Feeds

CSI boffins: You can't ID crims from bitemarks on victims

Corpse-chomp research discredits gnasherprinting

The smart choice: opportunity from uncertainty

Topflight CSI boffins have cast doubt on the apparently "commonly held belief" in forensics that criminals can be positively identified from the bite marks they leave on their victims.

"Bitemark identification is not as reliable as DNA identification," explains the study's lead author, Prof Raymond G Miller of the University of Buffalo.

"With DNA, the probability of an individual not matching another can be calculated," he says. "In bitemark analysis, there have been few studies that looked at how many people's teeth could have made the bite."

Miller and his colleagues teamed up with Robert Dorion, author of Bitemark Evidence: A Color Atlas, which is apparently "the only comprehensive textbook on the subject of bitemarks". The boffins embarked on a probing analysis of the subject.

According to UBuff:

The study investigated three main questions: is it possible to determine biter identity among people with similarly aligned teeth; is it possible to determine how many individuals from a larger sample might also be considered as the biter; and, if there is bite pattern distortion, is it enough to rule out a specific biter while still including a non-biter?

These knotty issues were investigated by a complex procedure involving a hundred sets of model teeth made of stone, which were used to make bite marks in skin taken from dead human bodies. (The UBuff report notes regretfully that "current human subject restrictions limit experimentation on living subjects".)

The result? "Bitemark evidence should be approached with caution", apparently. There is more from UBuff here. Our moderating staff look forward keenly to a volley of comments along the lines of "there's a subject you can really get your teeth into". ®

Eight steps to building an HP BladeSystem

More from The Register

next story
Malaysian Airlines flight MH17 claimed lives of HIV/AIDS cure scientists
Researchers, advocates, health workers among those on shot-down plane
Forty-five years ago: FOOTPRINTS FOUND ON MOON
NASA won't be back any time soon, sadly
Mwa-ha-ha-ha! Eccentric billionaire Musk gets his PRIVATE SPACEPORT
In the Lone Star State, perhaps appropriately enough
MARS NEEDS OCEANS to support life - and so do exoplanets
Just being in the Goldilocks zone doesn't mean there'll be anyone to eat the porridge
The Sun took a day off last week and made NO sunspots
Someone needs to get that lazy star cooking again before things get cold around here
Diary note: Pluto's close-up is a year from … now!
New Horizons is less than a year from the dwarf planet
Boffins discuss AI space program at hush-hush IARPA confab
IBM, MIT, plenty of others invited to fill Uncle Sam's spy toolchest, but where's Google?
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.