Vidocq Journal 2013 Quarter 1

Transcription

Vidocq Journal 2013 Quarter 1
V
I
D
O
C
Q
S
Vidocq
O
C
I
E
T
Y
Journal
The Vidocq Society – Solving Unsolved Murders and Cold Cases
Quarterly Journal
Volume Twenty Four Number One 2013
Vidocq
Public Face
Fast Forensics
With Dr. Bookspan
Vidocq
Member
News
Digital Forensics
Peter Stephenson,
PhD
Submission Rules
Articles &
Advertisements
Forensic Linguistics and Threat
Program
Page 1
Pages 2-4
Pages 4-6
Pages 7-9
Pages 16-17
Page 18
Bookspan's Bullets
Vidocq Society on Facebook and Wikipedia
By the Editors
The Vidocq Society appears on the online (Internet) entities of Facebook and Wikipedia.
Facebook is a site where people and groups put information and photos about themselves and others. The topic page
may be started and added to by the people involved or by strangers. Information may
be true or not, beneficial or frivolous. Facebook is a profit company that manages to
get people to give much private info, which is sold to advertisers. With Vidocq member expert involvement, a Facebook page affords opportunity to use it for higher
good. Vidocq has had a Facebook page since March 2011. Don’t lose this chance to monitor, add good, truth, and
benefit, as intended: http://www.facebook.com/pages/The-Vidocq-Society/201544689874340
Wikipedia is an online collection of articles, allowed to be written and edited by anyone, at home over the Internet using their own web browser, on nearly any topic. Articles have no bylines; authors aren’t publicly accountable for what they write. A separate site called WikiScanner can be used to track
sources of edits. Without effort and review, articles may not reflect topics accurately. The entry on the Vidocq Society is brief with only one reference. Add your careful, truthful, abilities
to make the Vidocq Wikipedia page a world resource for benefit, as intended:
http://en.wikipedia.org/wiki/Vidocq_Society
1
V
I
D
O
C
Q
S
O
C
I
E
T
Y
Bookspan's Bullets by Jolie Bookspan, MEd, PhD, FAWM, VSM
Each issue brings you summarized forensic news and education. Bookspan's Bullets is
dedicated to Frank Bender, VSM, who inspired and requested the column beginning in
1997.
DNA Ancestry Tracing Too Vague
For Accuracy
SOCOM Seeks SubSonic Bullets
Fired bullets may produce a brief, highly audible sonic
boom. One way to make bullets quieter is to keep them
below the sound barrier of ~1,125 ft or 343 meters per
second (dry air, 20°C (68°F), sea level). Propellant charge for
subsonic ammunition must be smaller than for supersonic, the bullet heavier, fired at lower pressures, making
large-caliber war rifles less accurate, with reduced range,
and increased burn problems causing jamming and fouling of the weapon. Bullets must obdurate (expand during
firing) to the size of the barrel to keep the bullet on target
and prevent propellant gases from leaking and melting to
the inside barrel--difficult to remove and damaging to the
weapon. A bullet can't be too light or heavy, too hard or
soft, all of which affect ability to obdurate properly. Since
World War II, subsonic bullets are considered effective
mainly in smaller .22 and 9 mm pistols.
Ancestry companies which base genetic history on DNA
may tell individuals they have links to historical figures
such as Napoleon or Cleopatra, however researchers say
DNA tests cannot provide such specific information.
Professor David Balding and Professor Mark Thomas of
University College London published a public guide in
Sense About Science stating, "Such histories are either so
general as to be personally meaningless or they are just
speculation from thin evidence." They further stated,
"The genetic ancestry business uses a phenomenon wellknown in other areas such as horoscopes, where general
information is interpreted as being more personal than it
really is."
Professor Balding stated that news items about famous
people being related to historical figures often come from
PR material provided by genetic testing companies. DNA
Worldwide group director David Nicholson stated, "Testing can provide a general ancestry indication i.e. Northern European, Western Africa or Middle Eastern and in
some cases even more specific. DNA cannot tell you that
your ancestors were Viking, simply that your ancestry
came from a part of the world common to the Vikings
based on historic facts."
SOCOM, The Pentagon Special Operations Command,
wants to "provide superior covert and stealth capabilities"
for military, police, and Department of Homeland Security. The Defense Department does not presently have
subsonic bullets "classified for use in calibers provided
by DoD service." One Pentagon solution for subsonic
bullets is "polymer cased ammunition" which "produce a
reliable and consistent powder burn" and which obturate
at lower pressures making it possible to use a heavier bullet with less propellant. Polymer cartridges are not new.
During the late 1980s to early 1990s, the Army spent
$300 million on the canceled project Advanced Combat
Rifle to replace the M16 standard. One proposed replacement was the Steyr ACR, which used polymer cartridges. It supposedly was inaccurate due to inconsistent
strength of the cartridges.
- Sources:
- Sources:
Sense about Science
http://www.senseaboutscience.org/?
http://www.senseaboutscience.org/news.php/306/we-are-allrelated-to-romans-vikings-egyptians-attila-the-hun
Sense About Genetic Ancestry Testing
http://www.senseaboutscience.org/resources.php/119/senseabout-genetic-ancestry-testing
GizMag
http://www.gizmag.com/us-special-forces-subsonic-ammunition/25172/
CNN
http://www.cnn.com/2012/11/20/tech/innovation/subsonic-bullets-wired/in
dex.html?hpt=hp_c3
2
Continued on Next Page
V
I
D
O
C
Q
S
O
C
I
E
T
Y
Bookspan's Bullets
By Dr. Jolie Bookspan, VSM
Continued from Previous Page
Hiding Secrets in Email Jokes
Clothes That Block Drone Cameras
A new line of clothing using "metalized" fabric blocks the
wearer from drone-mounted infrared camera detection.
New York City privacy advocate Adam Harvey states that
his three-item Stealth Wear line of scarves, capes, and
burqas is more "a political statement than a moneymaking venture." Harvey is an instructor of physical
computing at the Manhattan School of Visual Arts and is
creator of the CV Dazzle project to develop makeup and
hairstyles that camouflage people from face-recognition
cameras and software.
Steganography is designed to hide a secret message in
digital form, hiding the binary strings of 0s and 1s in a
photo or music file. The message looks like the original
image or song, and the recipient who knows a message is
encoded uses software to extract it. This kind of encryption requires large file size. Hiding a message in a plain
text document yields a small file sizes but the problem is
that the grammar, syntax, or spelling looks suspicious
because it is changed to hide the real message. A new
method developed by computer scientist Abdelrahman
Desok of the University of Maryland, uses a joke to hide
the meaning.
Metal is an excellent material to absorb and scatter infrared waves. Metalized fabric prevents heat dissipation of
the wearer to surroundings, where infrared cameras could
detect them. Woven fabric is treated so that prepared
metal particles adhere, producing a "flexible, breathable
fabric that can be cut with ordinary tools but that protects
against electromagnetic interference and masks infrared
radiation." The metalized fabric is only about double the
weight of untreated fabric. Harvey says his fabric, coated
with copper, nickel and silver, gives his scarves, cloak,
and thigh-length burqa "a silvery and luxurious feel.” The
material also blocks cell signals. Harvey sells his Stealth
Wear via U.K. Web site. The burqa costs about $2,300,
the cloak "hoodie" $481, and the scarf is $565 - "luxury
items, but so, too, is privacy today," according to Harvey.
For example, to hide the code word "shaking" in an email joke, such as "Where do milk shakes come from?"
with the correct answer, "From nervous cows" the system
can substitute the word "shaking" for "nervous" so that
the answer becomes "From shaking cows." It loses wit,
but makes enough sense to merely seem like a poorly
done joke. Another substitution example is, “Where is
Dracula's American office? The Vampire State Building.”
The question could be substituted as,“Where is Dracula's
American home?” with the same answer. The Automatic
Joke Generation Based Steganography Methodology
(Jokestega) uses software to automatically write jokes
using large dictionary databases. "A collection of jokes
sent in a message with the non-obvious answer substituted for the wittier version could conceal a message using Jokestega. Desoky suggests that 8 bits of data might
be hidden in a simple joke of the type discussed."
In February 2012, President Obama signed a law giving
the FAA until September 2015 to draw up rules to dictate
how entities such as law enforcement, military, and private sector may use drones in U.S. airspace. The Federal
Aviation Administration (FAA) predicts 10,000 commercial drones in domestic airspace by 2017—almost twice
the estimates current unmanned aircraft.
- Source:
- Sources:
Desoky, A. 2012. Jokestega: Automatic joke generationbased steganography methodology. Int. J. of Security and
Networks, 7:3, 148-160. DOI: 10.1504/IJSN.2012.052529
http://www.inderscience.com/inføinarticletoc.php?jcode=ijs
n&year=2012&vol=7&issue=3
http://www.inderscience.com/inføinarticle.php?artid=52529
Scientific American
http://www.scientificamerican.com/article.cfm?id=drone-pro
of-anti-infrared-apparel&WT.mc_id=SA_WR_20130313
Contact: Albert Ang [email protected]
Inderscience Publishers
3
Continued on Next Page
V
I
D
O
C
Q
S
O
C
I
E
T
Y
Bookspan's Bullets
By Dr. Jolie Bookspan, VSM
Continued from Previous Page
Doctor Used Silicone Fingers To
Falsify Sign-In for Colleagues
A council spokesman stated those who receive regular
wages without showing up for work included public
workers in the areas of health, education and security.
- Source:
A Brazilian doctor used prosthetic silicone fingers to fool
the biometric employee attendance device at the hospital
where she works to sign in for absent colleagues. Police
said they recovered six silicone fingers at the time of the
doctor's arrest, three of which have already been identified as bearing the fingerprints of co-workers. She faces
charges of fraud for covering up the absence of six colleagues.
BBC News
http://www.bbc.co.uk/news/world-latin-america-21756709
Dr. Bookspan loves good science.
Send forensic jokes, quotations,
websites and stories for possible
inclusion in
“Bookspan’s Bullets.”
The town's mayor, Acir Fillo, says that the police investigation found about 300 public employees in the town,
whom he described as “an army of ghosts” had been receiving pay without going to work.
Email: Bookspan’s Bullets
News of Vidocq Members
Donna Fontana, M.S., VSM, Featured in The Courier Post
Donna Fontana, M.S., respected forensic anthropologist
for the New Jersey State Police, was featured in the Courier Post for her tireless careful
work in forensic reconstruction
to identify unknown h u m a n
skeletal remains.
the World Trade Center on Sept. 11, 2001, as well as
many other plane crashes. She earned a bachelor's degree
in anthropology at Penn State, a
master's degree in pathology from
the Medical College of Virginia,
and is a fellow in the physical
anthropology section of the
American Academy of Forensic
Sciences.
The nation’s morgues hold an
estimated 50,000 sets of unidentified remains, without national
or central cataloguing database.
Ms. Fontana was the first to start
a police site to centralize and advance identification ability.
Photo courtesy Penn State.
For the full article, click:
Courier-Post Feb 2013.
Fontana has helped New Jersey
law-enforcement agencies and county medical examiners
since 1981, worked to identify victims of the attack on
http://www.courierpostonline.com/apps/pbcs.dll/article?AID=20133
02150088&gcheck=1
4
Member News Continued on Next Page
V
I
D
O
C
Q
S
O
C
I
E
T
Y
News of Vidocq Members
Continued from Previous Page
Fred Martens, VSM, on History Channel
In the afternoon, VSM Warren Tewes, DDS, and VSM
Richard Walter, MS presented “Cold Cases Breakthroughs.” Dr. Tewes presented the biography of E.F.
Vidocq, the founding history of the Vidocq Society and
the process of hearing cold cases and contributing intervention to law enforcement. Mr. Walter examined several
cold cases and pinpointed roadblocks that may have
slowed investigators, but continued pursuit to resolution.
He highlighted breakthrough cases that lead to trial.
The History Channel broadcasted "The Definitive Guide
to the Mafia" narrated by Michael Franzese---the "Hollywood Don." Represented in this 2 hour program were Michael Chertoff, Selwyn Raab, and Fred Martens, VSM,
former OC Lt. with NJSP, and Chairman of the PA Commission on Organized Crime. Fred stated the program
was done “quite well and accurately.”
Concluding the day, VSM James Adcock, PhD and Robert Davis, MS, presented “Research and Assessment of
Unresolved Homicides.” They discussed the future of
forensic sciences regarding national information databases, DNA evidence, and tech tools like GPS systems
and other emerging forensic science techniques. They
examined the combinations of these sciences and how
this has lead to changes in both crime solving and the
expectations of the public, law enforcement, and the judicial system.
VSMs Lecture at the Smithsonian
By Warren Tewes, DDS, MS, DABFO, VSM
The American Academy of Forensic Sciences (AAFS)
meets annually in a major city in the US, with 2500 to
3000 attendees each year. When the AAFS Annual Meeting is in Washington DC, which is every 6-8 years, the
Smithsonian Institution invites the Academy to select a
panel of presenters for a day of lectures to the Smithsonian Associates and the public.
In separate sessions on Thursday, 21 Feb 2013, Vidocq
members Richard Walter and Dr. Peter Stephenson
made presentations in the Digital and Multimedia Section. Donna Fontana, VSM, presented a paper in the
Odontology section with Dr. Sheila Dashkow and Dr.
Stuart Alexander, entitled "What Are We Accomplishing
With Dental Information? Obstacles Facing Forensic
Odontologists and Working Solutions."
On February 23, the panel presented, “Forensics: Solving
Crimes the Experts’ Way” at Smithsonian’s Ripley Center. In the day-long program, members of the AAFS lectured on intriguing cases, reported what they had learned,
and their professional motivation in forensic investigations.
Henry Lee, PhD began with his lecture on “Famous and
Infamous Case Files” including the JonBenet Ramsey
murder, the DC snipers shootings, the murders of Nicole
Brown Simpson and Laci Peterson, as well as the kidnapping of Elizabeth Smart. Defense attorneys Linda
Kenney-Baden, JD and Barry Scheck, JD presented “Forensic Tests in the Courtroom.” They discussed how experts move from the crime scene, autopsy table, and
crime lab into the courtroom. What does the jury hear in
contrast to what the public hears via media’s summarized
reporting? They shared their involvement in the Phil
Spector, Jayson Williams, and Casey Anthony cases, as
well as the Innocence Project.
Christopher Anderson presented a paper at The Last
Word Society, entitled “DNA and Forensic Anthropology
in a Cold Case.” It involved a 44 year old cold case and
the conviction of Robert Bowman. Mr. Anderson is a
member of the Jurisprudence Section.
It is very nice of the Smithsonian Institution to ask the
AAFS, and very nice of the AAFS to ask us to represent
them at the SI.
5
Member News Continued on Next Page
V
I
Continued from Previous Page
D
O
C
Q
S
O
C
I
E
T
Y
News of Vidocq Members
Knot and Insect Experts Sought
Article Accepted in Forensic Magazine
By Dr. Peter Hahn, Vidocq Postmaster
By Mark Schroeder
KNOTS
Jim Trainum, VSM, is looking for a Vidocq member or
other expert who knows about knots. Please contact Jim
directly:
Jim Trainum
Criminal Case Review & Consulting
414 Seward Square SE #101
Washington, D.C. 20003
202-359-9454
[email protected]
Psychiatrist Mark Schroeder, VSM, had an article accepted in the Forensic Examiner. The article is entitled
“Improving Reasoning in Medicolegal Evaluations.” The
article discusses ways to improve the reasoning and logic
used in medical and psychological consultations to criminal or civil legal matters, such as assessment of claimed
disability or insanity.
In his work performing disability and other medicolegal
evaluations, Dr. Schroeder has found that little attention
has been paid to the reasoning involved in these evaluations, so that is often hard to tell how an evaluator
reached his or her conclusions. It is the author’s hope that
the use of a systematic approach to analysis in such
evaluations, with attention to the reasoning involved, can
improve the quality and reliability of these evaluations
and facilitate their understanding and acceptance by
courts and other requesting parties. This article does not
specifically address reasoning used in the criminal investigations that are considered by the Vidocq Society. However, there are similarities and the reader may find useful
applications to our work.
INSECTS
Vidocq member Bob Benowitz asks if there any members
of the Vidocq Society that teach about how insects interact with decaying bodies. Bob had a friend who is interested in the forensic aspect of entomology. If you can
help with this question, please contact Bob Benowitz:
[email protected].
Contact Joe McGillen
By Bill Fleisher, VSM, Vidocq Commissioner
- In his work, Mark Schroeder performs peer reviews and
independent examinations regarding psychiatric disability
for several insurance companies and disability management companies.
VSM Joe McGillen is 86 years-old, and now residing in
a retirement home. He would love to hear from his
friends in Vidocq.
Here is his contact information:
Joe McGillen, VSM
Deer Meadow Retirement Home
8301 Roosevelt Blvd. Apt 700
Philadelphia, PA 19152
215-543-2180
First Rule of Investigation:
“No amount of inductive evidence
guarantees the conclusion.”
Joe does not have internet access. Think of mailing or
bringing him the copies of your Vidocq Journal that you
print and would otherwise discard or destroy for security.
6
V
I
D
O
C
Q
S
O
C
I
E
T
Y
Digital Forensics with Peter Stephenson, PhD
Advanced Persistent Threats and Cybercrime
By Peter Stephenson, PhD, VSM, CISSP, CISM, FICAF, LPI
sort that is not supposed to be in our computer and that
it will do bad things if we let it hang out for long.
This quarter we address murder, fraud, theft and other
forms of mayhem and we do it all through the medium of
cybercrime.
We get infected with malware by doing things that we
should not do. Sometimes we know that we are doing
these things and sometimes we don’t. If we visit a pornography site we have about a 37% or better chance of
getting a malware infection. If we go to a hacker site
the odds are even less in our favor.
There has been much in the news lately about advanced
persistent threats (APT). You may not recognize the
term, but it is there, none-the-less. It is there, for example, in the context of the revelations by Mandiant Corp.
that the Chinese have been hacking US organizations –
from companies to universities to governments – for
years. To many of us that probably isn’t a particularly
big surprise but surprise or not, it seems to have become
a fact of life. So this quarter we take a brief excursion
into APTs and think a bit about how incursions by a
nation-state affect us as crime fighters of one form or
another.
But we could be phished – we really should know better than to fall for that these days – or we could be infected by visiting a trusted site such as CNN or Yahoo.
We might click on an email attachment or do something
else that exposes us to a transfer vector for malware.
Really, the only defense is to be sure that our antimalware software (McAfee, Symantec, etc.) is up to
date and, unfortunately, that doesn’t offer full protection either. Some bugs are detected only about 55% of
the time.
For some readers this column will provide some specific
insights into the role of APTs in crime, especially organized crime, in the United States. For others it simply will
be an interesting side trip into the dark side of the Internet. Whichever kind of reader you happen to be, let me
assure you that the idea – and reality – of APTs is with us
for the long term and it will affect us in ways we may not
imagine today.
Malware that is used for APTs has a special mission. It
sits quietly in the background and harvests such things
as your on-line banking credentials or you login to your
business network. Why are you not protected by your
organization’s firewall? Simply because you were not
attacked from the outside… you brought the bug into
the network by doing something – reading email,
browsing the Web, for example – that the firewall saw
as a legitimate activity. There are devices that your organization can put at its perimeter that catches most
malware entering that way but not all companies use
them.
Before we start let’s get an understanding of what we
mean by APTs. We can dissect the term to get a clearer
picture of APTs and how they impact us. We start with
“Advanced”. That means that the mechanism for delivering the threat is complicated and sophisticated. “Persistent” implies that the threat stays in our systems and
hides from all of our efforts to identify and eradicate it.
And “Threat” tells us that whatever this APT thing is, it
means us harm. So, now we need examples.
So how does an APT enable organizations such as the
Chinese group that Mandiant found? And what does
that have to do with crime? First, any organization can
use the same techniques to catch you. It could be an
economically hostile nation-state such as China or it
could be a gang of thieves. APTs are equal opportunity
crimeware. They don’t care who they work for. Some
are optimized for financial crime and some are opti-
The most typical APT is a piece of malware – malware
means malicious software. We usually think of it as a
computer virus, worm or Trojan horse of some kind. I
won’t go into the technical details of what distinguishes
these types of malware but I am sure that you get the
idea that we are talking about a computer bug of some
7
Continued on Next Page
V
I
D
O
C
Q
S
O
C
I
E
T
Y
Advanced Persistent Threats and Cybercrime
Continued from Previous Page
These developers are very professional. In some cases
their support and the quality of their software exceeds
that of legitimate developers. They know full well that
their customers are not computer gurus so, like commercial software vendors, they make their products userfriendly and they support them well. They also charge
what seems like a lot of money. However, if you consider that the cost of the software pales in comparison to
the ill-gotten revenues that it generates, perhaps – for the
criminal, anyway – the price is not so high after all.
mized for international cyber theft but they all, at their
core, work the same way. Here are two examples.
Let’s start with Mandiant’s “APT-1” Chinese hackers.
They use such techniques as phishing to get you to invite
their bug into your system. Phishing is a technique
where you receive an email that appears legitimate but is
not. Once you click on an attachment or open the email
in some cases you are redirected to a web site that is infected with a piece of malware that does what the Chinese want. This is not a legitimate web site but it looks
exactly like one. It could be masquerading as your bank
or your tech support department as examples. Here is one
that came to me recently:
The financial crimeware works much like the nation-state
software. It infects the same way and it harvests financial information from your computer. It then communicates, not with the criminal – too easy to get caught that
way – but with a command and control server (CC, C2 or
C2). The C2 issues the malware – sometimes called a
“bot” – its instructions (these have been pre-programmed
by the criminal or “bot master”) and sits back waiting for
the results. It may then send the results to another C2
server or it may wait for the bot master to come fetch
them.
If you go to this site you will find that it has been disconnected. However, if it was not, it likely would have been
infected and after connecting so would your computer.
This is a very blatant form of phishing but most are quite
subtle, masquerading as a trusted site. There are many
clues here, though. First, the person claims to be Chinese. Second, the web site is in Russia
(www.beautyasian.ru) and finally, the email address is in
Finland ([email protected]). These
inconsistencies fairly scream, “Scam!”
The bot master then uses the stolen credentials to log into
your bank account just as if he was you and he nearly
empties your bank account. “Nearly” because even
criminals have ways to keep under the RADAR. First,
the criminal cannot transfer – and transfers are the preferred way to get the money – more than the particular
country’s limit without arousing suspicion. In the US
that keeps transfers under $10,000.
Once your computer is infected with the malware, the
malware often attempts to move onto your network infecting other users and harvesting information. That information could be financial but for a nation-state it
likely is trade secrets. It will stay in the network – Advanced – hiding from detection – Persistent – and continuing its work – Threat - until your administrator finally finds and eradicates it.
Second, you might check your balance on-line, see that it
is depleted and sound the alarm before the criminal is
finished. To avoid that the criminal alters your computer
screen image so that it looks as if you still have money in
your account even though you don’t.
Now, what about crimeware in the financial community?
Crimeware is a general category of malware that usually
means a kit that consists of everything criminals need to
perform on-line fraud or theft. There are thriving crimeware developer communities in several places such as
Eastern Europe, Africa and Asia. They develop, sell and
support their wares over the Internet, well hidden from
average users but accessible to criminal enterprises.
Finally, if the criminal empties the account completely
that sends up a flare to the bank so he or she will leave
some token amount in the account to avoid raising the
bank’s suspicions.
8
Continued on Next Page
V
I
D
O
C
Q
S
O
C
I
E
T
Y
Advanced Persistent Threats and Cybercrime
Continued from Previous Page
year we have added cyber criminalistics and malware
forensics. We are one of a handful of schools that
teaches malware forensics using live malware but it is
such a big part of the cybercrime landscape that we cannot avoid it.
So how can these activities generate all of the kinds of
crimes I mentioned at the start? Well, financial crimes
should by now be pretty obvious as should trade secret
thefts by foreign powers. But what about murder? The
answer to this is rather convoluted. First, the obvious:
gang-related activity. Gangs and other forms of organized crime from all over the world now participate in
various frauds and thefts using on-line resources and
crimeware. A recent case that I was involved with was a
large card theft (tens of millions of dollars) by a loosely
organized international group of criminals. The core of
the group was well-organized while the foot soldiers
were sort of like casual employees.
So what are my messages to you? First, keep your antimalware programs current at all times. Second, don’t
play in the mud. When you mud wrestle with pigs you
both get dirty and the pig likes it. Surfing sites that are
high risk is wrestling with pigs and you, not the pigs, will
come out on the short end of the stick. Finally, if you are
investigating a financial or intellectual property theft
crime, there is a way better than average chance that you
are involved with a cyber crook. Get the help you need
to fight at that level.
The core of the group engaged skilled hackers to steal
data that allowed the manufacture of fake cards. The
cards were built by the foot soldiers in countries around
the world. At a pre-determined time all of the foot soldiers – or “mules” – went to ATMs and emptied them
(the limits on the cards were significantly increased as
part of the initial hack) in a short – under 24 hours – period of time. The mules then transferred the stolen funds
to the leaders’ bank accounts and were summarily paid
their cuts. What do you suppose would have happened if
a mule decided to shortchange the bosses? These crime
groups are not nice people and, contrary to common
opinion, it is not the hackers but the hard core crooks
who run the enterprise.
More about what that means in a future column, but for
now, just doing a routine computer forensic analysis is no
longer going to be enough. In most crimes today there is
little distinction between the physical and the digital
crime scenes. I consider them as one and that is what
you need to do. Think about the extent of your crime
scene and just the way you would tap a blood or fingerprint expert or a DNA specialist, get the right kind of cyber investigator to help you through the tall weeds.
Today, almost every crime – no matter what it is – has a
digital component to it. And that digital component, investigated properly, can help you close your case faster
than without it.
Now a not-so-obvious example. Crimeware, as wellwritten as most of it is, is not perfect any more than Microsoft products are perfect. What happens if the computer of an employee at a hospital, a railroad or an airline
becomes infected and the bug misbehaves? Depending
upon the extent of the misbehavior, the network could
come down costing real human life. That’s murder in
my view. Misbehavior is not as uncommon as one might
think, either.
Until next issue……
Dr. Peter Stephenson, VSM, CISSP, CISM, FICAF, holds
a PhD in digital investigation and a Master’s Degree in
diplomacy with a concentration in terrorism. He is the
director of the Norwich University Center for Advanced
Computing and Digital Forensics and is an Associate
Professor of cyber investigation at that university.
There certainly is a lot more to this than I have had time
or space to cover. However, it is a very interesting topic
and one which potentially impacts us all. Up until this
year I taught computer and network forensics as well as
cyber investigation in my program at the university. This
9
V
I
D
O
C
Q
S
O
C
I
E
T
Y
Books and eBooks By and About Vidocq Members - www.Vidocq.org/books
Effective Interviewing and
Interrogation Techniques,
Third Edition, by Nathan J.
Gordon and William L. Fleisher. A practical manual providing the forensic
practitioner/investigator critical insight into human behavior, enabling one to become a
better interviewer, interrogator
and, most importantly, an expert detector of truthful and deceptive behavior. Gordon
and Fleisher have created a one-stop guide to mastering
the art of credibility assessment during an interview, with
successfully tested techniques for obtaining a confession
from guilty suspects. Forensic practitioners, law enforcement, the intelligence community, the private security sector, attorneys, and forensic and criminal justice
students will all find this volume a valuable resource.
• The only book to address FAINT, IIT, and MITT in
one source
• Enables the interviewer to obtain a confession that can
stand up in court
• Includes an online workbook with practical exercises
to assist the reader
The third edition expands chapters on torture, assessing the interview, statement analysis, MITT, and interrogation. It contains new chapters on passenger screening,
and report writing, along with new case studies. Also
covered are ways to maximize the collection of information from a prospective employee, and legal considerations. The Forensic Assessment Interview Technique
(FAINT) and the Integrated Interrogation Technique (IIT)
were developed at the Academy for Scientific Investigative Training and are used by forensic practitioners and
investigators to detect truthful or deceptive behavior.
FAINT is applicable to all forensic type interviews and
incorporates the assessment of nonverbal behavior, projective analysis of unwitting verbal cues, statement
analysis and the Morgan Interview Thematic Technique
(MITT). This volume teaches how to combine, apply and
quantify these techniques to reach a numerical conclusion to the truthfulness of the interviewee. Order here in
hardcover and Kindle.
Cold Case Homicides: Practical Investigative Techniques by
Richard H. Walton, EdD, VSM,
provides effective and accessible
information to those responsible
for investigating and resolving
previously examined, but still
unsolved, cold case homicides.
The book merges theory
with practice through use of case
histories, photographs, illustrations, and checklists that convey
essential, fundamental concepts, while providing a
strong, practical basis for the investigative process. It
combines proven techniques from forensics, psychology,
and criminal investigation, and focuses on technologies
that may not have been available at the time of the crime.
This guide defines the characteristics of a cold case
homicide; details various investigative methods used by
law enforcement agencies; explores the actual
experiences of detectives in reopening case files; and
presents current technologies such as ViCAP, HITS, and
TracKRS used in the identification of cases related to the
reopened case, or its perpetrator. It also highlights
technological changes that contribute to law
enforcement's abilities to solve cold case homicides, such
as computerized print technology, the specificity of
DNA, and the expanding data banks that enable the
linkage of previously unknown suspects to the crimes
they committed. Available for order in hardcover and
Kindle.
Submit Books By and About Members
for Listing in the Vidocq Journal
Include:
➡Graphic of Cover
➡Synopsis
➡Author Bio and Member Status
Email Dr. Bookspan, Science Editor
10
Continued on Next Page
V
I
D
O
C
Q
S
O
C
I
E
T
Y
Vidocq Society in Print: Books By and About Members
Continued from Previous Page
Deadly Betrayal: The CBS
Murders is based on an actual
major, high-profile investigation, told from the inside by
FBI man Don Richards, VSM.
“An undercover agent is
killed in a Chinese Tong gangwar and FBI Supervisor Dan
Robertson can't prove the operation was authorized. He is
set up as the scapegoat, and
told to involve himself in a safe
white collar fraud case until
things get sorted out. But that case is far more sinister,
and soon Robertson finds himself partnered with NYPD
Detective Richie LeBeau in a complex multiple murder
investigation which might connect to the Tong. Overcoming personal clashes, inherent distrust, agency rivalry, and leaks to the media, they use every crimesolving and forensic technique to identify the killer, and
build their case. When sharp legal maneuvering threatens
to dismantle their work and free the killer, they must find
a way to resurrect the case and bring justice to a terrible
crime.” Click to order Deadly Betrayal.
The Murder Room. Michael Capuzzo introduces
the founders of the Vidocq
Society, talented courageous sculptor Frank
Bender, Commissioner
William Fleisher, and
criminal profiler Richard
Walter. Learn what inspired
them to help solve cold
case murders. Click to order in Print, Kindle Edition
and Audio Versions.
The Girl With The
Crooked Nose by Ted Botha.
Tells of Frank Bender’s work
as a forensic artist and founding member of the Vidocq
Society, to bring attention
and resolution to hundreds of
neglected murders of women
near Ciudad Juarez, Mexico.
From this work, Frank and
his daughter Vanessa have
donated time and talents to
assist the Ni Una Mas project (Not One More). Click to
order The Girl With The Crooked Nose.
In Someone’s Daughter, historian Silvia Pettem tells of
a young woman, known only as "Jane Doe," found murdered in 1954 in Colorado. Pettem spurred the Vidocq Society
and Boulder County Sheriff’s
Detective Steve Ainsworth to
find the woman's name and
killer. Several Vidocq members
selflessly volunteered resources and time: Dr. Richard
Froede and Frank Bender did
skull and facial reconstructions. Dr. Walter Birkby, Dr.
Robert Goldberg, and Dr. Terry
Melton worked on DNA. Fred
Bornhofen coordinated. Many others contributed. In October 2009, DNA comparison with a surviving sister confirmed Jane Doe's identity as Dorothy Gay Howard, an
18-year-old missing from Phoenix, Arizona. Click to order Someone’s Daughter.
In Trail of Blood, The Vidocq
Society helps solve the murder of 24
year old Scott Dunn. Scott's parents
never gave up when his killers left
no body, no weapon, only blood, so
much blood. “When Jim Dunn got
the heart stopping call every parent
dreads: "Your son has disappeared"
on a Sunday night, it set into motion
a six year nightmarish odyssey of
desperate searches. Dunn turned to
Richard Walter of the Vidocq Society, forensic
pathologist and criminal profiler, who consulted Scotland
Yard, studied DNA evidence and blood spatter patterns,
and then pointed out who he deduced killed Scott Dunn,
and why.” Click to order Trail of Blood.
11
Continued on Next Page
V
I
D
O
C
Q
S
O
C
I
E
T
Y
Vidocq Society in Print: Books By and About Members
Continued from Previous Page
Investigating Religious Terrorism and Ritualistic Crimes by
Dawn Perlmutter, VSM, director
of Symbol & Ritual Intelligence,
is the first complete resource to
assist in crime scene identification, criminal investigation, and
prosecution of religious terrorism
and occult crime. It analyzes occult and religious terrorist practices from each group’s theological perspective to help you understand traditional and contemporary occult groups and
domestic and international terrorist religions, demarcate
legal religious practice from criminal activity, and acquire techniques specific to occult and terrorist religion
crime scene investigation. Click here to order in hardcover and Kindle.
I Have Lived in the Monster:
Inside the Minds of the World’s
Most Notorious Serial Killers
by Robert K. Ressler and Tom
Shachtman. Agent Ressler, who
coined the term “serial killer” in
the 1970s, recounts his years
since leaving the FBI, working as
an independent criminal profiler
on some of the most famous serial murder cases of our day. Piecing clues from crime scenes,
along with killing patterns and
methods, Ressler explains his role assisting investigations
of such perplexing international cases as England’s Wimbledon Common killing, the ABC Murders in South Africa, and the deadly gassing of Japan’s subway. We’re
also witness to Ressler’s fascinating, in-depth interviews
with John Wayne Gacy, plus a shockingly candid discussion with “cannibal killer” Jeffrey Dahmer. Click here to
order.
Sexual Homicide: Patterns and Motives by John E.
Douglas, Ann W. Burgess, &
Robert K. Ressler. This authoritative book represents the data,
findings, and implications of a
long-term F.B.I.-sponsored study
of serial sex killers. Specially
trained F.B.I. agents examined
thirty-six convicted, incarcerated
sexual murderers to build a valuable new bank of information
which reveals the world of the
serial sexual killer. Data was obtained from official psychiatric and
criminal records, court transcripts, and prison reports,
and from extensive interviews with the offenders. Detailed information is included on the FBI’s Violent
Criminal Apprehension Program (VICAP) along with a
sample VICAP Crime Analysis Report Form. Attention
is given to child/adolescent formative events, societal
perceptions & pressures which may be motivational to
sexual killers who exhibit aberrant thought patterns, deviant behavior, and aggression linked to sexual expressivity. 234 pages. Click to order in Kindle, paperback
and hardcover.
Diving and Hyperbaric Medicine Review for Physicians by US Navy diving and hyperbaric research physiologist Jolie Bookspan, MEd, PhD, FAWM, NAUI
SCUBA instructor Hall of Honor inductee. Extensive information in quick clear bulleted format for personnel
involved in hyperbaric chamber operations, scuba medical
support, wound healing, and
autopsy. Include all 13 approved indications for clinical
hyperbaric oxygen treatment
complete with protocols,
equipment, codes, fire safety,
and regulations. Sample test
questions and answers to prepare for the Board exams in Primary or Secondary Board
Certification. A complete reference of the entire field for
anyone interested in hyperbarics and chamber medicine.
From the Undersea and Hyperbaric Society publisher
through author website: www.DrBookspan.com/books.
12
Continued on Next Page
V
I
D
O
C
Q
S
O
C
I
E
T
Y
Vidocq Society in Print: Books By and About Members
Continued from Previous Page
not just an arrest, but a conviction. Appendices include
sample standard operating procedures from three different
agencies to use as a guide for setting up a cold case unit
and a list of additional resources a department may look
to for assistance. 264 pages. Click to order in hardcover,
Kindle, and rental.
The Unknown Darkness: Profiling the Predators Among Us
by Gregg McCrary. McCrary’s
25 years in the Bureau have
yielded over 1000 cases to draw
upon. The 10 he describes in the
book reveal the strengths and
pitfalls of modern criminal investigation, including the siege
of the Branch Davidian compound in Waco, the Buddhist
Temple Massacre in Phoenix,
Arizona, the search for the Scarborough Rapist (who eventually became a serial murderer), the prosecution of Jack Unterweger (an international serial killer who committed murders in Czechoslovakia, Austria and Los Angeles), the Sam Sheppard murder case and others. McCrary answers what happens at
the crime scene, what kind of person does it take to grapple with the serial killers among us, and exactly how do
we disarm the enemy. 400 pages. Click here to order in
hardcover or paperback.
Cold Case Research: Resources for Unidentified,
Missing, and Cold Homicide Cases by Silvia Pettem
presents profiles and actual case
histories to illustrate how investigators can successfully apply resources that will enable them to
reopen and solve cases gathering
dust in the file room. Today’s investigators have found that, to
solve cold cases, they need to be
internet savvy and make the best
use of the rapidly changing methodologies of the twenty-first century, but they also have to be time
travelers and open the door to the
past. This volume weaves together the nearly forgotten
skill sets of traditional historical researchers with the latest online tools, including TLO, a premier investigative
system; and NamUs, the revolutionary dual databases for
missing persons and unidentified remains. Along with
practical applications, Cold Case Research gives investigators the tools they need to save time and money and to
jump-start their cold cases, while keeping others from going cold in the future. Topics discussed include:
·
Implementing cold case units
·
People searches and working with databases
·
Overlooked DNA in PKU cards
· The plight of the missing and unknown
· Applying historical and geographical context
·
Online and off-line newspaper research
·
Public and published records
· The use of volunteers
·
Contact with co-victims
·
Cold-case review teams and information-sharing resources
· Taking advantage of the media
Click here to order in hardcover and Kindle.
Cold Cases: An Evaluation Model with Follow-up
Strategies for Investigators (Advances in Police Theory and Practice) by James M.
Adcock and Sarah L. Stein, begins with a historical perspective
on how cases get to the point
where it appears all investigative
leads have been exhausted, and
includes a chapter on understanding the process of homicide
and those who kill. Next, the
authors explain the evaluation
model, theories of the crime,
evidentiary issues and concerns,
informational and behavioral aspects relative to the crime and the participants in the
crime, and documents investigative strategies for future
efforts on the case. The third section discusses the investigation, questions investigators must ask, choice of
interview/interrogation techniques based on the behavioral aspects involved, and how the growth in technology
since the date of the incident might provide new opportunities to uncover clues. Finally, the authors suggest
how investigators can maximize their efforts and obtain
13
Continued on Next Page
V
I
D
O
C
Q
S
O
C
I
E
T
Y
Vidocq Society in Print: Books By and About Members
Continued from Previous Page
Healthy Martial Arts by Jolie Bookspan, Med, PhD,
FAWM is for all in law enforcement, military, athletes,
and those who need to be in top shape and prevent injuries for work and life. Covers training techniques for all
athletes, strength, abdominal
training that transfers to
Spec Ops (train like you
fight), nutrition, flexibility,
performance enhancement
drugs and foods, soreness,
injuries, breathing, spirit,
speed, balance, joint stability, back, neck, and knee
pain prevention, handling
stress, making training and
daily life healthy, brain
power & mental exercise,
wheelchair athletes, more.
Dr. Bookspan is a sports medicine specialist, military
scientist, 4th degree Black Belt, 2009 Master Instructor
of the Year, and former full contact fighter inducted into
the International Black Belt Hall of Fame. Healthy Martial Arts won Reader’s Choice Award of the International
EUSA Martial Arts Association. Approximately 200 photos. 228 pages. Click here to order from Amazon, or here
(www.drbookspan.com/books) for print and eBook.
Stretching Smarter Stretching Healthier by military
researcher Jolie Bookspan, MEd, PhD, FAWM. Not the
same old stretches. Immediately
helpful innovative techniques to
retrain daily movement habits to
make flexibility, mobility, and
injury prevention built-in to daily
life. Stop injuries and poor posture from bad stretching. Learn
how to understand for yourself
what constitutes healthful muscle
length and stretching. Nearly 200
illustrations guide you step-bystep. Click here for ordering
from Amazon or here (www.drbookspan.com/books) for
print and eBooks.
Investigating
ComputerRelated Crime, Second Edition (2004) by Peter Stephenson with NEW Third edition
coming soon. Written by an
information security specialist,
this second edition of Investigating
Computer-Related
Crime discusses cybercrime, its
investigation, and the difficulties encountered by both public
law enforcement officials and
private corporate investigators.
The book offers insights into collecting evidence, interrogating suspects and witnesses, handling crime in progress, as well as issues involving the authorities, and
helpful case studies. Updated chapters incorporate new
kinds of attacks, current work of the Digital Forensic Research Workshop and their investigative model, new operating systems, the impact of the Patriot Act, and new
ways of analyzing computer media. 448 pages.
Order here in hardcover edition and here for Kindle electronic version.
Diving Physiology in Plain English by Dr. Jolie Bookspan, former research physiologist for the U.S. Navy, inducted into the NAUI SCUBA
instructor Hall of Honor. For
divers, novice through instructor, search and rescue
teams, training departments.
Clear information to understand (not memorize) physiology and medicine, and apply all to safer decompression, injuries, heat and cold
exposure, equipment, gas
mixing, fitness to dive, rescue, and other protocols.
Published by the Undersea
and Hyperbaric Medical Society (UHMS). Click to order
from: www.DrBookspan.com/books.
Click links provided for each book,
or see all on the Vidocq Society
web site BOOKs page: www.Vidocq.org/books
14
V
I
D
O
C
Q
S
O
C
I
E
T
Y
Vidocq Society in Print: Books By and About Members
Continued from Previous Page
The Ab Revolution by award winning research scientist
Jolie Bookspan, MEd, PhD,
FAWM, teaches a groundbreaking sports medicine method now
used by athletes, military, law
enforcement personnel, and top
spine docs and rehab centers
around the world. It trains spine
and pelvic angle to neutral,
quickly stopping a major source
of lower back pain, and functionally strengthening abdominal
and core during actual operations. Part I teaches neutral spine
for back pain control in everyday life (no exercises needed).
Part II covers functional strengthening from simple to the
toughest you can get. No flexion that stresses discs or
reinforces bent-forward posture. New Third Edition Expanded - 114 photos and drawings in 124 pages, gym-bag
6x9” size. Click here for Amazon or here
(www.drbookspan.com/books) for print and eBook from
the Author’s website.
Death Investigations (Jones & Bartlett Learning Guides
to Law Enforcement Investigation) by James M Adcock, PhD,
and Steve Chancellor.
Each
crime type requires a unique approach with distinct steps. This
book presents the specific functions and processes necessary to
accurately assess and document
cases (Homicides, Suicide, Accident, Natural, and Undetermined). Click here to purchase.
Health & Fitness - How to Be Healthy Happy and Fit
for The Rest of Your Life, 3rd ed, by Dr. Jolie Bookspan.
Very helpful if you have a desk
job. 31 chapters of what works &
what doesn’t for healthier body,
spirit, and brain. Includes heart,
cholesterol, diabetes, digestion,
osteoporosis, body fat tests,
weight loss, supplements and performance enhancing products,
mental and emotional health. Full
chapters on fixing discs, neck
pain, upper and lower back pain,
leg cramps, and headaches. Sections on knee and shoulder pain,
ankle sprains. Funny Facts about the body, and an A to Z
glossary. 379 pages all-in-one-source. Click here to order
from Amazon or www.drbookspan.com/books from
Author’s website.
Fix Your Own Pain Without Drugs or Surgery by
Jolie Bookspan, MEd, PhD,
FAWM. Prevent pain common
to enforcement work: Upper and
lower back pain, neck, shoulder,
rotator cuff, hip, knee pain, and
foot pain. Ankle sprains, Achilles tendonitis, fasciitis, pronation, supination, and flat feet.
Herniated/ bulging/ slipping/
degenerated discs, sciatica,
swayback, lordosis, spondylolisthesis, SI joint, pinched nerve
and impingement. Plus stories
from real patients in each chapter illustrate what works, what doesn’t, and when. Drawings and photos illustrate concepts. Each page, of 330
total, has specific things to do, things to avoid, things to
check for, and/or a story of people who did and didn’t fix
pain and why. Click here to order from Amazon or here
(www.drbookspan.com/books) from Author’s website.
Submit Books By and About Members
for Listing in the Vidocq Journal
Include:
➡Graphic of Cover
➡Synopsis
➡Author Bio and Member Status
Email Dr. Bookspan, Science Editor
15
V
I
D
O
C
Q
S
O
C
I
E
T
Y
Submission Guidelines for ARTICLES to be Considered for the Vidocq Journal
The Vidocq Journal invites well-prepared beneficial articles to be considered for publication, as follows:
References. Include if helpful. Don't ask us to look it up
for you. If you have links for more on your story, add
them at the end. Don't send us Google links or search engine words and tell us to look up the topic to write your
story or get facts you are not sure of.
Topics and Approximate Length:
Interest items, accomplishments, appearances: one
to three paragraphs. Include where, what you did,
why, complete names and titles, the good it produced, and available links to more.
Papers you delivered: Can be a simple paragraph
to a page including photos, that report of the conference, you and co-presenters' roles, information
presented, and the good you achieved. Include
photos if possible and links to the conference site
or your paper if published.
Notices, news, and requests: a paragraph or two.
Teaching articles: one to three pages.
Photos. Indicate if your photo goes with an article or
stands alone with caption only. Web resolution (under
100K, more or less). If you don't know how to reduce,
we will do that for you. Clear caption for each photo.
Send individual photos, not proof sheets. If you don't
know how to separate, send the composite with a note
letting us know which one(s) go in your article and
where. Photos must have relation to the article and help
the reader.
Have a clear, complete topic before contacting us. If
you don't have a topic, we can help you develop one.
Format. Editable word processing files - WORD, text,
dox, docs, e-mail. No PDFs, newspaper clippings, handwritten or typed hard copy that you want us to retype.
Send by e-mail.
Format:
Shorter is (often) better. Edit to be to the point.
Each paragraph is the next point. Outline it for
yourself first to see what are your points
Remember that writing is sequential; Sentence 2
logically follows Sentence 1.
Use short sentences.
Cut adjectives.
Keep like thoughts together.
No exclamation points; they remove authority.
Journal copies. If you don't already receive Journals,
contact HQ, not the editors, to add your e-mail to the distribution list. You will get your Journal copy when everyone else does.
Questions from the Editors: If we ask you questions,
answer in time for us to get you in the issue.
Include a title. Title reflects or explains the article.
Deadlines:
1st quarter Journal - March. Deadline: All the above
completed before 1 March.
2nd quarter Journal - June. Deadline: All the above before May 10th
3rd quarter Journal - Sept. Deadline: Before Aug 10th
4th quarter Journal - Dec. Deadline: Before Nov 10th
Are you qualified to write it? Include your first and last
name, suffixes, credentials for writing your topic, pertinent work affiliation showing suitability to the topic.
Document sources. Don't write beliefs, conclusions, or
what people said without documentation or reference to
where you got the information or quotation.
Mail Submissions for Consideration to:
[email protected]
Subject line: Article For Consideration for Vidocq Journal
Define terms. Some terms are exclusive to your field or
may have different meaning or no meaning in other
fields. Allow someone out of your specialty to understand your article without prior knowledge of your topic.
16
V
I
D
O
C
Q
S
O
C
I
E
T
Y
Submission Guidelines for ADVERTISEMENTS for the Vidocq Journal
We offer limited opportunities to advertise events and services of benefit in the Vidocq Journal.
Here is How:
Large
Sunny
2
Bedroom
FIRST e-mail Dr. Zeff Lazinger Vidocq treasurer, who
sets advertisement pricing for the Vidocq Journal. E-mail
[email protected] with the following:
Apartment
for
Immediate
Rent
-
- Size of the ad you are looking for: quarter page, half
page, or full page.
- How many entries: one time placement, 2 issues of the
4 per year, or all issues for the year.
• Two
sunny
bedrooms,
kitchen,
large
living
room,
lots
of
closets
• Wall
to
wall
carpet,
washer
and
dryer,
garbage
disposal,
refrigerator,
tiled
bathroom
• Basement
storage
included
• Quiet
neighborhood,
on-street
parking,
accessible
to
public
transportation
• Covered
garages
for
car
or
extra
storage
also
available
• Close
to
Fox
Chase
Cancer
Center,
Northeast
High
School
and
Roosevelt
Mall.
2nd
Floor.
• Burlholm
Northeast
Philadelphia
• Walking
to
SEPTA
Bus
&
Regional
Rail
• Convenient
to
Center
City
Philadelphia
Northeast
Philadelphia
When you have your agreed-upon price, send your
CAMERA-READY advertisement to Dr. Bookspan at
[email protected] with a copy of Dr. Lazinger's
pricing e-mail showing you already have a price.
Your CAMERA-READY advertisement is a PDF with all
graphics and text in place the way you want them.
Advertisements may be refused based on suitability.
You will receive a mail indicating acceptance.
Send your check to:
The Vidocq Society
1704 Locust Street, Second Floor
Philadelphia, PA 19103
Mark your payment envelope - Att Dr Zeff Lazinger,
Treasurer.
Deadlines are the same as for articles:
1st quarter Journal - March. Deadline: Before 1 March.
2nd quarter Journal - June. Deadline: Before May 10th
3rd quarter Journal - Sept. Deadline: Before Aug 10th
4th quarter Journal - Dec. Deadline: Before Nov 10th
Photos,
map,
more
information
-
http://paulplevakas.com/store
Contact
Paul
Plevakas
[email protected]
Thank you,
The Editors
17
V
I
D
O
C
Q
S
O
C
I
E
T
Y
!
!
FORENSIC LINGUISTICS AND THREAT ASSESSMENT
FOR INVESTIGATIVE PRACTITIONERS
April 29 ! May 3, 2013
Manassas, Virginia
Modeled on the FBI Forensic Linguistic Workshop for Law Enforcement Practitioners created
and taught by James Fitzgerald, AGI offers this unique 5-day program which introduces the
cutting edge science of forensic linguistics and threat assessment to both public and private
sector professionals. This multi-media program is presented through instruction and lectures
incorporating interactive and practical exercises involving actual cases.
This program has operational application for the investigator through examining and assessing
communications and identifying characteristics, to include:
Level of dangerousness represented in the communication
Personal characteristics of anonymous authors, such as age, gender, region, native or
non-native speaker status, potential motive, indications of possible mental illness, etc.
Threats of a specific type such as blackmail, extortion, harassment, defamation, physical
harm, stalking, terrorism, product tampering, threat to brand, etc.
All the materials covered and relevant articles and guides for the investigative practitioner are
included for retention by participants.
Instructors:
James R. Fitzgerald, M.S. (FBI SSA, Retired)
Violent Crime Consultant/Forensic Linguist
Academy Group, Inc.
Natalie Schilling, Ph.D.
Associate Professor/Forensic Linguist
Georgetown University
The cost of this unique 5-day program is $2,000.00 and is offered by application only. Please
contact Mr. Martin Rehberg at 703-330-0697 or [email protected] for an application.
Act now ! seating is limited!
The Academy Group, Inc., "#$%&'()*+,%)-(.$,"%/(01-"$)2-owned forensic behavioral science firm, is
comprised of former FBI and Secret Service Supervisory Special Agents who played a major role in the
creation of the FBI's National Center for the Analysis of Violent Crime and later the Behavioral Analysis
Unit, which manage and facilitate the FBI's investigative and behavioral response to all facets of crime
and threats.
www.Academy-Group.com
18
V
I
D
O
C
Q
S
O
C
I
E
T
Y
2013 Meetings at Union League
Meeting Reservations
2013 Meeting Dates Remaining
Only Vidocq Society Members (VSMs) who pre-register,
and their guests who are pre-registered and accompanied
by members may attend Vidocq Society meetings.
You must reserve your place with Ms. Alvarado at Vidocq, 215-545-1450, by close of business, the Monday
before each meeting.
Meetings are customarily the third Thursday of each
month at the historic Union League at 140 S. Broad
Street, Philadelphia, PA, http://www.unionleague.org/.
The Union League’s dress code: Business attire required
for both men and women—jackets, no jeans.
Cost for the luncheon meeting has increased to $40.00
per member and $45.00 for non-member guests. Both
members and guests with reserved places will be asked to
pay if they do not honor the reservation made for them.
Parking is available at reduced rate, courtesy of Ryan
Shapiro, VSM. The garage is on Sansom Street opposite
the Union League entrance, between Broad and 15th
Street. Ask for parking validation at the meeting.
19
Reserve
By Close of Business
For
Meeting Date
18 March
21 March
15 April
18 April
13 May
16 May
17 June
20 June
--
No July / Aug Meeting
14 August
Awards Banquet 14 Sept
16 September
19 September
14 October
17 October
18 November
21 November
--
No Dec Meeting
V
I
D
O
C
Q
S
C
I
E
T
Y
Get In Shape - Self Defense
The Vidocq Society
Shotokan Karate
Novice to Black Belt
The Vidocq Society is a Nonprofit, 501c(3) corporation, which, by the terms of its charter, is a fraternal
organization comprising
professionals and nonprofessionals who
meet in a social
setting to discuss
unsolved crimes.
Our work is pro
not consider
sented to us. Our
to act as a catalyst
ance to law ento assist them in solving
O
Small class, Personal attention.
Fitness, injury prevention, katas,
confidence, self defense.
bono and we do
every case presole purpose is
and provide guidforcement agencies
these crimes.
Mondays: 8:00 p.m. - 9:30 p.m.
Thursdays: 7:30 p.m. - 9:00 p.m.
2nd Floor
2100 Chestnut Street
Philadelphia, PA 19103
Entrance on 21st Street
Opinions offered by our members are personal opinions offered in the spirit of cooperation and goodwill,
based only upon the facts presented, and should not
be considered formal or legally binding opinions of
the Vidocq Society.
Taught by:
Paul Plevakas, Karate Sensei
3rd Degree Black Belt
Black Belt Hall of Fame
Telephone: (215) 778-2634
Email: [email protected]
Website: www.PaulPlevakas.com
Solve The Mystery
K
a
r
a
t
e
Vidocq Society Journal
A new mystery each issue
Q. Name a famous fictive character using neither
deductive nor inductive reasoning.
Super-sleuths, send your verdicts to
Dr. Bookspan, science editor
The Vidocq Journal © Copyright 2013
Published by The Vidocq Society,
a 501 (c) (3) nonprofit organization
Second Floor 1704 Locust Street Philadelphia, PA 19103
Voice: 215-545-1450 — Fax: 215-545-1773 — www.vidocq.org
Solution to Last Solve the Mystery:
Q. Who or what may leave fingerprints virtually
indistinguishable from those of a human?
A. Chief Steven Labov, MEMS, CISM, MSO, CERT-3,
TAPI (Guest of Ryan Shapiro, VSM) writes,
“Koalas. However this would be a rare event as
they have two thumbs on each hand and they also
have claws instead of fingernails. Also humans
have ridges all over their palms and koalas only
part of their palms. It would further be an
infinitesimally remote event to find a koala at a
crime scene even though possible.”
Subscription $100 per year
Commissioner
William L. Fleisher - [email protected]
Deputy Commissioners
Benjamin J. Redmond - [email protected]
Fred A. Bornhofen - [email protected].
Communications
Ed Tenuto - [email protected]
Journal
Paul D. Plevakas and Dr. Jolie Bookspan Plevakas, Editors
Submissions to: Vidocq Editors, as per pages 16-17.
Phil Bauso had points deducted for answering Koalas but
complaining it was too easy to look up on the Internet.
20

Similar documents

Vidocq Journal 2012 Quarter 2

Vidocq Journal 2012 Quarter 2 The Vidocq Society helped solve the 1991 murder of 24 year old Scott Dunn when no weapon and no body could be found. The book, Trail of Blood, by Wanda Evans and Scott’s father James Dunn came out ...

More information

Vidocq Journal 2012 Quarter 1

Vidocq Journal 2012 Quarter 1 http://www.lifeslittlemysteries.com/1149-mafia-victims-diss olve-sulfuric-acid.html Science News http://www.sciencenews.org/view/generic/id/70234/title/Maf ia_informants_fail_acid_test Facebook pag...

More information

Vidocq Journal 2011 Quarter 2

Vidocq Journal 2011 Quarter 2 Vidocq Society. We all have heard communicators referred to as “PR people.” Many titles are used synonymously to describe the communications practitioner such as: media relations person; press offi...

More information

Vidocq Journal 2014 Quarter 3-4

Vidocq Journal 2014 Quarter 3-4 The Vidocq Society Medal of Honor went to Philadelphia Homicide Lieutenant Phil Riehl and his crack team of detectives Howard Peterman and Gregory Santamala, who solved the recent murder of Connie ...

More information

Vidocq Journal 2014 Quarter 1-2

Vidocq Journal 2014 Quarter 1-2 Donna Fontana, VSM received the 2014 Ajit R. Tungare Meritorious Service Award on Tuesday June 17 at the NJSP in Hamilton, N.J. It is awarded to one forensic scientist each year who has been nomina...

More information

Vidocq Journal 2011 Quarter 3-4

Vidocq Journal 2011 Quarter 3-4 A training team of Vidocq Society Members (VSMs) contributed their expertise to the Cold Case Conference hosted in conjunction with the Vidocq Society and the Unified Police Department of Greater S...

More information

Vidocq Journal 2015 Quarter 3-4

Vidocq Journal 2015 Quarter 3-4 they picked up spoken words from an empty potato chip bag recorded through sound proof glass. The technology could be used for law enforcement, space research to recover sounds across space, where ...

More information