0% found this document useful (0 votes)
10 views8 pages

Training Session at CID, Dhaka

The document outlines a training session for ASP (Probationer) Nirjon Sarker at CID, Dhaka, focusing on various types of forensics and their applications in criminal investigations. It details key laws related to forensic science, the crime scene management process, and the significance of cybercrime laws, including the Cyber Security Act 2023. Additionally, it addresses human trafficking prevention and legal frameworks in Bangladesh, emphasizing the importance of proper investigation and victim assistance.

Uploaded by

Lal nil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views8 pages

Training Session at CID, Dhaka

The document outlines a training session for ASP (Probationer) Nirjon Sarker at CID, Dhaka, focusing on various types of forensics and their applications in criminal investigations. It details key laws related to forensic science, the crime scene management process, and the significance of cybercrime laws, including the Cyber Security Act 2023. Additionally, it addresses human trafficking prevention and legal frameworks in Bangladesh, emphasizing the importance of proper investigation and victim assistance.

Uploaded by

Lal nil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Training Session

At
CID, Dhaka

Participant’s Name: NIRJON SARKER


Designation: ASP (Probationer)
BP: 9525900242
Batch: 43rd BCS
Serial: 57
Merit: 71
Forensics refers to the application of scientific and investigative techniques
to solve crimes and analyze evidence. It is widely used in law enforcement,
legal proceedings, and criminal investigations.

Types of Forensics:

1. Digital Forensics – Investigating cybercrimes, hacking, and digital


evidence.
2. Forensic Pathology – Determining cause of death through autopsies.
3. Forensic Toxicology – Studying poisons, drugs, and chemicals in the body.
4. Forensic Anthropology – Identifying human remains and skeletal evidence.
5. Forensic DNA Analysis – Matching DNA samples to identify individuals.
6. Forensic Ballistics – Analyzing firearms, bullets, and shooting incidents.
7. Forensic Psychology – Understanding criminal behavior and profiling
suspects.

Locard's Exchange Principle is a fundamental concept in forensic science


that was proposed by Dr. Edmond Locard, a French criminologist. It states:
"Every contact leaves a trace."

Explanation:
This principle means that whenever two objects or people come into contact,
they transfer materials between them. This can be in the form of:
 Fingerprints on a surface
 Hair, skin cells, or fibers from clothing
 Blood, bodily fluids, or DNA
 Gunpowder, soil, or pollen
 Digital traces like browsing history or deleted files
Importance in Criminal Investigations:
1. Crime Scene Evidence – Helps in collecting and analyzing physical
evidence.
2. Suspect Identification – Links suspects to crime scenes or victims.
3. Reconstructing Events – Determines what happened and how.
Here are some key laws related to forensic science that are relevant to our
work as a BCS Police Cadre officer:

1. Evidence Act, 1872


 Sections 45-51: Recognizes expert opinions, including forensic experts, in
court.
 Use in Forensics: Forensic reports (e.g., DNA, fingerprint, toxicology) are
admissible as expert testimony.

2. Code of Criminal Procedure (CrPC), 1898
 Section 164A: Allows medical examination of rape victims, including
forensic evidence collection.
 Section 510: Accepts forensic reports from government experts without
requiring them to testify.
 Use in Forensics: Enables forensic analysis in crime investigations.

3. Penal Code, 1860
 Sections 299-304: Covers homicide investigations using forensic pathology.
 Section 328: Poisoning cases, analyzed by forensic toxicologists.
 Use in Forensics: Helps determine causes of death or injury through
forensic evidence.

4. DNA Act, 2014
 Regulates DNA sample collection, storage, and analysis for criminal cases.
 Use in Forensics: Used in rape cases, paternity disputes, and unidentified
remains.

5. Narcotics Control Act, 2018
 Governs forensic testing of drugs and controlled substances.
 Use in Forensics: Forensic toxicology helps identify illegal drugs in cases.

6. Information and Communication Technology (ICT) Act, 2006 &


Digital Security Act, 2018
 Covers cybercrimes, electronic evidence, and digital forensics.
 Use in Forensics: Digital forensics is crucial for cybercrime investigations.
7. Anti-Terrorism Act, 2009

 Allows forensic analysis of explosives, communications, and financial


transactions.
 Use in Forensics: Helps track terrorism-related digital and forensic
evidence.
A crime scene is any location where a criminal offense has occurred or
where evidence related to a crime is found. It can be a physical location
(like a house, road, or forest) or a digital space (such as a hacked server or a
computer).

Types of Crime Scenes

1. Primary Crime Scene – The main location where the crime took place
(e.g., a murder in a house).
2. Secondary Crime Scene – A place connected to the crime (e.g., where a
suspect dumps a body).
3. Tertiary Crime Scene – Any other place that has trace evidence related to
the crime.
4. Macroscopic Crime Scene – A large crime area (e.g., a bomb blast site).
5. Microscopic Crime Scene – Small evidence points (e.g., blood stains,
fingerprints).
6. Cybercrime Scene – A digital space where illegal activities happened (e.g.,
hacking, fraud).

Crime Scene Management Process

1. Securing the Scene – Police officers prevent contamination of evidence.


2. Documenting the Scene – Photos, sketches, and notes are taken.
3. Collecting Evidence – Fingerprints, DNA, weapons, and other clues are
gathered.
4. Preserving Evidence – Proper storage to maintain its integrity.
5. Analyzing Evidence – Sent to forensic labs for examination.
CYBER CRIME

Cyber crime, or computer crime, is crime that involves a computer and a


network The computer may have been used in the commission of a crime, or
it may be the target.

Cybercrime is defined as a crime in which a computer is the object of the


crime (phishing, spamming) or is used as a tool to commit an offense (child
pornography, hate crimes).

Investigation: the act or process of examining a crime, problem, statement,


etc. carefully, especially to discover the truth.

Cyber Space Laws


● Information Communication Technology
Act (ICT), 2006
● Cyber Security Act (CSA), 2023

CSA,2023 Special Features


● Police officer means not below the rank of Inspector
● Supremacy of this law (sec 3)
● Extra judicial application (sec 4)
● Power of Investigating Officer (sec 40)
● Search, seize, and arrest without a warrant (sec 42)
● Help in Investigation (sec 45)
● Complainant should be liable in case of lodging a false case

Cyber Security Act 2023

●Total sec 60, Cog sec 4


●Sec 17 Illegal entrance info infrastructure
●Sec19 Computer and Computer system
●Sec 27 Cyber Terrorism,
●Sec 32 Illegal data transferring and saving
Common Mistakes on FIR

 Inappropriate section

 Only on the Noncognizable section.

 No link of ID/post/comments

 NO Numeric No.

 Not archived/ Screen record

 Not mentioned statement of post

 Not mentioned real-time and date

Collection of Evidence
● Highly volatile and sophisticated
●Collect digital evidence before destroy
● Handling digital evidence:
● Unlock pattern & password
● Unlock I Cloud Password (iPhone)
● Taking control of Mail ID & Password
● Access to Google Drive & Dropbox, OneDrive, and
iCloud on flight mood to prevent remote access.
Seizure List
●On spot SL
●Mobile Company Name, Model No, IMEI
●Lock Unlock
●SIM No/CCID
●Serial No, COY Name, Storage Capacity (Pen Drive, Hard Drive)
●Downloaded file Name & Extension (Facebook ID)
●Model No, Serial No, Storage Capacity (Laptop)
●Seize all digital devices (Hard Disk, Laptop, Smartphone, Memory Card,
DVR)

Trafficking of Human Being


Objective and Goals
 To prevent illegal migration/human trafficking
 To ensure proper investigation of cases under the Human Trafficking Act
2012
 To provide legal assistance to the Trafficked victims
 To provide assistance to GO and NGOs

Legal Instrument for the Prevention of Human


Trafficking
 The prevention and suppression of Human Trafficking
Act 2012

 Prevention and suppression of Human Trafficking


Rules 2017

 The Mutual Legal Assistance in Criminal Matters Act


2012

 The Mutual Legal Assistance in Criminal Matters


Rules 2013

 The Overseas and Migration Act 2013


Human Trafficking Routes from Bangladesh

 Bangladesh India Middle East/Latin America and


America

 Bangladesh Myanmar/Indonesia/Cambodia/Malaysia

 Bangladesh Dubai/Saudi Arabia and other countries


in the Middle East

 Bangladesh-Dubai/Libya/Algeria/Romania/Italy/Spain/Turkey

You might also like