Institute Of Recherche Criminelle Of La Gendarmerie Nationale Ircgn

Rosny-sous-Bois, France

Institute Of Recherche Criminelle Of La Gendarmerie Nationale Ircgn

Rosny-sous-Bois, France
SEARCH FILTERS
Time filter
Source Type

Perrin M.,Institute Of Recherche Criminelle Of La Gendarmerie Nationale Ircgn | Halart E.,University of Lille Nord de France | Coste D.,British Petroleum | Lecompte Y.,Institute Of Recherche Criminelle Of La Gendarmerie Nationale Ircgn | Lhermitte M.,University of Lille Nord de France
Annales de Toxicologie Analytique | Year: 2012

Objective: Retrospective study of the results of confirmatory analysis performed by two laboratories in order to verify the overall performance of the screening tests (calculation of the positive predictive value) and to avaluate the overall performance of roadside tests when they are found positive. Material and Methods: Data collection of GC-MS results for four major families of illicit substances, after urine or oral fluid screening tests, or in the case of no available screening data. Results: The illegal substance most frequently encountered in the tested drivers is cannabis, with a prevalence (among the analyzed samples) of 51% at the Lille University Hospital (458 confirmed cases out of 895) and 87% at the IRCGN (679 confirmed cases out of 779). At the Lille University Hospital amphetamines come second, with 6% prevalence among the analyzed samples (57 positives for 895 cases). The opiate family is found in 15 among 108 confirmation analyses at the IRCGN. Cases where the presence of morphine has been demonstrated remain difficult to interpret in regard to the use of street drugs because of confounding factors related to the administration of pain killers or the intake of licit opiates. Conclusion: Urine or oral fluid tests are therefore able to select drivers who have used narcotics before or while driving. Cannabis is the most frequently found substance, which is consistent with available data on consumption patterns in the general population. © Société Française de Toxicologie Analytique 2012.


Souvignet T.,Institute Of Recherche Criminelle Of La Gendarmerie Nationale Ircgn | Souvignet T.,Pantheon-Assas Paris II University | Prufer T.,Kriminaltechnisches Institute KTI des Bundeskriminalamtes BKA | Frinken J.,Kriminaltechnisches Institute KTI des Bundeskriminalamtes BKA | Kricsanowits R.,Kriminaltechnisches Institute KTI des Bundeskriminalamtes BKA
Digital Investigation | Year: 2014

Since mid-2012, France and Germany have had to deal with a new form of payment card skimming. This fraud consists of adding a wireless embedded system into a point-of-sale payment terminal with the fraudulent goal of collecting payment card data and personal identification numbers (PIN). This case study details the strategy adopted to conduct the digital forensic examination of these skimmers. Advanced technologies and analyses were necessary to reveal the skimmed data and provide useful information to investigators for their cross-case analysis. To go further than a typical digital forensic examination, developments based on embedded systems were made to help investigators find compromised payment terminals and identify criminals. Finally, this case study provides possible reactive and proactive new roles for forensic experts in combating payment card fraud. © 2014 Elsevier Ltd.


Frere B.,Institute Of Recherche Criminelle Of La Gendarmerie Nationale Ircgn | Bernier G.,Institute Of Recherche Criminelle Of La Gendarmerie Nationale Ircgn | Cottin F.,Institute Of Recherche Criminelle Of La Gendarmerie Nationale Ircgn | Dalmas A.,Institute Of Recherche Criminelle Of La Gendarmerie Nationale Ircgn | Arpino P.,Chimie Paristech
Actualite Chimique | Year: 2010

In certain types of criminal investigation, it is sometimes necessary to search for traces of lachrymatory substances, such as those found in self-defence devices readily available in many retail outlets. The presence, or absence, of such substances may be important evidence and, as such, may have a significant impact on the progress of the investigation. Recently developed chromatographic methods combined with mass spectrometry using different modes of ionisation, including electron impact (EI), atmospheric pressure chemical ionisation (APCI) and tandem mass spectrometry analysers (MS/MS), are effective for detecting trace levels of lachrymatory molecules, including 2-chlorobenzylidene-malonitrile (CS), capsaicin and its analogues that have been synthesized or are present in oleoresin Capsicum extracts.


Boumrah Y.,National Institute of Criminalistics and Criminology | Boumrah Y.,University of Science and Technology Houari Boumediene | Rosset M.,Etat major de la marine | Lecompte Y.,Institute Of Recherche Criminelle Of La Gendarmerie Nationale Ircgn | And 3 more authors.
Egyptian Journal of Forensic Sciences | Year: 2014

Piperazine-related drugs are sold as party pills in the form of tablets, capsules, liquids or powders. These party pills can contain several piperazine derivatives, or even a mixture of piperazines and amphetamine derivatives. This paper describes a screening method using a gas chromatography-mass spectrometry technique allowing the separation and the identification of active components within these mixtures by a combined silylation and acylation derivatization procedure. The studied substances-namely: 1-benzylpiperazine (BZP), 1-(3,4-methylenedioxyben-zyl)piperazine (MDBP), 1-(3-trifluoromethylphenyl)piperazine (TFMPP), 1-(3-chlorophenyl) piperazine (mCPP), 1-(4-methoxyphenyl) piperazine (MeOPP), amphetamine, methamphetamine, ephedrine, pseudoephedrine, 3,4-methylenedioxy-N-methamphetamine (MDMA), 3,4-methylenedi-oxyamphetamine (MDA), 3,4-methylenedioxy-N-ethylamphetamine (MDEA) and N-methyl-1,3-benzodioxolylbutanamine (MBDB)-are separated. © 2014 Hosting by Elsevier B.V.


Rehault F.,Institute Of Recherche Criminelle Of La Gendarmerie Nationale Ircgn
Digital Investigation | Year: 2010

In the field of forensic analysis, Windows mobile smartphones are a real issue for an IT security expert. When retrieving information from such devices, commercial products or free tools available on the Internet do not prevent alterations from being made to smartphones flash memory. Indeed, all of those tools use ActiveSync to acquire data from the smartphone to the computer. Moreover, in order to implement this acquistion, a DLL agent has to be placed into the memory to enable remote control from the computer. This study is meant to propose an alternative to these methods. This overall purpose is twofold. It tends to prove that some smartphones bootloaders can be used to acquire data to preserve the digital evidence integrity. In addition, it proposes methods to process specific files with specific formats such as registry hives and the cemail.vol file, including the retrieval of deleted data still embedded in this file. © 2010 Elsevier Ltd. All rights reserved.


Souvignet T.,Institute Of Recherche Criminelle Of La Gendarmerie Nationale Ircgn | Souvignet T.,Pantheon-Assas Paris II University | Hatin J.,National Engineering School of Caen | Maqua F.,Institute Of Recherche Criminelle Of La Gendarmerie Nationale Ircgn | And 3 more authors.
Digital Investigation | Year: 2014

While one would not even consider them alike, payment cards are one of the most valuable and widely used embedded systems. Payment card systems are probably the most attacked and counterfeited. In fact, even though the use of smart cards have introduced high security capabilities, criminal activity has not been deterred and payment card fraud remains a lucrative activity. From low-tech (carding) to high-tech (man in the middle attack) fraud, all payment card based frauds require stealing or modifying card data and reusing it with a direct profit. Physical forms of fraud, such as Automated Teller Machine (ATM) withdrawals or in store payments, are mostly based on and associated with manipulated cards. Through their nefarious actions, that may include overwriting the magnetic strip data or injecting attacks on the embedded microcontroller, criminals are able to realise significant monetary gains. To effectively deal with these fraud cases, investigators have to quickly determine whether a card is authentic or a counterfeit. Currently no known easy forensic tool exists that provides a quick effective and accurate response. In this article, after having conceptualised payment cards as multi-interface embedded systems, we propose simple and fast forensic analysis methods to finally provide investigators with associated desktop and mobile forensic tools. © 2014 Elsevier Ltd.

Loading Institute Of Recherche Criminelle Of La Gendarmerie Nationale Ircgn collaborators
Loading Institute Of Recherche Criminelle Of La Gendarmerie Nationale Ircgn collaborators