CRIMINAL JUSTICE 222 4
Bullets are some of the most common causes of deaths in most parts of the world. There
are two forms of gun wounds, close and distant, that are highly prevalent. Crime scene
investigators always look for the appearance of injuries to determine the range of the shooter. In
close shots, the gun muzzle is less than 18 inches from the victim body. However, in distant
ones, shooting is done at distances greater than 18 inches. Evidently, both close and distant bullet
wounds are different, and one can tell by mere observation. For instance, in close shots, the skin
of the dead is usually burnt with signs of bruising, blackening, and tattooing of areas around the
wound. Notably, the palms of the deceased are highly resistance to powder tattooing. Apart from
that, the blackening around the wound can be wiped by using a wet cloth. However, the tattooing
cannot be wiped off from the skin. On the contrary, distant injuries are irregular and have a
stellate appearance. In fact, an abrasion ring is absent, and the wound looks more like an exit.
The blackening and tattooing looks are lacking with the skin around it showing several zones
(Techniques of Crime Scene Investigation: Homicide Investigation, slide 30).
Discuss some of the most common ways that computer evidence is destroyed.
Fundamentally, digital evidence has dramatically revolutionized the field of crime
investigations. In the recent times, it has concluded high-profile cases that would not have been
resolved. There are several forms of digital evidence that is acceptable and admissible in a court
of law. They include child pornography, gambling, terrorism, fraud, trade secret theft, identity
theft, the crime of violence, and theft or destroying of intellectual property. There have numerous
cases of destruction of digital evidence that have been reported in the recent times. A
comprehensive analysis has revealed common ways in which evidence is destroyed. First and
foremost, an investigator handling a certain case may become impatient pushing him or her to
use methods that are not acceptable. For instance, the agent may look at the data using the