@
6. Dumont L ‘Homo hierarchicus: contemporary Israel’ Ethnic and Second_Millennium.FemaleMan_
The Caste System and its Impli- Racial Studies (2012) volume 35, Meets_Oncomouse: Feminism
cations’. Chicago, University of pages 737-56 and Technoscience’. New York:
Chicago Press (1980 [1966]) 17. Douglas M ‘Purity and Danger: Routledge (1997)
7. Taussig M ‘The Devil and Com- An Analysis of the Concepts of 29. Mody CCM ‘A little dirt never
modity Fetishism in South Pollution and Taboo’. London: hurt anyone: knowledge-making
America’. Chapel Hill: University Routledge & Kegan Paul (1966) and contamination in materials
of North Carolina Press (1980) page 41. science’ Social Studies of Science
8. Seaman G ‘The sexual politics of 18. Tilley H ‘Racial science, geopolitics, (2001) volume 31, pages 7-36
karmic retribution’. In Ahern E and empires: paradoxes of power’ 30. Burghart R ‘The purity of water at
and Gates H (eds) ‘The Anthro- Isis (2014) volume 105, pages hospital and home as a problem
pology of Taiwanese Society’, 773-81 of intercultural understanding’
Stanford: Stanford University 19. Munasinghe V ‘Nationalism in Medical Anthropology Quarterly
Press (1981) pages 381-96 hybrid spaces: the production of (1996) volume 10, pages 63-74
9. Daniel VE ‘Fluid Signs: Being a impurity out of purity’ American 31. Dunn EC ‘Standards and per-
Person the Tamil Way’. Berkeley: Ethnologist (2002) volume 29, son-making in Eastern Europe: a
202 University of California Press pages 663-692 tale of two sausages’ In Ong A and
(1984) 20. Petryna A ‘Life Exposed: Biological Collier SJ (eds) ‘Global Assemblag-
10. Rouse C and Hoskins J ‘Puri- Citizens after Chernobyl’. Prince- es:Technology, Politics, and Ethics
ty, soul food and Sunni Islam: ton, NJ: Princeton University Press as Anthropological Problems’.
explorations and the intersection (2002) Blackwell, Oxford (2005) pages
of consumption and resistance’ 21. Farmer P ‘AIDS and Accusation: 173-193
Cultural Anthropology (2004) Haiti and the Geography of 32. Dunn EC ‘Postsocialist spores:
volume 19, pages 226-49. Blame’. Berkeley: University of disease, bodies and the state in
11. Gauvain R ‘Ritual rewards: a Californa Press (1993) the Republic of Georgia’ American
consideration of three recent 22. Shao J ‘Fluid labor and blood mon- Ethnologist (2008) volume 35,
approaches to Sunni purity law’ ey: the economy of HIV/AIDS pages 243-58
Islamic Law and Society (2005) in rural Central China’ Cultural 33. Bray F ‘Purity and promiscuity’, in
volume 12, pages 333-93. Anthropology (2006) volume 21, Bray F, Coclanis PA, Fields-Black EL
12. Masquelier A ‘The bloodstain: pages 535-69 and Schäfer D (eds) ‘Rice: Global
spirit possession, menstruation 23. Taussig K-S ‘Bovine abominations: Networks and New Histories’.
and transgression in Niger’ genetic culture and politics in the New York: Cambridge University
Ethnos (2011) volume 76, pages Netherlands’ Cultural Anthro- Press (2015) pages 37-40
157-182 pology (2004) volume 19, pages 34. Inhorn M and Balen F (eds)
13. Harris M ‘Cows, Pigs, Wars and 305-36 ‘Infertility Around the Globe: New
Witches:The Riddles of Culture’. 24. Bray F ‘Science, technique, tech- Thinking on Childlessness, Gender,
London: Hutchinson (1975) nology: passages between mat- and Reproductive Technologies’.
14. Thompson B ‘Scientific Fore- ter and knowledge in imperial Berkeley: University of California
knowledge and Biblical Accuracy’ Chinese agriculture’ British Journal Press (2002)
Reason and Revelation (1993) for the History of Science (2008) 35. Appadurai A ‘Fear of Small Num-
volume 13, page 78 http://www. volume 41, page 322 bers: An Essay on the Geography
happinessonline.org/MoralCode/ 25. Latour B ‘We Have Never Been of Anger’. Durham NC: Duke
LiveWithTruth/p11.htm (accessed Modern’. Cambridge, Mass: Har- University Press (2006)
23.08.2015). vard University Press (1993)

GO_Science_Innovation_REFS_PRINT.indd 202 30/11/2015 16:46


CHAPTER 11: forcement/the-national-food-crime- fraud in China’ Food Control 2011:
FOOD AND DRINK unit/foodfraud volume 22, pages 1126-1135
1. Grocer y Manufacturers Asso- 9. European Commission Directo- 16. Ahlinder J and others ‘Chemom-
ciation (GMA) and Kearney AT rate General Health and Food etrics comes to court: evidence
‘Consumer product fraud: Deter- Safety ‘Food Fraud’. Available evaluation of chem–bio threat
rence and detection’ 2010. Availa- from http://ec.europa.eu/food/ agent attacks’ Journal of Chemo-
ble from http://www.gmaonline.org/ safety/official_controls/food_fraud/ metrics 2015: volume 5, pages
downloads/research-and-reports/ index_en.htm 267-276
consumerproductfraud.pdf 10. European Parliament resolu- Case Study: Exploiting the microbiome
2. Terracini B ‘Toxic oil syndrome tion of 14 January 2014 on the 1. Hird H, Sapp M,Thygesen H,
– Ten years of progress’ World food crisis, fraud in the food Glover R, Chisolm J,Thwaites R,
Health Organization 2004. Availa- chain and the control thereof Lewis E, Brereton P ‘Exploiting
ble from http://www.euro.who.int/__ (2013/2091(INI)). Available from the microbiome: a new approach
data/assets/pdf_file/0005/98447/ http://www.europarl.europa.eu/ for determining the provenance
E84423.pdf sides/getDoc.do?type=TA&refer- of food- case study using Pacific
3. Pei X and others ‘The China mel- ence=P7-TA-2014-0011&lan- oysters’ Recent Advances in Food
amine milk scandal and its impli- guage=EN&ring=A7-2013-0434 Analysis (RAFA), Prague, 3-6
cations for food safety regulation’ 11. Repor t on the food crisis, fraud November 2015
Food Policy 2011: volume 36, in the food chain and the control
pages 412-420 thereof (2013/2091(INI)). Europe- Case Study: Stopping food fraud
4. Mika OJ and others ‘Mass meth- an Parliament, Committee on the 1. HM Government ‘Elliott Review
anol poisonings in the Czech Re- Environment, Public Health and into the Integrity and Assurance
public’Toxin Reviews 2014: volume Food Safety. Available from http:// of Food Supply Networks – Final
33, pages 101-106 www.europarl.europa.eu/sides/get- Report’ 2014. Available from
5. Primrose S and others ‘Food Doc.do?pubRef=-//EP//NONSGM- https://www.gov.uk/government/ 203
forensics: methods for determin- L+REPORT+A7-2013-0434+0+- uploads/system/uploads/attach-
ing the authenticity of foodstuffs’ DOC+PDF+V0//EN ment_data/file/350726/elliot-re-
Trends in Food Science and Tech- 12. Johnson R ‘Food fraud and “eco- view-final-report-july2014.pdf
nology 2010: volume 21, pages nomically motivated adulteration”
582-590 of food and food ingredients’ CHAPTER 12:
6. Regulation (EU) 1306/2013 of the Congressional Research Service COUNTERFEIT
European Parliament and of the 2014. Available from https://www. PHARMACEUTICALS
Council of 17 December 2013 fas.org/sgp/crs/misc/R43358.pdf 1. Chaccour CJ and others ‘Travel
on the financing, management and 13. HM Government ‘Elliott Review and fake artesunate: a risky busi-
monitoring of the common agri- into the Integrity and Assurance ness’ Lancet 2012: volume 380,
cultural policy. Available from http:// of Food Supply Networks – page 1120
eur-lex.europa.eu/legal-content/EN/ Final Report. A National Food 2. New W ‘UN Office On Drugs
ALL/?uri=CELEX:32013R1306 Crime Prevention Framework’ And Crime Launches Anti-Coun-
7. Regulation (EC) No 178/2002 of 2014. Available from https:// terfeit Campaign Aimed At
the European Parliament and of www.gov.uk/government/uploads/ Organised Crime’ Intellectual
the Council of 28 January 2002 system/uploads/attachment_data/ Property Watch 2014. Availa-
laying down the general principles file/350726/elliot-review-final-re- ble from http://www.ip-watch.
and requirements of food law, port-july2014.pdf org/2014/01/14/un-office-on-drugs-
establishing the European Food 14. Madesisa P and others ‘Advanc- and-crime-launches-anti-counter-
Safety Authority and laying down es of DNA-based methods for feit-campaign-aimed-at-organised-
procedures in matters of food tracing the botanical origin of crime/. Accessed 05/10/2015
safety. Available from http://eur-lex. food products’ Food Research 3. Attaran A and others ‘How to
europa.eu/legal-content/EN/TX- International 2014: volume 60, achieve international action on fal-
T/?uri=celex:32002R0178 pages 163-172 sified and substandard medicines’
8. UK Food Standards Agency 15. Zhang J ‘Review of the current ap- BMJ 2012: volume 345, e7381
‘Reporting Food Fraud’. Available plication of fingerprinting allowing 4. WHO ‘Medicines: spurious/false-
from https://www.food.gov.uk/en- detection of food adulteration and ly-labelled/ falsified/counterfeit

GO_Science_Innovation_REFS_PRINT.indd 203 30/11/2015 16:46


(SFFC) medicines’ 2012. Available lines for field surveys of the qual- ume 92, pages 87-94
from http://www.who.int/mediacen- ity of medicines: a proposal’ PLoS 24. Hajjou M and other s ‘Assessment
tre/factsheets/fs275/en/. Accessed Med. 2009: volume 6, e52 of the performance of a handheld
27/09/2015 15. Newton PN and others ‘Collabo- Raman device for potential use
5. ACT Consortium ‘Analysing the rative epidemiological investigation as a screening tool in evaluat-
quality and authenticity of ACT into the criminal fake artesunate ing medicines quality’ J Pharm
drugs’ 2008. Available from www. trade in South East Asia’ PLoS Biomed Anal. 2013: volume 74,
actconsortium.org/drugquality. Ac- Med. 2008: volume 2, e32 pages 47-55
cessed 24/09/2015 16. Cody RB, Laramee JA, Durst HD 25. Yoon WL and others ‘Application
6. WHO ‘Counterfeits: Frequently ‘Versatile new ion source for the of near-infrared spectroscopy to
Asked Questions’. Available from analysis of materials in open air the determination of the sites of
http://www.who.int/medicines/servic- under ambient conditions’ Anal. manufacture of proprietary prod-
es/counterfeit/faqs/QandAsUpdate- Chem. 2005: volume 77, pages ucts’ J. Pharm. Biomed. Anal. 2004:
July11.pdf 2297-2302 volume 34, pages 933-44
7. WHO ‘Counterfeit Drugs Kill!’. 17. Takáts Z and others ‘Mass Spec- 26. SCiO ‘Near Infra-Red Spectros-
Available from http://www.who.int/ trometry Sampling Under Ambi- copy at the palm of your hand’.
impact/FinalBrochureWHA2008a. ent Conditions with Desorption Available from https://www.
pdf?ua=1. Accessed 24/09/2015 Electrospray Ionization’ Science consumerphysics.com/myscio/
8. The Center for Safe Internet 2004: volume 306, pages 471–473 technology. Accessed 05/10/2015
Pharmacies ‘U.S. Track and Trace 18. Leslie T and others ‘An epidemic 27. Tabernero P and others ‘A Repeat
Law Signed’ 2013. Available of Plasmodium falciparum malaria Random Survey of the Preva-
from http://www.safemedsonline. in Afghan refugees in the Tribal lence of Falsified and Substandard
org/2013/12/us-track-trace-law- Areas of Pakistan fuelled by sub- Antimalarials in the Lao PDR: A
signed. Accessed 2/10/2015 standard antimalarial drugs’ Emerg Change for the Better’ Am J Trop
204 9. FDA ‘RFID: Protecting the Drug Infect Dis 2009: volume 15, pages Med Hyg. 2015: volume 92, pages
Supply’ FDA Consumer March- 1753-1759 95-104
April 2005. Available from http:// 19. Kaur H and other s ‘Chemical and 28. Nayyar GMI ‘Poor-quality anti-
www.fda.gov/Drugs/DrugSafety/ bioassay techniques to authenti- malarial drugs in Southeast Asia
ucm169918.htm. Accessed cate quality of the anti-leishmanial and sub-Saharan Africa’ Lancet
2/10/2015 drug miltefosine’ Am J Trop Med Infect Dis 2012: volume 12, pages
10. TruTag Technologies ‘Product Hyg 2015: volume 92, pages 31-8 488–96
Authentication and Brand Pro- 20. Ioset JR and Kaur H ‘Simple field 29. Newton PN and other s ‘Coun-
tection Solutions’. Available from assays to check quality of current terfeit artesunate antimalarials
http://www.trutags.com/. Accessed artemisinin-based antimalarial in southeast Asia’ Lancet 2003:
2/10/2015 combination formulations’ PloS volume 362, page 169
11. ‘NanoGuardian and Capsugel ONE 2009: volume 4, e7270 30. Kaur H and other s ‘Quality of
Announce Global Anti-Coun- 21. GPHF ‘The GPHF-Minilab™ - Artemisinin-Based Combination
terfeiting Collaboration’ Phar- Protection Against Counterfeit Formulations for Malaria Treat-
maceutical Manufacturing 2010. Medicines’. Available from http:// ment: Prevalence and risk factors
Available from http://www. www.gphf.org/web/en/minilab. for poor quality medicines in
pharmamanufacturing.com/indus- Accessed 24/09/2015 public facilities and private sector
trynews/2010/039/. Accessed 22. Risha PG and other s ‘The use of drug outlets in Enugu, Nigeria’
2/10/2015 Minilab® to improve the testing PLoS ONE 2015: volume 10,
12. Covectra. Available from http:// of regulatory authorities in re- e0125577
www.covectra.com/about/. Ac- source limited settings: Tanzanian 31. ACT Consortium ‘Poor quality
cessed 2/10/2015 experience’ Health Policy 2008: malaria drugs: how many and
13. Almuzaini T, Choonara I and volume 87, pages 217-22 where? (Research brief)’ 2015.
Sammons H ‘Substandard and 23. Fadeyi I and other s ‘Quality of Available from http://www.actcon-
Counterfeit medicines: a system- the Antibiotics - Amoxicillin and sortium.org/publications.php/130/
atic review of the literature’ BMJ Co-trimoxazole from Ghana, poor-quality-malaria-drugs-how-
Open 2013: volume 3, e002923 Nigeria and the United Kingdom’ many-and-where-research-brief.
14. Newton PN and others ‘Guide- Am J Trop Med Hyg 2015: vol- Accessed 24/09/2015

GO_Science_Innovation_REFS_PRINT.indd 204 30/11/2015 16:46


32. Nair AS ‘In a first, drug us- 11e4-a31c-77759fc1eacc_story. at Ports and Borders Teams’.
ing 3D printing technology html. Accessed October 2015 Available from http://www.nation-
gets FDA nod’ Reuters 2015. 7. Gar tner ‘Predicts 2014: 3D Print- altradingstandards.uk/work-areas/
Available from http://www. ing at the Inflection Point’ 2014. safety-at-ports-and-borders-teams/.
reuters.com/article/2015/08/03/ Available from http://www.gartner. Accessed October 2015
us-fda-3ddrug-idUSKCN- com/doc/2631234
0Q81YC20150803. Accessed 8. Quantum Materials ‘Quantum CHAPTER 14:
6/10/2015 dot inks’ http://www.qmcdots.com/ ENVIRONMENTAL FORENSICS
products/products-securityink.php. 1. Defra ‘Emissions of air pollut-
CHAPTER 13: Accessed October 2015 ants in the UK, 1970 to 2013’
CONSUMER PRODUCTS 9. Ofcom ‘The Communications (2014). Available from https://
1. Interpol ‘Against Organized Crime: Market 2015’. Available from www.gov.uk/government/uploads/
Interpol Trafficking and Counter- http://stakeholders.ofcom.org.uk/ system/uploads/attachment_data/
feiting Casebook 2014’. Available market-data-research/market-data/ file/388195/Emissions_of_air_pol-
from http://www.interpol.int/ communications-market-reports/ lutants_statistical_release_2014.pdf
Media/Files/Crime-areas/Traffick- cmr15/ 2. UK National Ecosystem Assess-
ing-in-Illicit-Goods/Against-Organ- 10. Brand-i. Available from www. ment: http://uknea.unep-wcmc.org/
ized-Crime-INTERPOL-Traffick- brand-i.org. Accessed October 3. Natural Capital Committee:
ing-and-Counterfeiting-Casebook 2015 https://www.gov.uk/government/
2. OECD ‘Magnitude of counterfeit- 11. Symantec Safe Site. Available from groups/natural-capital-committee
ing and piracy of tangible prod- http://www.symantec.com/trust- 4. European Environment Agen-
ucts: an update’ 2009. Available seal/. Accessed October 2015 cy ‘SOER 2015:The European
from http://www.oecd.org/sti/ 12. Trusted Shops. Available from environment — state and outlook
ind/44088872.pdf http://www.trustedshops.co.uk/. 2015’. Available from http://www.
3. Centre for Retail Research ‘Online Accessed October 2015 eea.europa.eu/soer 205
Retailing: Britain, Europe, US and 13. Erickson D and others ‘Smart- 5. European Environment Agency
Canada 2015’. Available from phone technology can be trans- ‘Late lessons from early warnings:
http://www.retailresearch.org/onliner- formative to the deployment of science, precaution, innovation’
etailing.php lab-on-chip diagnostics’ Lab Chip 2013. Available from http://www.
4. European Commission ‘Protecting 2014: volume 14, pages 3159- eea.europa.eu/publications/late-les-
Intellectual Property Rights: Cus- 3164, doi: 10.1039/c4lc00142g. sons-2
toms authorities detain nearly 36 Available from http://pubs.rsc.org/ 6. Fera ‘Next Generation Sequenc-
million fake goods at EU borders en/Content/ArticleLanding/2014/LC/ ing & Genomics’. Available from
in 2013’ 2014. Available from C4LC00142G#!divAbstract http://fera.co.uk/detectionSurveil-
http://europa.eu/rapid/press-re- lance/nextGenSequencing.cfm
lease_IP-14-890_en.htm Case Study: Consumer protection and
5. J Lee and others ‘Universal social media Case Study: Environmental DNA analysis
process-inert encoding architec- 1. Intellectual Proper ty Office ‘IP for wildlife conservation
ture for polymer microparticles’ Crime Report 2014/2015’. Avail- 1. Biggs J and others ‘Using eDNA
Nature Materials 2014: volume able from https://www.gov.uk/gov- to develop a national citizen
13, pages 524-529, doi: 10.1038/ ernment/uploads/system/uploads/ science-based monitoring pro-
nmat3938. Available from http:// attachment_data/file/461792/ gramme for the great crested
www.nature.com/nmat/journal/v13/ ip-crime-report-2014-15.pdf newt (Triturus cristatus)’ Biolog-
n5/full/nmat3938.html ical Conservation 2015: volume
6. Halsey A ‘The secret life of Case Study: Making the most of Trading 183, pages 19–28. Available from
baggage: Where does your Standards services http://dx.doi.org/10.1016/j.bio-
luggage go at the airport?’The 1. Trading Standards Institute ‘Trading con.2014.11.029
Washington Post 2014. Available Standards Workforce Survey’ June
from https://www.washingtonpost. 2014. Available from http://www.
com/local/trafficandcommuting/ tradingstandards.uk/policy/Work-
where-oh-where-did-my-luggage- forceSurvey2014.cfm
go/2014/11/24/16d168c6-69da- 2. National Trading Standards ‘Safety

GO_Science_Innovation_REFS_PRINT.indd 205 30/11/2015 16:46


SECTION 4 org/web/forensics/events-view/-/ Global Industry Analysis, Size, Share,
CHAPTER 15: events/27824644 Growth,Trends and Forecast, 2013
Case Study: Next-generation digital 5. The Chartered Society of Forensic – 2019’ (August 2013)
forensics Science. Available from http://www. 7. ‘About the What Works Centre’.
1. National Crime Agency ‘National csofs.org/ Available from http://whatworks.
Strategic Assessment of Serious and 6. The Association of Forensic Service college.police.uk/About/Pages/default.
Organised Crime 2015’. Available Providers. Available from http://www. aspx
from http://www.nationalcrimeagency. afsp.org.uk/ 8. CPS ‘The Code for Crown Prose-
gov.uk/publications/560-national-stra- cutors’. Available from http://www.
tegic-assessment-of-serious-and-or- Case Study: Innovate UK and the cps.gov.uk/publications/code_for_
ganised-crime-2015/file Forensic Science Special Interest Group crown_prosecutors/
1. Li B and others ‘The application 9. Ministr y of Justice ‘Rules and
Case Study: Skills and competency for the of visible wavelength reflectance Practice Directions’. Available from
future hyperspectral imaging for the http://www.justice.gov.uk/courts/proce-
1. House of Commons Science and detection and identification of dure-rules/criminal/rulesmenu-2015
Technology Committee ‘Forensic blood stains’ Science & Justice 2014: 10. CPS ‘Streamlined Forensic Report-
Science on Trial’ 2005: HC96-I. volume 54, page 432 ing Guidance and Toolkit’ http://
Available from http://www.publica- www.cps.gov.uk/legal/s_to_u/scien-
tions.parliament.uk/pa/cm200405/ Case Study: Biosensors in forensics tific_evidence/sfr_guidance_and_
cmselect/cmsctech/96/96i.pdf 1. Frascione N, Gooch J, Abbate V and toolkit/
2. The Forensic Science Regulator Daniel B ‘Fluorogenic displacement 11. CPS ‘Core Foundation Principles
‘Forensic science providers: codes biosensors for PSA detection using for Forensic Science Providers’.
of practice and conduct’ 2014. antibody-functionalised quantum Available from http://www.cps.gov.
Available from https://www.gov. dot nanoparticles’ RSC Advances uk/legal/s_to_u/scientific_evidence/
206 2015: volume 5, pages 6595-6598 core_foundation_principles_for_fo-
uk/government/publications/foren-
sic-science-providers-codes-of-prac- rensic_science_providers/
tice-and-conduct-2014 CHAPTER 17: 12. Dstl ‘About us’. Available from
ACCESSING FORENSICS https://www.gov.uk/government/
CHAPTER 16: AS A NEW MARKET organisations/defence-sci-
ENCOURAGING 1. Tully G and Sullivan K with Vidaki A ence-and-technology-laboratory/
INNOVATION and Anjomshoaa A ‘Taking Forensic about
1. Annual Report of the Government Science R&D to Market’ Forensic 13. Home Office ‘Counter-terror-
Chief Scientific Adviser ‘Innova- Science Special Interest Group ism strategy (CONTEST)’ 2011.
tion: managing risk, not avoiding it’ 2013 Available from https://www.gov.uk/
Government Office for Science 2. Science and Technology Commit- government/publications/counter-ter-
2014: page 3. Available from https:// tee ‘The Forensic Science Service’ rorism-strategy-contest
www.gov.uk/government/uploads/ Seventh Report of Session 2010- 14. Council of Europe ‘CASE OF S.
system/uploads/attachment_data/ 12: HC 855, para 31 AND MARPER v. THE UNIT-
file/381906/14-1190b-innova- 3. Science and Technology Committee ED KINGDOM’ 2008. Available
tion-managing-risk-evidence.pdf ‘Forensic Science’ Second Report of from http://www.coe.int/t/dghl/
2. FoSci SIG ‘Forensic Science UK In- Session 2013-14: HC 610, para 11 standardsetting/dataprotection/Judg-
novation Database’. Available from 4. Science and Technology Committee ments/S.%20AND%20MARPER%20
https://connect.innovateuk.org/web/ ‘Forensic Science’ Second Report of v.%20THE%20UNITED%20KING-
forensics/innovation-database Session 2013-14: HC 610, para 12 DOM%20EN.pdf
3. Home Office ‘Security Innova- 5. Research and Markets ‘Global Fo- 15. Silverman B ‘Research and Devel-
tion and Demonstration Centre’. rensic Technologies Market Report opment in Forensic Science: A Re-
Available from https://www.gov.uk/ 2015-2019’ (June 2015) view’ 2011. Available from https://
government/groups/security-innova- 6. Transparency Market Research www.gov.uk/government/publications/
tion-and-demonstration-centre ‘Forensic Technologies Market research-and-development-in-foren-
4. FoSci SIG ‘Forensic Science Tech- (Physical Crime Forensics, Labora- sic-science-review
nology Showcase 2015’. Available tory Forensics, Portable Forensics,
from https://connect.innovateuk. Forensic Tools and Products) -

GO_Science_Innovation_REFS_PRINT.indd 206 30/11/2015 16:46


© Crown copyright 2015
This publication is licensed under the terms of the Open Government Licence v3.0 except where otherwise stated.
To view this licence, visit nationalarchives.gov.uk/doc/open-government-licence/version/3 or write to the
Information Policy Team, The National Archives, Kew, London TW9 4DU, or email: psi@nationalarchives.gsi.gov.uk.
Where we have identified any third party copyright information you will need to obtain permission from
the copyright holders concerned.
This publication is available from www.gov.uk/go-science
Contact us if you have any enquiries about this publication, including requests for alternative formats, at:
Government Office for Science
1 Victoria Street
London SW1H 0ET
Tel: 020 7215 5000
Email: contact@go-science.gsi.gov.uk

GS/15/37B

GO_Science_Innovation_COVERS_v3.indd 2 30/11/2015 16:25

You might also like