Thursday, November 26, 2020

Soldiers help identify new IED threats using forensics

Must read

Experimental fingerprint test can distinguish between those who have taken or handled cocaine

In a paper published in Nature Publishing Group's Scientific Reports, a series of experiments by the University of Surrey detail how it is...

Soldiers help identify new IED threats using forensics

As operations in Iraq and Afghanistan have demonstrated, the enemy is adept at making inexpensive improvised explosive devices, or IEDs, and modifying them over...

Measuring evil: Noted psychiatrist seeks tool to quantify wickedness

Is a “perp” who attempts to permanently scar a victim with a knife more or less depraved than one who forces a child to...

Queensland Police mapping crime scenes with 3D scanner

The Queensland police has purchased a AU$37,000 Zebedee for its very own for mapping crime scenes. Zebedee consists of a Lidar scanner, which images spaces by analysing...
Michael Whyte
Crime Scene Officer and Fingerprint Expert with over 12 years experience in Crime Scene Investigation and Latent Print Analysis. The opinions or assertions contained on this site are the private views of the author and are not to be construed as those of any professional organisation or policing body.
- Forensic Podcast -

As operations in Iraq and Afghanistan have demonstrated, the enemy is adept at making inexpensive improvised explosive devices, or IEDs, and modifying them over time to become even more lethal.

“For us to adapt to those threats, we must be able to identify and assess what those IEDs or weapons are and how they’re being used against us,” said Dr. Jay Ehrgott, a research engineer with the Engineer Research and Development Center, or ERDC, U.S. Army Corps of Engineers, Vicksburg, Mississippi. He spoke at the Pentagon on Lab Day, May 14.

To identify the threat in the past, experts from ERDC reaction teams or the Joint IED Defeat Organization, known as JIEDDO, traveled to the location to examine the craters left behind by improvised explosive devices or holes in vehicles made by projectiles. The forensics work, incidentally, is termed CALDERA+, which stands for Crater Algorithm Design for Explosive Charge Analysis.

However, when doing forensic weapons signature research, time is of the essence. Soldiers on-site where or near when the event occurred, would have a much better chance of getting evidence before it becomes contaminated by weather or human activity. Ehrgott compared the task to “CSI,” or crime scene investigations.

So, ERDC, in collaboration with JIEDDO, the Army Research Lab and National Ground Intelligence Center, came up with a plan to provide training and equipment to frontline Soldiers — particularly explosives ordnance personnel — to do the forensics.

ERDC published a “Post-Blast Crater Collection and Analysis Guide” that offers easy-to-understand techniques to expedite crater analysis. A three-day training course fortifies the guide.

The training includes taking measurements and photos of the crater’s geometry, as well as obtaining and analyzing soil samples. The way it’s done is standardized so that the data are valid, reliable and results can be replicated for later testing in the lab, Ehrgott said.

When ERDC receives the data, engineers can deconstruct the so-called scene of the crime and determine the type of weapon or IED used and the power of them, he said.

For example, some IEDs are made up of artillery shells, some are made with common ingredients like fertilizer, some are explosively formed projectiles which focus energy on the underbelly of vehicles, and dirty bombs might include a substance like chlorine with the blast material.

Over time, ERDC and its collaborating partners have amassed a database of threats by type, time and location. The database has informed commanders of the evolving threats, Ehrgott said.

With this knowledge, commanders can “adjust mission planning, improve tactics, techniques and procedures and evaluate effects on our protective systems,” he said.

In addition to crater analysis, Soldiers are trained to identify enemy projectiles by examining the characteristics of holes to armor and vehicles, he said. Each weapon used produces a distinct signature or fingerprint.

ERDC’s lab fires a variety of rounds at test plates to produce a template library of signatures.

Finally, measurements of the chemical and metallurgic properties of the projectile where it penetrated the material are taken to cross-validate the identity of the weapon used, he said.

All of this research and fieldwork has attracted the attention and interest of other agencies.

In addition to the Army; the other services, law-enforcement agencies across the country and investigation units, like the Bureau of Alcohol, Tobacco and Firearms, are incorporating most of the post-blast collection and analysis techniques into their training curriculum, Ehrgott said.

Source: US Army

- Advertisement -

More articles

- Advertisement -

Latest article

Trees and shrubs might reveal the location of decomposing bodies

Plants could help investigators find dead bodies. Botanists believe the sudden flush of nutrients into the soil from decomposition may affect nearby foliage. If...

Are Detectives discounting the associative value of fingerprints that fall short of an identification in their investigations?

Every day, Fingerprint Experts in every latent office across the globe examine fingermarks that they determine to fall short of an identification....

Using the NCIC Bayesian Network to improve your AFIS searches

This National Crime Information Centre (NCIC) Bayesian network is based on the statistical data of general patterns of fingerprints on the hands...

DNA decontamination of fingerprint brushes

Using fingerprint brushes across multiple crime scenes yields a high risk of DNA cross-contamination. Thankfully an Australian study has discovered a quick and easy way to safely decontaminate fingerprint brushes to prevent this contamination risk and allows the brushes to be safely reused even after multiple cleaning cycles.

Detection of latent fingerprint hidden beneath adhesive tape by optical coherence tomography

Adhesive tape is a common item which can be encountered in criminal cases involving rape, murder, kidnapping and explosives. It is often the case...