Dental Forensics: Bitemark Analysis

نویسنده

  • Elza I Auerkari
چکیده

Forensic odontology (dental forensics) can provide useful evidence in both criminal and civil cases, and therefore remains a part of the wider discipline of forensic science. As an example from the toolbox of forensic odontology, the practice and experience on bitemark analysis is reviewed here in brief. The principle of using visible bitemarks in crime victims or in other objects as evidence is fundamentally based on the observation that the detailed pattern of dental imprints tend to be practically unique for each individual. Therefore, finding such an imprint as a bitemark can bear a strong testimony that it was produced by the individual that has the matching dental pattern. However, the comparison of the observed bitemark and the suspected set of teeth will necessarily require human interpretation, and this is not infallible. Both technical challenges in the bitemarks and human errors in the interpretation are possible. To minimise such errors and to maximise the value of bitemark analysis, dedicated procedures and protocols have been developed, and the personnel taking care of the analysis need to be properly trained. In principle the action within the discipline should be conducted as in evidence-based dentristy, i.e. accepted procedures should have known error rates. Because of the involvement of human interpretation, even personal performance statistics may be required from legal expert statements. The requirements have been introduced largely due to cases where false convictions based on bitemark analysis have been overturned after DNA analysis. Dental Forensics: Bitemark Analysis

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Forensic dentistry: 2. Bitemarks and bite injuries.

UNLABELLED While the practice of human identification is well established, validated and proven to be accurate, the practice of bitemark analysis is less well accepted. The principle of identifying an injury as a bitemark is complex and, depending on severity and anatomical location, highly subjective. Following the identification of an injury as a bitemark, the comparison of the pattern produc...

متن کامل

Image editing and computer assisted bitemark analysis: a case report.

Bitemark evidence in a homicide usually involves a perpetrator biting the victim prior to or around the time of death. This paper presents a case in which a homicide victim bit his assailant. A suspect taken into custody was found to have what appeared to be a human bitemark on the proximal phalanx of his right thumb. Scale photographs of this injury were obtained and compared to the dentition ...

متن کامل

Biomechanical approach to human bitemark reconstruction.

UNLABELLED This paper investigates the changes in upper and lower dental bite records that occur when the anterior teeth occlude into a three-dimensional rather than a flat object. METHODS anterior bite registrations were obtained from 20 volunteers with full and unrestored dentitions. As a three- dimensional, life-like bite target we cast a silicone replica from the impression of an actual a...

متن کامل

Forensic bitemark identification: weak foundations, exaggerated claims

Several forensic sciences, especially of the pattern-matching kind, are increasingly seen to lack the scientific foundation needed to justify continuing admission as trial evidence. Indeed, several have been abolished in the recent past. A likely next candidate for elimination is bitemark identification. A number of DNA exonerations have occurred in recent years for individuals convicted based ...

متن کامل

The Application Research on Network Forensics

With the development of network technology, computer crime, network forensics as a kind of active network security defense, has gained widely research and application. This article detailed introduces the concept of network Forensics, Forensics process, Forensics model and some common techniques and methods, the analysis of the Realtime Intrusion Forensics and other four kinds of typical networ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010