Forensics: Trace evidence

Contents

Spray paint droplets adhering to the fibers of a jacket, observed under a microscope (magnification ~75x). When spraying from a spray paint can, paint droplets from the resulting mist are likely to fall on nearby surfaces.

Trace evidence is the small fragments of physical evidence that are transferred between objects, people, and the environment. Trace evidence can be collected and analyzed to establish links between objects, people, and places.

Trace evidence can be:

Trace evidence can be transferred:

An adversary can use trace evidence to:

Trace evidence does not include fingerprints and DNA, which are considered separate forensic disciplines.

Fibers

When an object made of textile fibers — clothing, a bag, etc. — touches a surface, it can leave fibers on the surface. The likelihood that an object leaves fibers on a surface and the amount of fibers left depend on the object, the surface, and the duration and type of contact between the two.

An object made of textile fibers can leave more or less unique fibers, depending on the object and its manufacturing process. For example:

An adversary can:

See Handbook of Trace Evidence Analysis ?This is a link to the Surveillance Archive. Use Tor Browser to access it., chapter “Fibers” for an overview of fibers.

Footprints

When you are barefoot and your feet touch a surface, you can leave footprints on the surface. You usually leave footprints on the insoles of the shoes you wear. You can leave footprints when you are wearing socks.

A foot can leave a more or less unique print, depending on the foot and the surface. For example:

An adversary can:

See Examination and Interpretation of Bare Footprints in Forensic Investigations for an overview of footprints.

Shoeprints

When you wear shoes and your feet touch a surface, you can leave shoeprints on the surface.

A shoe can leave a more or less unique print, depending on the shoe and the surface. Even mass-produced shoes of the same model vary slightly due to irregularities in the manufacturing process and to wear patterns. For example:

An adversary can:

See Footwear Impression Evidence: Detection, Recovery and Examination ?This is a link to the Surveillance Archive. Use Tor Browser to access it. for a comprehensive overview of shoeprints.

Tool marks

Tools — bolt cutters, scissors, hammers, screwdrivers, etc. — can leave marks on the objects they are used on.

A tool can leave a more or less unique mark, depending on the tool, how it is used, and on the surface. Even mass-produced tools of the same model vary slightly due to irregularities in the manufacturing process and to wear patterns. For example:

An adversary can:

See also:

Glass

When glass breaks, it produces shards of various sizes.

A glass object (e.g. a window, a bottle) produces more or less unique shards when broken, depending on how, where and when it was manufactured. For example:

An adversary can compare two shards of glass to determine the likelihood that they come from the same object.

See Handbook of Trace Evidence Analysis ?This is a link to the Surveillance Archive. Use Tor Browser to access it., chapter “Interpretation of Glass Evidence” for an overview of glass evidence.

Traces of accelerant

Traces of accelerant are covered in the technique Forensics: Arson.

Other

Other types of trace evidence include:

Used in tactics: Incrimination

Mitigations

NameDescription
Anonymous dress

An adversary can use trace evidence to link clothing to an action site. To mitigate this, you can dress anonymously, and in particular dispose of the clothing after the action.

Anonymous purchases

An adversary can use trace evidence to link objects to an action site. To mitigate this, you can anonymously purchase objects used in the action.

Careful action planning

An adversary can use trace evidence to link objects to an action site. To mitigate this, after the action, you can plan to:

  • Dispose of the objects you used during the action.
  • If an object is too expensive to discard after each action, store it in a stash spot or safe house.
  • If a tool is too expensive to discard after each action, modify it so that an adversary cannot link it to traces it may have left at the action site. For example, you can dispose of the disc of a disc cutter.
Stash spot or safe house

An adversary can use trace evidence to link objects to an action site. To mitigate this, after the action, you can store in a stash spot or safe house objects used in the action that are too expensive to discard after each action.

Used in repressive operations

NameDescription
December 8 case

During the raids, several objects (a stove, pans, gloves, spatulas) were analyzed for traces of products that could be used to create explosives.[3]

Case against Jeff Luers

In the raid of the storage unit, the police found a bolt cutter matching the cuts in the fence surrounding the site of the May arson attempt.[4]