Vidocq Journal 2014 Quarter 1-2

Transcription

Vidocq Journal 2014 Quarter 1-2
V
I
D
O
C
Q
S
Vidocq
O
C
I
E
T
Y
Journal
The Vidocq Society – Solving Unsolved Murders and Cold Cases
Quarterly Journal
Volume Twenty Five Numbers 1 & 2 2014
Digital Forensics
Peter Stephenson,
PhD
William Kelly
Will Be
Missed
Bookspan's Bullets
Fast Forensics
With Dr. Bookspan
Vidocq
Members
In the News
Ideas on
NonVerbal
Behavior
Solve
The
Mystery
Pages 1, 11 - 14
Page 2
Pages 3, 4
Pages 5, 6, 7
Pages 8, 9, 10
Page 23
The Internet is an Ugly Place For Vidocq to Work
By Peter Stephenson, PhD, CCFP, CISSP, CISM, FICAF, LPI, VSM
This column is about the Wild, Wild West – only today the Wild West is everywhere, not just in the West.
I’ll begin with a bit of a cautionary tale and then we’ll get down to nuts and bolts. Over the past couple of months I
have been standing up what will become one of the most extensive cyber threat assessment centers in the US outside
of government. I really thought that I had a pretty good idea of what goes on in cyberspace but even I was surprised as
I started to dig into actual real-time attacks going on around the world. Let’s begin with the overall network attacks. I
use a tool that lets me see attacks in cyber space as they happen. It’s pretty cool and I thought that you might find it
interesting to see a bit about what is going on all around us as we browse the “Net” on our PCs.
Just to give you an idea, I have captured about 3 minutes worth of “activity” – Cyber Attacks Against US Targets, see
Figure 1 on page 11. Figure 1 tells a serious story. Most of these attacks result in some compromise that affects some
web site that we are likely to visit. If we, for professional purposes, visit risky sites – pornography, child pornography,
hacking, sado-masochism, etc. we have a pretty good chance of running afoul of one of these compromised sites. If
we download software from the Internet we are subject to watering hole attacks: downloading malicious software dis-
1
Continued on Page 11
V
I
D
O
C
Q
S
O
C
I
E
T
Y
William Kelly, VSM.
By William L. Fleisher, VSM, Vidocq Society Commissioner
Dear Friends, I am sad to report the passing of our friend and colleague, Bill Kelly,
VSM. A finer gentleman never lived. Bill was our Chaplain Emeritus, and a driving
force in the “Boy in the Box” investigation for more than fifty years. I was honored and
proud to be his friend. My sincere condolences to Ruth Ann and Bill’s family. Bill’s
name will be sadly entered onto the rolls of the Vidocq Society’s Honored Dead. Interment was private, but I know his many friends were there in spirit.
A link to his obituary is below, which includes a link to sign the guestbook for Bill.
http://www.legacy.com/obituaries/philly/obituary.aspx?n=william-h-kelly&pid=1702473
94&fhid=28386#sthash.0vj1i7lf.dpuf
Guestbook:
http://www.legacy.com/guestbooks/philly/william-h-kelly-condolences/170247394?cid=
full
By Judge Lynne Abraham, VSM
Bill was a most delightful, sweet, and dear friend. Of course, those of us
who have followed the infamous “Boy in the Box” case know of his devotion
to finding who killed that boy and left him in that box off what is now a
major street, Veree Road. Every time I go to that neighborhood, I think of
that little boy. I had spoken to Hal Fillinger a hundred times about that
child, and he was always heartsick when any child was brutally abused,
mistreated, or killed-and he saw it all. Bill, was a very close friend of mine,
and I will miss him, as will all who knew him.
From The Editors
Our dear friend Bill Kelly was one of the original investigators of the “Boy in the Box” case, and continued the hard
work of the investigation for decades. He wrote the book, “Susquehanna Road: How Rem Bristow, Bill Kelly, and a
Myriad Group of Philadelphia Investigators Solved the Cold Case of the Boy in the Box.”
2
V
I
D
O
C
Q
S
O
C
I
E
T
Y
Bookspan's Bullets by Jolie Bookspan, MEd, PhD, FAWM, VSM
Forensic news and education by Dr. Bookspan, Science Officer. Bookspan's Bullets is
dedicated to Frank Bender, VSM, who inspired and requested the column beginning in 1997.
Shoot Once Hit Target Three
Times
road, making it less dense than air above it. Light from
the sky is bent upward by the hot air. Viewers see some
of this light from the sky and interpret it as puddles of
water on the road.
The new Multiple Impact Bullet splits in midair shot to
increase chances of hitting your target. The new bullets
are made by splitting one conventional bullet into three
parts, then repacking the parts into the cartridge. When
fired, the three fragments exit spinning and spreading
out, giving a higher hit probability. According to Todd
Kuchman, co-founder of Advanced Ballistics Concepts,
it increases ability to save your own life "in a panicking
situation" over a conventional round. The bullet expands
as quickly as possible giving the highest hit probability,
closest distance. Unlike buckshot or scattershot, this partitioning round has finite expansion giving it "the best hit
profile of any configuration you can do out of a pistol."
They are not designed as "through and through" bullets,
meaning they make a complete path all the way through
the target and continue to reach another target. These
rounds are designed to turn "heavy end" and make a
crescent entry to maximize internal disruption to stop a
threat as quickly as possible. According to ATF firearms
tech branch chief EarlGriffith, it is legal as long as it is
not using armor piercing technology.
- Source:
Carbon nanotubes are one-molecule-thick sheets of carbon, looped into tubes. They have the strength of steel
with the density of air and can be heated quickly. When
immersed carbon nanotubes are heated, they heat the water around it, and can bend light the same way as a temperature gradient in air, enough to completely disguise
the intended target. Nanotubes can heat so quickly that
the "invisibility cloak" can be turned on and off quickly
- Sources:
Overview:
http://io9.com/5846158/how-an-underwater-invisibility-cloa
k-makes-solid-objects-disappear
Watch the Video:
http://www.youtube.com/watch?v=3YO4TTpYg7g
Research article:
http://iopscience.iop.org/0957-4484/22/43/435704
Facebook Status Updates
Reveals Negative Personality
Traits
Watch the Video:
http://money.cnn.com/video/technology/2014/01/29/t-multip
le-impact-bullet.cnnmoney/index.html?iid=S_Taboola
Researchers at Lund University and the Sahlgrenska
Academy Centre for Ethics Law and Mental Health, investigated if Facebook status updates can reveal the same
negative personality traits as can standard psychological
personality tests. A "Facebook update" is a short notice
where the Facebook account user announces their
thoughts, whereabouts, or whatever is on their mind at
the moment.
Nanotube Device Makes Solid
Objects Invisible Underwater
Scientists at the University of Dallas have designed a
carbon nanotube device that bends light rays to make an
underwater object seem to disappear. The device produces the same effect as of a mirage on land, which occurs when light changes direction as it passes through
media with different densities. A common land mirage is
seeing shimmering "puddles" on a dry road on a hot day.
Air near the ground is warmed by heat radiating from the
Personality tests and Facebook status updates were compared and analyzed for approximately 300 Americans.
Facebook users answered a questionnaire that tests for
3
Continued on Next Page
V
I
D
O
C
Q
S
O
C
I
E
T
Y
Bookspan's Bullets
By Dr. Jolie Bookspan, VSM
Continued from Previous Page
extrovert, neurotic, psychopathic, narcissistic, and Machiavellian personality traits. Subjects also submitted
their 15 most recent status update for study with algorithms for latent semantic analysis, a method to measure
word significance.
was made. Deterioration of the print varies with surrounding temperature and other factors. Fingerprint
date can so-far be approximated from, within "one or two
days," up to 15 days. The new technique needs to be extensively tested on actual crime scenes, leading to creation of a database, before it can be used in prosecutions,
hopefully "within a year," according to researcher De
Puit.
The researchers concluded, "Given that Facebook allows
individuals to have major control in how they present
themselves and draw benefits from these interactions, we
conclude that the Dark Triad, involving socially malevolent behavior such as self-promotion, emotional coldness,
duplicity, and aggressiveness, is manifested in Facebook
status updates."
- Source:
Scientists Discover How to Date Fingerprints
http://bestcurrentaffairs.com/w/scientists-discover-date-finge
rprints/
- Sources:
Dark personality traits revealed on Facebook:
http://www.sahlgrenska.gu.se/english/news_and_events/new
s/News_Detail/dark-personality-traits-revealed-on-facebook.
cid1194899
Fingerprint Scanner Hacked
With Glue Mold
The fingerprint sensor on Samsung's Galaxy S5 phone
was hacked using a mold made of glue less than a week
after the device went on sale. Researchers at Berlin-based
Security Research Labs (SRL), who designed the "spoof,"
lifted a real fingerprint from a smartphone screen, then
used a process to make a mold of glue and graphite spray
which was successfully swiped across the sensor in the
phone's home button. Project manager Ben Schlabs
stated, "If you think into the future, once ATMs have fingerprint scanners, and once heads of state start using fingerprint authentication. it's going to become a lot more
attractive. "
The study:
Garcia, D. & Sikströmd, S. The dark side of Facebook: Semantic representations of status updates predict the Dark
Triad of personality. J Pers. 2014, Vol 67, Sept. 92–96
http://www.sciencedirect.com/science/article/pii/S01918869
13012890
Contacts:
Danilo Garcia, Doctor of Psychology, Centre for Ethics,
Law and Mental Health, Sahlgrenska Academy.
+46 733-10 51 53
[email protected]
Sverker Sikström, Professor in Cognitive Psychology, Lund
University.
+46 70-3614333
[email protected]
- Source:
Galaxy S5 fingerprint scanner hacked with glue mold
http://www.bbc.com/news/technology-27050779
Dr. Bookspan loves good science. Send
forensic jokes, quotations, websites and
stories for possible inclusion in
“Bookspan’s Bullets.”
Telling the Date from a
Fingerprint
Scientist at the Dutch Forensic Institute (NFI) are researching a way to date fingerprints. Some chemicals left
by a person in their fingerprints disappear over time. The
relative proportions of what is left tell approximate date it
Email: Bookspan’s Bullets
4
V
I
D
O
C
Q
S
O
C
I
E
T
Y
Vidocq Member News
Donna Fontana Receives 2014 Meritorious Service Award
Book Review “Good Hunting”
By Dawn Perlmutter, PhD, VSM
"Good Hunting: An American Spymaster's Story" by
former Deputy Director Operations, CIA, Jack Devine,
VSM, is an outstanding read, and Jack Devine is the "real
deal." Over his 32 years of active duty with the CIA, he
was a part of, or has, witnessed some that agency's most
famous operations and cases.
By William L. Fleisher, VSM, Vidocq Society Commissioner
Donna Fontana, VSM received the 2014 Ajit R. Tungare
Meritorious Service Award on Tuesday June 17 at the
NJSP in Hamilton, N.J. It is awarded to one forensic scientist each year who has been nominated by their peers
and selected by a committee consisting of the Laboratory
Directors and the Chief Forensic Scientist within the Office of Forensic Sciences, New Jersey State Police. The
award embodies the principles of selfless dedication, integrity, and professional excellence in their field. Donna
exemplifies all of these principles. For those Vidocq
members who are unaware of Donna's many talents and
public service:
For Devine's first posting, he was stationed in Chile during the Allende presidency and subsequent assassination,
which according to popular belief was orchestrated by the
CIA. Devine deftly puts that myth to rest. However, the
agency in my opinion was severely hamstrung because of
the misguided restrictions placed on the "Company" by
the naive Senator Frank Church and his Senate Intelligence Committee. The ramification of good intentioned
liberals in Congress had, again in my opinion, created the
lack of interagency communication, which set off the
conditions which led to the horror of “9/11.” That is my
opinion. Throughout the book, Devine shares his informed opinions about that and other related matters involving the Country's intelligence efforts.
Donna Fontana is the Forensic Anthropologist for the
New Jersey State Police. Since 1981, she has been providing assistance to New Jersey law enforcement agencies and county medical examiners in the forensic anthropological analysis of human skeletal remains. She
provides on-scene assistance in the search for and identification of buried, hidden, or scattered human remains.
She is also responsible for the controlled excavation and
recovery of human remains. She is skilled in threedimensional clay facial reconstruction and also assists in
reconstruction composite drawings of the face based upon
analysis of the skull. Donna is a tact officer with the New
Jersey State Police for National Crime Information Center (N.C.I.C.) Database for Missing (MP) and Unidentified Persons (UP) entries and modifications in New
Jersey. Donna is also a Case Manager for the National
Missing and Unidentified Persons System (NamUs).
Donna Fontana is a Fellow in the Physical Anthropology
section of the American Academy of Forensic Sciences.
She also is a member of the Disaster Mortuary Operational Response Team (DMORT) Region 2, and has
worked in the identification process of victims of the
World Trade Center on September 11, 2001 in New York
City, American Airlines Flight 587 on November 12,
2001 in Queens, New York as well as EgyptAir 990 plane
crash on October 31, 1999 off Rhode Island. Donna can
be reached at [email protected]
Probably Devine's most famous assignment was coordinating the CIA's covert action in Afghanistan during the
Soviet occupation of that country. Devine was responsible for arming the Afghan tribesmen with, among other
ordinance, the Stinger Missiles which took the Soviet
helicopter gunships out of the equation. That was the
most critical thing that led to the Soviet's eventual withdrawal from the country, the ability to knock out their
formidable helicopter gunships. This CIA operation was
later written about in "Charlie Wilson's War," which became a movie.
In the book, Devine walks us through his long and distinguished career with the CIA with a well written and easy
to read work that will became a must read for all of us
interested in this genre. More importantly, he provides
firsthand insight to the Company's internal workings, culture, and tradition. The title "Good Hunting" refers to the
CIA tag-line on all cables sent to the field. The term re-
5
Member News Continued on Next Page
V
Continued from Previous Page
I
D
O
C
Q
S
O
C
I
E
T
Y
Vidocq Member News
Book Review of “Good Hunting”
New Articles by Dawn Perlmutter, VSM
cont’d
By Dr. Dawn Perlmutter, VSM
minds field officers of their primary job is to seek out and
gain human assets. I particularly loved Devine's descriptions of "Tradecraft." Tradecraft is the bread and butter
of covert intelligence operations.
Benghazi – The Signs of Al Qaeda. A review of the jihadist hand signs and graffiti that were used during the
Benghazi attack.
http://www.frontpagemag.com/2014/dawn-perlmutter/ben
ghazi-the-signs-of-al-qaeda/
Devine tells his story with humor, passion and from a
perspective few have. He reports on some of the
heretofore-unknown aspects of catching the Soviet moles,
Aldrich Ames and Robert Hanson. Devine started out
training with, and working alongside, Ames. He was also
at onetime was Ames' Station Chief. Devine analyzes for
the reader what make someone like Ames become a traitor.
Jihadist Gang Graffiti. How Jihadists use graffiti in the
same manner and for the same reasons as criminal street
gangs.
http://www.frontpagemag.com/2014/dawn-perlmutter/jiha
dist-gang-graffiti/
The Boston Black Widow - Where is Heda Umarova —
Dzhokhar Tsarnaev’s longtime friend?
http://www.frontpagemag.com/2014/dawn-perlmutter/theboston-black-widow/
Finally, Devine offers the reader an outstanding game
plan for the future of the Intelligence game for this country. His risk assessment and game plan for the future is
brilliant and should be a beacon for this country's leaders.
In fact, this is one book that should be required reading
for every member of Congress (for those who can read)
and all the President's men. Do not walk: run out and get
Good Hunting. I myself will never look again at the Intelligence business in the same way again. Great job Mr.
Devine, and thank your for your distinguished career protecting us.
‘Jinn’ – Supernatural Thriller versus Real Life Horror. A
movie review comparing the film’s portrayal of Jinn with
symbolism and ritual practices that occur in real life belief
in Jinn, including ritual killings and violent atrocities
committed during Jinn exorcisms.
http://www.frontpagemag.com/2014/dawn-perlmutter/jinn
-supernatural-thriller-versus-real-life-horror/
Jihadist Trophies of War. Interprets the abduction of three
hundred schoolgirls for the purpose of selling them into
sexual slavery, and the beheading of enemies by al Qaeda
linked jihadists as a modern expression of the ancient and
widespread practice of human trophy taking.
http://www.frontpagemag.com/2014/dawn-perlmutter/jiha
dist-trophies-of-war/
Ryan N. Shapiro, New Director of Safety
& Security at Visitor Center
By Ryan N. Shapiro, VSM
Here is my new contact information. If you have the
chance to be a tourist in Philly, please come see me at the
Independence Visitor Center:
Ryan N. Shapiro
Director of Safety & Security
One North Independence Mall West
6th & Market Streets Philadelphia, PA 19106
P 215-925-6101 ext. 6116
F 215-925-6106
Cell 267-320-5084
Bowe Bergdahl Dances With Wolves. The nature of Bergdahl’s disillusionment, Taliban sexual practices, and
Pashtunwali and American concepts of honor.
http://www.frontpagemag.com/2014/dawn-perlmutter/bow
e-bergdahl-dances-with-wolves/
Contact: Dawn Perlmutter, Ph.D. 215-493-5778
[email protected]
6
Member News Continued on Next Page
V
I
Continued from Previous Page
D
O
C
Q
S
O
C
I
E
T
Y
Vidocq Member News
Jack Devine Speaks on "Civility in the
Spy Business"
Ben Redmond Leaves AIG
By Ben Redmond, VSM, Deputy Commissioner Vidocq Society
By Bruce Hulme, ISPLA Director of Government Affairs
Ben Redmond,VSM, has recently resigned his position as
Chairman of the training committee of the National Association of Inspectors General, AIG. The AIG is an organization of approximately 600 members to include investigators, audit and support personnel from the Federal,
State and local levels of government. These offices are
located throughout the United States and overseas and
are charged with investigations of corruption and fraud
within these governmental entities.
Intellenet member Jack
Devine, retired CIA
Acting Director and Associate Director, as part
of the Speakers Series
"Civility in America"
gave the talk, "Civility
in the Spy Business" at
the Ferguson Library in
Stamford, CT on June
24.
The AIG also conducts intensive five day training
courses for investigative personnel throughout the United
States at least twice annually. Completion of this institute
results in AIG certification for successful attendees. Nate
Gordon, VSM, continues as sole instructor for the sensitive and important six hour course in “Interviewing and
Interrogation Techniques.” Nate also continues to receive the highest evaluations of any of the instructor
cadre who present at this well recognized forum.
Jack Devine, a 32-year
veteran of the Central
Intelligence Agency, is
one of the legendary
spymasters of our time. He was in Chile when Allende
fell; he ran Charlie Wilson’s war in Afghanistan; he had
too much to do with Iran-Contra for his own taste,
though he tried to stop it; he caught Pablo Escobar in Colombia; he tried to warn George Tenet that there was a
bullet coming from Iraq "with his name on it."
Devine served America’s interests for more than thirty
years in a wide range of covert operations, ultimately
overseeing the Directorate of Operations, a CIA division
that watches over American covert operatives worldwide.
He is a founding partner and president of the The Arkin
Group, LLC in Manhattan.
Congrats to the Philadelphia PD SVU
By William L. Fleisher, VSM, Vidocq Society Commissioner
On behalf of our membership, I want to congratulate our
fellow Vidocqian, Capt. John Darby, VSM, and his great
team of detectives of the Special Victims Unit (SVU) for
quickly identifying and arresting a criminal now facing
charges that include rape, robbery, burglary, kidnapping,
and other offenses. Great job John!
The first 100 guests to the lecture received a free copy of
Devine's book, Good Hunting: An American Spymaster's
Story. For more event details, call 203-351-8231, or online: http://www.fergusonlibrary.org/
The following linked article tells how the detectives used
"good investigative work" to find and take the perpetrator
into custody:
http://www.philly.com/philly/news/Man_charged_in_Ritt
enhouse_Square_rape.html
7
V
I
D
O
C
Q
S
O
C
I
E
T
Y
UNDERSTANDING NONVERBAL BEHAVIOR: BACKGROUND
by Nathan J. Gordon, VSM
to their own instinctual devices, will take whatever they
can while protecting their own territories and families
(clan) from aggressors. All others, and all other property,
are fair game if instinct is our sole guide.
Any time two or more people meet, a complex communication takes place, whether words are exchanged or
not. Most experts in the scientific communities that do
research into verbal and nonverbal communication believe that the verbal content (words) of a communication
accounts for only about seven percent (7%) of how the
message will actually be received. The tone used in delivering the message accounts for thirty-eight percent
(38%), and the nonverbal behavior delivered with the
verbal message accounts for fifty-five percent (55%) of
the communication.
When we enter society, however unwillingly, we learn to
set aside using our instincts to behave in such a socially
unacceptable manner. Society cannot survive if this instinctual, essentially selfish, behavior exists. Participation in society requires cooperation. Our social institutions, religions, governments, laws, politics, taboos, arts,
and sports have evolved to help maintain order in society
by redirecting our natural, aggressive instincts towards
positive and socially approved objectives.
This article should give you a better understanding of the
vast importance that nonverbal behavior plays in every
communication, whether public or private, that you must
operate in. As a result of this, you must be aware of how
nonverbal behavior will affect your communication with
others and their perception of yours.
Whenever social institutions and/or controls break down,
humans tend to revert back to their primitive instincts of
aggression, territoriality and tribalism. Current history
leaves little doubt that this is the way humans behave. If
you question this, look at the trouble spots around the
world today. Whether it is Iraq, Afghanistan, Egypt, or
areas in major cities in the United States, whenever social controls and institutions break down, there is conflict
and aggression based upon territoriality and tribalism.
Nonverbal behavior is not something new. It is far from
a twenty-first century phenomena. From the beginning
of our species’ existence, nonverbal behavior was present
and played a major role in our communication with others. The Bible is full of similar examples recognizing
nonverbal and verbal nuances from the beginning of humankind. In fact, nonverbal behavior probably played an
even more important role in primitive times, since our
ability to articulate was far less.
Every mammalian group has found its place in the world
where the environment is suitable for their species to
survive and continue their existence. When this place is
found, each species then defines the boundaries of its territory, and sets up rules and guidelines to keep its “own”
within that territory, and to keep non-members out of it.
As a group we look down upon members that go outside
of the established boundaries, and we become defensive
and aggressive when outsiders attempt to come in.
It is interesting that it was not until the latter half of the
20th Century that scientists began to pay attention to the
role of nonverbal behavior in the communication process
of humans. We were so involved with our special abilities and interests in language that we hardly noticed nonverbal or kinesthetic behavior until the 1950's, and we
virtually denied the evolutionary territorial and dominance behaviors of our species until the late 1960's.
In my own life, I remember vividly the problems I incurred when I married outside of my religion. There was
enormous pressure on me from the Jewish side of my
family not to marry someone of the Catholic faith. There
was just as much pressure on my wife from her family
not to marry outside of the Catholic faith. It became very
clear that we had violated social and religious boundaries
As we attempt to understand the origin and nature of
nonverbal behavior we must first come to understand that
at the core of every human there are three basic evolutionary instincts: we are aggressive, we are territorial and
we are tribal. What this means is that humans, when left
8
Continued on Next Page
V
I
D
O
C
Q
S
O
C
I
E
T
Y
NONVERBAL BEHAVIOR - Ideas From Nate Gordon, VSM
Continued from Previous Page
Those scientists arguing in favor of “Nurture” point out
the differences between cultures around the world.
Those arguing “Nature” point out the vast amount of
similarities between people around the world. Perhaps
the truth actually lies somewhere in between. Desmond
Morris, a famous anthropologist, attempted to bridge this
argument writing, “Man’s greatest genetic gift is his vast
capacity for learning from his environment.” Thus, he
recognized that how we behave has a genetic heritage
that can be molded or altered by the environment in
which we are raised.
which threatened the comfort and safety zone of those in
both of our families that were living within them.
The system of territories is very complex, and involves
an elaborate group of sub-territories that we establish.
From our homes, to our neighborhoods, to our nations, to
our religious and social groups, we establish explicit or
implicit boundaries around the areas in which we live,
work and play. We use names, walls, fences, and various
other methods to “stake out” the boundaries of our territory. In many species, especially primates such as humans, adults pair off into even smaller subgroups, or
families. It is within these subgroups that breeding and
child rearing takes place.
In addition to the “Nature vs. Nurture argument,” there is
an ongoing debate between the fields of Psychology and
Anthropology as to the role that nonverbal behavior actually plays within society.
Numerous studies have shown the extreme negative effects that occur in development and subsequent behavior
when primates are separated from their parents at birth.
Separation from the group or shunning was, and is, a
common punishment for a group member who goes
against the rules of the “pack."
Researchers in the field of anthropology believe that the
role of nonverbal behavior is to help to maintain and
regulate relationships between humans. These researchers do not make references to movements and the process
of communication, or conscious mental processes. Instead, they maintain that there are numerous nonverbal
behaviors that occur within all primates which allow for
group cohesiveness and help establish the power structure within the group through dominant nonverbal behavior.
Over the past sixty years a great deal of research has
been done by the scientific community into nonverbal
behavior. Various fields of scientific discipline have
studied this phenomenon. These fields include: psychology, physiology, and anthropology. Since nonverbal behavior falls under the umbrella of so many disciplines, it
is not surprising to find disagreements within these scientific communities about the origin of nonverbal behavior
and the purpose it serves.
For example, in apes, the specific nonverbal behaviors
which establish the hierarchical position of each member
in the group involves eye contact and grooming. A lower
ranking ape, classified as a beta ape, will not make eye
contact with a higher ranking alpha male ape. The beta
ape will perform subservient functions, such as: perform
cleaning and grooming gestures, like picking bugs off of
the alpha ape.
One major argument in the psychological domain is
whether nonverbal behavior is due to “Nature” or “Nurture.” The “Naturists” argue that our behaviors are genetically passed on to us directly from our ancestors.
Those scientists that hold to the “Nurture” argument
maintain that the way we behave is solely dependent on
the lessons we have learned from the environment in
which we were raised.
Alpha apes used the bow to show the beta apes they were
not going to be aggressive. This nonverbally signaled to
the beta apes that it was okay for them to approach the
more dominant alpha apes to perform their subservient
grooming rituals.
9
Continued on Next Page
V
I
D
O
C
Q
S
O
C
I
E
T
Y
NONVERBAL BEHAVIOR - Ideas From Nate Gordon, VSM
Continued from Previous Page
ancestors made hundreds of thousands of years ago when
they were being carried in their mother’s arms and
wanted to suckle at her breasts.
It is interesting that this form of nonverbal subservient
grooming behaviors can also be used by humans to diffuse a hostile situation by communicating submissiveness and nonverbally giving recognition to the other person that they are more powerful. For example, if someone is yelling at you, you can use this nonverbal gesticulation as a way to neutralize the situation by simply say,
“Excuse me,” as you act as if you are picking lint or a
thread from the individual’s clothes (like the beta ape
recognizing the power of the alpha ape by picking bugs
off him), “I’m sorry, please go on.” More often than
not, this simple nonverbal gesture will cause the other
person to discontinue their verbal barrage on you, or to
continue in a much less aggressive manner and tone since
you have nonverbally given recognition to their dominant
position.
Our hand up, palm out gesture, which we use to signal
“Hello,” is actually an early nonverbal gesture indicating
to another person that we come in peace; as we show
them we hold no weapon in our dominant hand. The
hand shake commonly used in modern times was an extension of this gesture. Grasping another’s hand guaranteed that neither of you had a weapon in your hand. The
firmness of the grip also gave an indication of your
strength.
It is apparent that almost all nonverbal behaviors can be
explained by evolutionary, genetic, or environmental factors. It appears that nonverbal behavior may be the result
of a multitude of sources; however, regardless of their
origin, they are observable and their end result can be
scientifically explained as a reliable indication of psychophysiological changes occurring in us as our brain
prepares us to cope with various stressful and nonstressful situations. At the same time, many of these gestures help us to maintain homeostasis, which is harmony
between our internal and external environments.
Unlike the anthropologists who view nonverbal behavior
solely as a method of maintaining the social structure of
a group; psychologists view nonverbal behavior as a
communication which expresses both thoughts and emotions. They argue that many of the basic nonverbal behaviors we use today appear to have originated from
primitive times to communicate messages other than
those that deal solely for regulating the social order.
In the next article, I will classify nonverbal behavior into
three distinct categories and explain their importance.
For example, our side to side head nod, which almost
universally means “No,” probably originated from a
primitive person moving their head from side to side in
that manner as they signaled to another person they did
not want something being offered to them to eat. Imagine trying to give a baby medicine orally that it does not
want to consume. The baby will move its head vigorously from side to side to avoid consumption. Is this
nonverbal gesture inherent or extrinsic? There are some
researchers that argue that perhaps this specific behavior’s commonality is actually due to the very limited motion of the head itself.
Conversely, it is believed that our up and down head nod,
which in most cultures means “Yes,” probably originated
from the up and down head movements our early infant
10
V
I
D
O
C
Q
S
O
C
I
E
T
Y
Digital Forensics with Peter Stephenson, PhD
Protecting Vidocq on the Net
By Peter Stephenson, PhD, CCFP, CISSP, CISM, FICAF, LPI, VSM
Continued from First Page
the email, you are a party in a lawsuit. The “documents” really are malware-infected files and if you
click on them you are infected. What the malware does
depends upon the
phisher’s intent. In one
case I examined it was a
thing called a “downloader.” Downloaders go
out to the Internet and
download lots more
malware on to your
computer. That malware
might steal your banking
information, for example. Did anyone at my
client bite on this when it
came to several whales
in the organization?
Yep…. The corporate
attorney. Nobody is immune.
guised as something we need. If we belong to mail lists,
use social media or respond to on-line ads, we expose
ourselves to infection, phishing scams, or worse.
Figure 1 - Cyber Attacks Against US Targets over a 3
Minute Period on 4 July 2014 at 2:30PM EST
Cautionary tale out of the way, let’s dig into what can
hurt you as investigative and forensic experts and what
you can do about it.
Two weeks ago I did a training session for a financial
services organization. The topic was whaling. Whaling
is a special kind of phishing scam that targets people
high up in an organization – “whales.” These folks are
not targeted because they are big-wigs, have the keys to
the network castle or are dripping with wealth. They are
targeted because they are the least well-trained people in
the organization. They are, from the perspective of network compromise, low-hanging fruit. I thought that in
an organization such as the one I was working with I
would find no workers who would succumb to a whaling
scam. I was wrong.
First, let’s be plain: the depths of malicious computing
are not your province. They are mine. Your job probably is to be an investigator, medical examiner, lawyer
or other forensic/legal/investigative professional. Unless you spend your days as I do getting your hands
dirty in the sludge of the Internet’s back streets and gutters you probably don’t know what a nasty, ugly place
cyberspace really is. That’s not the problem. The problem – your problem – is that the Internet knows who
you are and that’s a bad thing. It is especially bad because you may need to venture into some of those dark
virtual alley-ways from time to time to do your job and,
candidly, you may not be prepared for what you find.
There is a particular phishing scam that purports to send
you documents that you will need because, according to
11
Continued on Next Page
V
I
D
O
C
Q
S
O
C
I
E
T
Y
Vidocq on the Internet - Digital Forensics with Peter Stephenson, PhD
Continued from Previous Page
connection. This is an Internet connection that does not
go onto the organization’s network. You are connected
“barefoot” to the Internet. That way if something goes
wrong, you don’t endanger the network. You can ask
that the connection not be in the DNS – domain name
system. That way you will have an IP address but you
won’t trace back to your organization. That has a few
other benefits that we won’t go into this time – it’s a
topic in itself.
That’s the real purpose of this column: I want you to
know what you really are up against and I want to help
make it safer for you to do your job when that job takes
you on-line.
First, make no mistake: the Internet is the best reference
source that ever was. Some of us simply could not do
our jobs without it. Being 70 years old, I have both feet
in research as many of you do. We recall when research
meant a trip to the appropriate library. Then we got some
primitive on-line resources. Now if it exists at all, information about something we need probably is at our
fingertips after a little creative searching. So opting out
of the ‘Net” just isn’t in the cards for most of us. Fortunately, there are a few tricks that we can use. I am going
to spend the rest of this column talking about them and
giving you some really neat ways – sometimes a little
geeky – to get the job done without taking unnecessary
risks.
The minute you do this, of course, you take risks. You
no longer are protected by the organization’s firewall so
you need one of your own. On my barefoot connections
I use two. One is the hardware router that I use to connect to the Internet. You can get one of these for under
$50 at Best Buy. It is a simple Internet router. Your system administrator can set you up or you can do the same
thing for yourself at home. I’ll dig into that in a moment.
In addition to the hardware firewall I set up the Windows
firewall. You can do the same thing with a Mac. If you
don’t know how to do this, get some help.
I am not going to spend a lot of time with the same old
stuff about using strong passwords, not reusing passwords on multiple sites/systems, not clicking on unexpected file attachments in emails and keeping your antimalware up to date. You have heard that until it’s like
the safety presentation on an airplane: most of us have
heard it so often that we unintentionally or otherwise,
tune it out. Keep all of this in mind, of course, just as you
do on that airplane, but let’s get a little more exotic. I’ll
start with some simple stuff that is good for most of us
and then I’ll address the really high risk users.
Next: BACK UP EVERYTHING! This computer is
what we refer to as “sacrificial”. That means that we go
bad places with it but we don’t really care. If it gets infected we blow it away and start over. It takes a while to
do but if we back up regularly we lose nothing. I really
like to back up using images because then I never need to
re-install any software. There are some great tools from
Laplink Software for doing this. I won’t take the space
to dig deeper into this but your system administrator or
the Best Buy sales person can help educate you on what
to do and how to do it.
Here are some simple rules and techniques for the average moderate risk user. I am not talking about the average home or business user… this is for those of you who
do things as part of your day-to-day work that are moderately risky such as searching porn sites for child pornography, prowling the social media for child predators
or running predator stings.
Now, you need something to back up to. I like the external USB drives. These are external hard drives that are
up to three terabytes in size. That should do the job for
most of you. If you travel a lot take a look at Western
Digital MyCloud. It’s a very cool way to have remote
file access with the security of controlling your own storage space. Backup daily or every time you change something, create new documents, etc.
First, if you work in an office of an organization, ask
your system administrator if you can have a “barefoot”
12
Continued on Next Page
V
I
D
O
C
Q
S
O
C
I
E
T
Y
Vidocq on the Internet - Digital Forensics with Peter Stephenson, PhD
Continued from Previous Page
machine – banking information (shudder) for example –
is not accessible from the virtual. So, for the rest of the
column I will use this terminology: the host – your
physical computer – we’ll call “the physical” and the
guest – the virtual computer that you install – we will call
“the virtual.” Pretty simple.
Next is the issue of malware. I run two anti-malware
programs on my systems: McAfee and Avast. That is not
a recommendation, by the way… it’s just an example.
The two work together well. My university requires
McAfee and Avast is free. What one doesn’t get the other
probably will. So I have yet to be infected – unless I did
it to myself, of course… I do move malware around from
time to time and I turn off the anti-malware to do it. I
have been known to be careless about that and cause myself a bit of heartburn. You won’t likely have the same
issue. Keep the anti-malware up-to-date. There are
about 2,000 new pieces of malware per day hitting cyberspace – not all “in the wild”, of course, so you will
never see that many, but there is a lot of bad code out
there to be sure.
The first step is to set up your physical machine the way
you want it. Don’t put all of your working tools – the
ones that you use for risky business – on the physical.
We are going to put them in the virtual. The virtual
really is just a very special file. But as far as you are
concerned it looks, feels and acts just like a physical machine.
Now, on to the stuff for very high risk users. If you routinely visit the seamy side of the ‘Net, in addition to the
thoughts above, here is another: move up to a virtual environment. Before you turn off completely, let me try to
make this really simple (easy to do because it is).
Your physical machine needs a bit more muscle than you
may be used to. You probably are running Windows 7 or
8. But you need more memory. I recommend between 6
and 8 GB of RAM. Also, you should have a TB of disk
if you can but 750GB is OK too. If all of this seems way
beyond you, get some help from someone who knows
what to do.
What we are going to do is put a computer inside your
computer. If you are a Mac user who also runs Windows
from inside your Mac you know all about virtualization
already. That is how you put the two operating systems
on the same computer. I am not talking about what Windows users call “dual boot” here. That is when two different operating systems are on the same PC and you can
choose which one to boot into. Virtualization actually
runs both computers – called the host and the guest – at
the same time. It takes a bit of special software but that
is free.
The virtual software is free. I like Virtual Box. It is easy
to use and it is reliable. Installing it is simple – just follow the instructions after you download it, and you’ll be
fine. Now you need a second copy of Windows. This is
the only thing that is going to cost you money. You will
install Virtual Box, then the second copy of Windows and
finally, you’ll do some configuration. This is all welldocumented at the Virtual Box site but if it is beyond you
get some help.
There is one more really big benefit to working in the
virtual. You can, as part of your setup, create what is
called a snapshot. This is an exact copy of the virtual
and if you blow the virtual away with a virus or some
such you can do a couple of mouse clicks and revert to
the original clean version. Your physical machine will
remain unharmed. What that means in practical terms is
that you can install all of your work tool on the virtual,
Before we get to the how-to, let’s talk about why. When
you run in a virtual environment nothing that you do in
the virtual computer can hurt your physical computer
(usually – but that is a hard topic to include for this discussion). That means that you can be infected with
malware, or whatever and your safe – I’ll explain how
shortly. Also, anything that you keep on your physical
13
V
I
D
O
C
Q
S
O
C
I
E
T
Y
Vidocq on the Internet - Digital Forensics with Peter Stephenson, PhD
Continued from Previous Page
Dr. Peter Stephenson, VSM, CISSP, CISM, FICAF,
holds a PhD in digital investigation and a Master’s Degree in diplomacy with a concentration in terrorism. He
is the director of the Norwich University Center for Advanced Computing and Digital Forensics as well as being
the chief information security officer for the university.
He conducts all university investigations that have any
connection to computers or the Internet, and teaches various courses in digital forensics and cyber investigation.
His PhD, from Oxford Brookes University in the UK, was
one of the first in the world to be awarded based upon research in digital forensic investigation. He has written or
contributed to 16 books and hundreds of articles.
snapshot it and then all you need to do is make sure that
you have backed up your data. If you have an accident,
revert the virtual machine and restore your data from
backup… voila! All is well again.
We’ve covered an awful lot of territory. For next time
allow me to suggest that you send me your questions
about this and I will expand in the next column
([email protected]). Perhaps it might be worth
considering a brief tutorial on high risk computer use at
one of our meetings.
So all of that said…. See you all in the fall.
Until next issue……
Request for Printed Journals For Shut-In Members
Please save your printed copies of Vidocq Journals for HQ to provide to retired members without Internet. Mail or
drop off to: Vidocq Society. 1704 Locust Street, Second Floor, Philadelphia PA 19103. Attention Dr. Bookspan, Science Officer, Journals.
Books and eBooks By and About Vidocq Members
Susquehanna Road: How
Rem Bristow, Bill Kelly, and
a Myriad Group of Philadelphia Investigators Solved the
Cold Case of the Boy in the
Box.
Good Hunting: An American Spymaster's Story by
former Deputy Director Operations, CIA, Jack Devine,
VSM, and and Vernon Loeb.
Click to order Susquehanna
Road.
Click to order Good Hunting:
An American Spymaster's
Story
14
Books Continued on Next Page
V
I
D
O
C
Q
S
O
C
I
E
T
Y
Books and eBooks By and About Vidocq Members
The Murder At Asbury Park CD-ROM by Peter Lucia
(Author, Editor), with original art piece by Frank Bender,
VSM, is an illustrated ebook that visually incorporates
recently unearthed reports of one of the 20th Century’s
most
remarkable
murder cases and
sting
operations.
Since 1911, the story
has been told only as
series of anecdotes,
in brief “amazing detective” articles in
pulp
magazines,
Sunday supplements
and publications like
The Reader’s Digest.
What was once a little parlor story is now
a 400-page ebook that uses scans of stirringly written
case materials, an archive revealed for the first time in
nearly 100 years. In addition to hundreds of case materials, THE MURDER AT ASBURY PARK contains 250
photographs and illustrations, many quite rare. Click to
order The Murder at Asbury Park.
The Girl With The Crooked Nose by Ted Botha. Tells
of Frank Bender’s work as a forensic artist and founding
member of the Vidocq Society, to bring attention and
resolution to hundreds of neglected murders of women
near Ciudad Juarez, Mexico.
From this work, Frank and
his daughter Vanessa have
donated time and talents to
assist the Ni Una Mas project
(Not One More). Click to
order The Girl With The
Crooked Nose.
A Manual of Private Investigation Techniques: Developing Sophisticated Investigative and Business Skills
to Meet Modern Challenges by William F. Blake.
David L. Ziegler, VSM, CFE, and Lt Col Jim Carino
were contributors to Intellenet's third book on investigations. Ziegler, along with his son Chris, wrote the chapter
How to Identify and Solve Arson, based on his years of
experience as a Supervisory Federal ATF agent and
working as a PI with in
surance companies. Jim
Carino's chapter is The
Making of a Security
Expert Witness. Jim is a
retired Air Force OSI Lt
Colonel Special Agent
with over 50 years in
the public and private
sector. Ziegler is a retired ATF Special Agent
with a combined 43
years in the public and
private sector. He specializes in fire, arson
and bombing cases. Jim now specializes in providing expert witness testimony in civil litigation cases involving
premises liability and security negligence. Click here to
order Manual of Private Investigation Techniques.
Asesinos En Serie. Edición en
Español (Spanish Edition) by
Robert K. Ressler (Aug 2005).
384 pages. Click here to order
Asesinos En Serie Spanish edition and here for more books by
Robert Ressler.
Click links provided with each book
to get your copies,
Or the Vidocq web site:
http://vidocq.org/books.html
15
Books Continued on Next Page
V
I
D
O
C
Q
S
O
C
I
E
T
Y
Books and eBooks By and About Vidocq Members - www.Vidocq.org/books
Effective Interviewing and
Interrogation Techniques,
Third Edition, by Nathan J.
Gordon and William L. Fleisher. A practical manual providing the forensic
practitioner/investigator critical insight into human behavior, enabling one to become a
better interviewer, interrogator
and, most importantly, an expert detector of truthful and deceptive behavior. Gordon
and Fleisher have created a one-stop guide to mastering
the art of credibility assessment during an interview, with
successfully tested techniques for obtaining a confession
from guilty suspects. Forensic practitioners, law enforcement, the intelligence community, the private security sector, attorneys, and forensic and criminal justice
students will all find this volume a valuable resource.
• The only book to address FAINT, IIT, and MITT in
one source
• Enables the interviewer to obtain a confession that can
stand up in court
• Includes an online workbook with practical exercises
to assist the reader
The third edition expands chapters on torture, assessing the interview, statement analysis, MITT, and interrogation. It contains new chapters on passenger screening,
and report writing, along with new case studies. Also
covered are ways to maximize the collection of information from a prospective employee, and legal considerations. The Forensic Assessment Interview Technique
(FAINT) and the Integrated Interrogation Technique (IIT)
were developed at the Academy for Scientific Investigative Training and are used by forensic practitioners and
investigators to detect truthful or deceptive behavior.
FAINT is applicable to all forensic type interviews and
incorporates the assessment of nonverbal behavior, projective analysis of unwitting verbal cues, statement
analysis and the Morgan Interview Thematic Technique
(MITT). This volume teaches how to combine, apply and
quantify these techniques to reach a numerical conclusion to the truthfulness of the interviewee. Order here in
hardcover and Kindle.
Cold Case Homicides: Practical Investigative Techniques by
Richard H. Walton, EdD, VSM,
provides effective and accessible
information to those responsible
for investigating and resolving
previously examined, but still
unsolved, cold case homicides.
The book merges theory
with practice through use of case
histories, photographs, illustrations, and checklists that convey
essential, fundamental concepts, while providing a
strong, practical basis for the investigative process. It
combines proven techniques from forensics, psychology,
and criminal investigation, and focuses on technologies
that may not have been available at the time of the crime.
This guide defines the characteristics of a cold case
homicide; details various investigative methods used by
law enforcement agencies; explores the actual
experiences of detectives in reopening case files; and
presents current technologies such as ViCAP, HITS, and
TracKRS used in the identification of cases related to the
reopened case, or its perpetrator. It also highlights
technological changes that contribute to law
enforcement's abilities to solve cold case homicides, such
as computerized print technology, the specificity of
DNA, and the expanding data banks that enable the
linkage of previously unknown suspects to the crimes
they committed. Available for order in hardcover and
Kindle.
Submit Books By and About Members
for Listing in the Vidocq Journal
Include:
➡Graphic of Cover
➡Synopsis
➡Author Bio and Member Status
Email Dr. Bookspan, Science Editor
16
Books Continued on Next Page
V
I
D
O
C
Q
S
O
C
I
E
T
Y
Vidocq Society in Print: Books By and About Members - www.Vidocq.org/books
Continued from Previous Page
In Trail of Blood, The Vidocq Society helps solve the
murder of
24 year old Scott
Dunn. Scott's parents never gave
up when his killers left no body,
no weapon, only blood, so much
blood. “When Jim Dunn got the
heart stopping call every parent
dreads: "Your son has disappeared" on a Sunday night, it set
into motion a six year nightmarish
odyssey of desperate
searches. Dunn turned to Richard
Walter of the Vidocq Society, forensic pathologist and criminal
profiler, who consulted Scotland Yard, studied DNA evidence and blood spatter patterns, and then pointed out
who he deduced killed Scott Dunn, and why.” Click to
order Trail of Blood.
The Murder Room. Michael Capuzzo introduces
the founders of the Vidocq
Society, talented courageous
sculptor Frank Bender,
Commissioner William Fleisher, and criminal profiler
Richard Walter. Learn what
inspired them to help solve
cold case murders. Click to
order in Print, Kindle Edition and Audio Versions.
Deadly Betrayal: The CBS Murders is based on an actual major, high-profile investigation, told from the inside by FBI man Don Richards, VSM.
“An undercover agent
is killed in a Chinese Tong
gang-war and FBI Supervisor Dan Robertson can't
prove the operation was
authorized. He is set up as
the scapegoat, and told to
involve himself in a safe
white collar fraud case until
things get sorted out. But
that case is far more sinister,
and soon Robertson finds
himself partnered with
NYPD Detective Richie LeBeau in a complex multiple murder investigation which
might connect to the Tong. Overcoming personal clashes,
inherent distrust, agency rivalry, and leaks to the media,
they use every crime-solving and forensic technique to
identify the killer, and build their case. When sharp legal
maneuvering threatens to dismantle their work and free
the killer, they must find a way to resurrect the case and
bring justice to a terrible crime.” Click to order Deadly
Betrayal.
In Someone’s Daughter, Silvia Pettem tells of a young
woman, known only as
"Jane Doe," found murdered
in 1954 in Colorado. Pettem
spurred the Vidocq Society
and Boulder County Sheriff’s
Detective
Steve
Ainsworth to find the
woman's name and killer.
Several Vidocq members
selflessly volunteered resources and time: Dr. Richard Froede and Frank
Bender did skull and facial
reconstructions. Dr. Walter
Birkby, Dr. Robert Goldberg, and Dr. Terry Melton worked on DNA. Fred Bornhofen coordinated. Many others contributed. In October
2009, DNA comparison with a surviving sister confirmed
Jane Doe's identity as Dorothy Gay Howard, an 18-yearold missing from Phoenix, Arizona. Click to order
Someone’s Daughter.
17
Books Continued on Next Page
V
I
D
O
C
Q
S
O
C
I
E
T
Y
Vidocq Society in Print: Books By and About Members - www.Vidocq.org/books
Continued from Previous Page
Investigating Religious Terrorism and Ritualistic Crimes by
Dawn Perlmutter, VSM, director
of Symbol & Ritual Intelligence,
is the first complete resource to
assist in crime scene identification, criminal investigation, and
prosecution of religious terrorism
and occult crime. It analyzes occult and religious terrorist practices from each group’s theological perspective to help you understand traditional and contemporary occult groups and
domestic and international terrorist religions, demarcate
legal religious practice from criminal activity, and acquire techniques specific to occult and terrorist religion
crime scene investigation. Click here to order in hardcover and Kindle.
I Have Lived in the Monster:
Inside the Minds of the World’s
Most Notorious Serial Killers
by Robert K. Ressler and Tom
Shachtman. Agent Ressler, who
coined the term “serial killer” in
the 1970s, recounts his years
since leaving the FBI, working as
an independent criminal profiler
on some of the most famous serial murder cases of our day. Piecing clues from crime scenes,
along with killing patterns and
methods, Ressler explains his role assisting investigations
of such perplexing international cases as England’s Wimbledon Common killing, the ABC Murders in South Africa, and the deadly gassing of Japan’s subway. We’re
also witness to Ressler’s fascinating, in-depth interviews
with John Wayne Gacy, plus a shockingly candid discussion with “cannibal killer” Jeffrey Dahmer. Click here to
order.
Sexual Homicide: Patterns and Motives by John E.
Douglas, Ann W. Burgess, &
Robert K. Ressler. This authoritative book represents the data,
findings, and implications of a
long-term F.B.I.-sponsored study
of serial sex killers. Specially
trained F.B.I. agents examined
thirty-six convicted, incarcerated
sexual murderers to build a valuable new bank of information
which reveals the world of the
serial sexual killer. Data was obtained from official psychiatric and
criminal records, court transcripts, and prison reports,
and from extensive interviews with the offenders. Detailed information is included on the FBI’s Violent
Criminal Apprehension Program (VICAP) along with a
sample VICAP Crime Analysis Report Form. Attention
is given to child/adolescent formative events, societal
perceptions & pressures which may be motivational to
sexual killers who exhibit aberrant thought patterns, deviant behavior, and aggression linked to sexual expressivity. 234 pages. Click to order in Kindle, paperback
and hardcover.
Diving and Hyperbaric Medicine Review for Physicians by US Navy diving and hyperbaric research physiologist Jolie Bookspan, MEd, PhD, FAWM, NAUI
SCUBA Instructor Hall of Honor inductee. Extensive information in quick, clear
bulleted format for personnel
involved in hyperbaric chamber operations, scuba medical
support, wound healing, and
autopsy. Include all 13 approved indications for clinical
hyperbaric oxygen treatment
complete with protocols,
equipment, codes, fire safety,
and regulations. Sample test
questions and answers to prepare for the Board exams in Primary or Secondary Board
Certification. A complete reference of the entire field for
anyone interested in hyperbarics and chamber medicine.
From the Undersea and Hyperbaric Society publisher
through author website: www.DrBookspan.com/books.
18
Books Continued on Next Page
V
I
D
O
C
Q
S
O
C
I
E
T
Y
Vidocq Society in Print: Books By and About Members
Continued from Previous Page
not just an arrest, but a conviction. Appendices include
sample standard operating procedures from three different
agencies to use as a guide for setting up a cold case unit
and a list of additional resources a department may look
to for assistance. 264 pages. Click to order in hardcover,
Kindle, and rental.
The Unknown Darkness: Profiling the Predators Among Us
by Gregg McCrary. McCrary’s
25 years in the Bureau have
yielded over 1000 cases to draw
upon. The 10 he describes in the
book reveal the strengths and
pitfalls of modern criminal investigation, including the siege
of the Branch Davidian compound in Waco, the Buddhist
Temple Massacre in Phoenix,
Arizona, the search for the Scarborough Rapist (who eventually became a serial murderer), the prosecution of Jack Unterweger (an international serial killer who committed murders in Czechoslovakia, Austria and Los Angeles), the Sam Sheppard murder case and others. McCrary answers what happens at
the crime scene, what kind of person does it take to grapple with the serial killers among us, and exactly how do
we disarm the enemy. 400 pages. Click here to order in
hardcover or paperback.
Cold Case Research: Resources for Unidentified,
Missing, and Cold Homicide Cases by Silvia Pettem
presents profiles and actual case
histories to illustrate how investigators can successfully apply resources that will enable them to
reopen and solve cases gathering
dust in the file room. Today’s investigators have found that, to
solve cold cases, they need to be
internet savvy and make the best
use of the rapidly changing methodologies of the twenty-first century, but they also have to be time
travelers and open the door to the
past. This volume weaves together the nearly forgotten
skill sets of traditional historical researchers with the latest online tools, including TLO, a premier investigative
system; and NamUs, the revolutionary dual databases for
missing persons and unidentified remains. Along with
practical applications, Cold Case Research gives investigators the tools they need to save time and money and to
jump-start their cold cases, while keeping others from going cold in the future. Topics discussed include:
·
Implementing cold case units
·
People searches and working with databases
·
Overlooked DNA in PKU cards
· The plight of the missing and unknown
· Applying historical and geographical context
·
Online and off-line newspaper research
·
Public and published records
· The use of volunteers
·
Contact with co-victims
·
Cold-case review teams and information-sharing resources
· Taking advantage of the media
Click here to order in hardcover and Kindle.
Cold Cases: An Evaluation Model with Follow-up
Strategies for Investigators (Advances in Police Theory and Practice) by James M.
Adcock and Sarah L. Stein, begins with a historical perspective
on how cases get to the point
where it appears all investigative
leads have been exhausted, and
includes a chapter on understanding the process of homicide
and those who kill. Next, the
authors explain the evaluation
model, theories of the crime,
evidentiary issues and concerns,
informational and behavioral aspects relative to the crime and the participants in the
crime, and documents investigative strategies for future
efforts on the case. The third section discusses the investigation, questions investigators must ask, choice of
interview/interrogation techniques based on the behavioral aspects involved, and how the growth in technology
since the date of the incident might provide new opportunities to uncover clues. Finally, the authors suggest
how investigators can maximize their efforts and obtain
19
Books Continued on Next Page
V
I
D
O
C
Q
S
O
C
I
E
T
Y
Vidocq Society in Print: Books By and About Members
Continued from Previous Page
Healthy Martial Arts by Jolie Bookspan, Med, PhD,
FAWM is for all in law enforcement, military, athletes,
and those who need to be in top shape and prevent injuries for work and life. Training techniques for all athletes, strength, abdominal
training that transfers to
Spec Ops (train like you
fight), nutrition, flexibility,
performance
enhancement drugs and
foods, soreness, injuries,
breathing, spirit, speed,
balance, joint stability,
back, neck, and knee pain
prevention, stress handling, making training and
daily life healthy, brain
power & mental exercise,
wheelchair athletes, more.
Dr. Bookspan is a sports medicine specialist, military
scientist, 4th degree Black Belt, 2009 Master Instructor
of the Year, and former full contact fighter inducted into
the International Black Belt Hall of Fame. Healthy Martial Arts won Reader’s Choice Award of the International
EUSA Martial Arts Association. Approximately 200 photos. 228 pages. Click here to order from Amazon, or here
(www.drbookspan.com/books) for print and eBook.
Stretching Smarter Stretching Healthier by military
scientist Jolie Bookspan, MEd, PhD, FAWM. Not the
same old stretches. Immediately helpful innovative techniques to make range of motion, mobility, and injury prevention built-in to daily
movement habits for home
and work safety. Stop injuries
and poor posture from bad
stretching. Learn how to understand for yourself what
constitutes healthful muscle
length and stretching. Nearly
200 illustrations guide you
step-by-step. Click here to order print or Kindle edition from Amazon, or here
(www.drbookspan.com/books) for print and eBooks.
Investigating Computer-Related Crime, new Second
Edition (2004) by Peter Stephenson. Written by an information security specialist, this second edition of Investigating Computer-Related Crime discusses cybercrime, its investigation,
and the difficulties encountered by both public law
enforcement officials and
private corporate investigators. The book offers
insights into collecting
evidence,
interrogating
suspects and witnesses,
handling crime in progress,
as well as issues involving
the authorities, and helpful
case studies. Updated
chapters incorporate new
kinds of attacks, current
work of the Digital Forensic Research Workshop and
their investigative model, new operating systems, the impact of the Patriot Act, and new ways of analyzing computer media. 448 pages. Order here in hardcover edition
and here for Kindle.
Diving Physiology in Plain English by Dr. Jolie Bookspan, former research physiologist for the U.S. Navy, inducted into the NAUI
SCUBA instructor Hall of
Honor. For divers from novice to instructor, medical
personnel, search and rescue
teams, training departments.
Clear information to understand (not memorize) physiology and medicine, and apply to safer decompression,
heat and cold exposure. injuries, equipment, gas mixing,
fitness to dive, rescue, and
other protocols. Published
by the Undersea and Hyperbaric Medical Society
(UHMS). Click to order: www.DrBookspan.com/books.
20
Books Continued on Next Page
V
I
D
O
C
Q
S
O
C
I
E
T
Y
Vidocq Society in Print: Books By and About Members
Continued from Previous Page
The Ab Revolution by award winning research scientist
Jolie Bookspan, MEd, PhD,
FAWM, teaches a key sports
medicine method now used by
athletes, military, law enforcement personnel, and top spine
docs and rehab centers around
the world. It trains lower spine
and pelvic angle to neutral,
quickly stopping a major
source of lower back pain, and
functionally strengthening abdominal and core during actual
operations. Part I teaches neutral spine to stop one major
cause of back pain in everyday life (no exercises needed).
Part II teaches functional strengthening for entire body,
from simple to the toughest you can get. No flexion that
stresses discs or reinforces bent-forward posture. New
Third Edition Expanded Print edition- 114 photos and
drawings in 124 pages, gym-bag 6x9” size, and now in
4th Edition Kindle and eBook. Click here for Amazon or
here (www.drbookspan.com/books) for print and eBook
from the Author’s website.
Death Investigations (Jones
& Bartlett Learning Guides to
Law Enforcement Investigation) by James M Adcock,
PhD, and Steve Chancellor.
Each crime type requires a
unique approach with distinct
steps. This book presents the
specific functions and processes necessary to accurately
assess and document cases
(Homicides, Suicide, Accident, Natural, and Undetermined). Click here to purchase.
Fix Your Own Pain Without Drugs or Surgery by
Jolie Bookspan, MEd, PhD, FAWM. Prevent pain common to enforcement work:
Upper and lower back pain,
neck, shoulder, rotator cuff,
hip, knee pain, and foot pain.
Ankle sprains, Achilles tendonitis, fasciitis, pronation,
supination, and flat feet.
Herniated/ bulging/ slipping/
degenerated discs, sciatica,
swayback, lordosis, spondylolisthesis, SI joint, pinched
nerve and impingement. Plus
stories from real patients in
each chapter illustrate what
works, what doesn’t, and
when. Drawings and photos illustrate concepts. Each
page, of 330 total, has specific things to do, things to
avoid, things to check for, and/or a story of people who
did and didn’t fix pain and why. Click here to order from
Amazon, and here (www.drbookspan.com/books) from
author website.
Health & Fitness - How to Be Healthy Happy and Fit
for The Rest of Your Life, 3rd ed, by Dr. Jolie Bookspan.
Helpful if you have a desk job
to improve health and duty
readiness. 31 chapters of what
works & what doesn’t for
healthier body and brain. Includes heart, cholesterol, diabetes, digestion, osteoporosis,
body fat tests, weight loss,
supplements and performance
enhancing products, mental
and emotional health. Full
chapters on fixing discs, neck
pain, upper and lower back
pain, leg cramps, and headaches. Sections on knee and shoulder pain, ankle sprains.
Funny Facts about the body, and an A to Z glossary. 379
pages all-in-one-source. Click here to order from Amazon
or www.drbookspan.com/books from author website.
21
V
I
D
O
C
Q
S
O
C
I
E
T
Y
2014 Meetings at the Union League
Meeting Reservations
2014 Meeting Dates
Only Vidocq Society Members (VSMs) who pre-register,
and their guests who are pre-registered and accompanied
by members, may attend Vidocq Society meetings. You
must reserve your place with Ms. Alvarado at Vidocq,
215-545-1450, by close of business, the Monday before
each meeting.
Reserve
By Close of Business
--
Meetings are customarily the third Thursday of each
month at the historic Union League at 140 S. Broad
Street, Philadelphia, PA, www.unionleague.org. The Union League’s dress code: Business attire required for both
men and women—jackets, no jeans.
Cost for the luncheon meeting has increased to $40 per
member and $50 for non-member guests. Both members
and guests with reserved places will be asked to pay if
they do not honor the reservation made for them.
Parking is available at reduced rate, courtesy of Ryan
Shapiro, VSM. The garage is on Sansom Street opposite
the Union League entrance, between Broad and 15th
Street. Ask for parking validation at the meeting.
22
For
Meeting Date
No July / Aug Meeting
15 September
18 September
End August
Black Tie Awards
Sunday, 21 September
6 p.m. to 11:00 p.m.
Pen Ryn Mansion on the
Delaware
13 October
16 October
17 November
20 November
--
No Dec Meeting
V
I
D
O
C
Q
S
C
I
E
T
Y
Solve The Mystery
The Vidocq Society
The Vidocq Society is a Nonprofit, 501c(3) corporation, which, by the terms of its charter, is a fraternal
organization comprising
professionals and nonprofessionals who
meet in a social
setting to discuss
unsolved crimes.
Our work is pro
not consider
sented to us. Our
to act as a catalyst
ance to law ento assist them in solving
O
Q. What were the Bulgarian Cold War castor bean
murders?
bono and we do
every case presole purpose is
and provide guidforcement agencies
these crimes.
Super-sleuths, send your verdicts on this to
Dr. Bookspan, science editor
Previous Mystery:
A. Congratulations to Dr. Stephenson, answering the
mystery on privacy in his column this issue.
Opinions offered by our members are personal opinions offered in the spirit of cooperation and goodwill,
based only upon the facts presented, and should not
be considered formal or legally binding opinions of
the Vidocq Society.
www.Vidocq.org
Get In Shape For Duty
Stronger Safer Vidocq
Vidocq Society Journal
The Vidocq Journal © Copyright 2014
Published by The Vidocq Society,
Self-Defense Training and
Practice
a 501 (c) (3) nonprofit organization
Second Floor 1704 Locust Street Philadelphia, PA 19103
Novice to Black Belt
Voice: 215-545-1450 — Fax: 215-545-1773 — www.vidocq.org
Shotokan Karate, Self Defense, and
Physical Training for Health and Duty
Requirements
Subscription $150 per year
K
a
Small class, Personal attention.
Fitness, injury prevention, confidence, self
defense. Special consideration for Vidocq r
Members.
a
For a place in the next class, contact:
t
Paul Plevakas, Karate Sensei
3rd Degree Black Belt
e
Black Belt Hall of Fame
Commissioner
William L. Fleisher - [email protected]
Deputy Commissioners
Benjamin J. Redmond - [email protected]
Fred A. Bornhofen - [email protected]
Secretary
Stanley C. P. Olkowski III - [email protected]
Director of Communications
Edward Tenuto - [email protected]
Journal
Paul D. Plevakas and Dr. Jolie Bookspan Plevakas, Editors
Submissions to: Vidocq Editors
(215) 778-2634 [email protected]
www.PaulPlevakas.com
23

Similar documents

Vidocq Journal 2014 Quarter 3-4

Vidocq Journal 2014 Quarter 3-4 Movie review, ‘Jinn – Supernatural Thriller versus Real Life Horror.’ Compares the film’s portrayal of Jinn with symbolism and ritual practices that occur in real life belief in Jinn, including rit...

More information

Vidocq Journal 2012 Quarter 2

Vidocq Journal 2012 Quarter 2 To My Fellow Vidocqians: It is with mixed emotions that I report that the Lubbock Texas authorities have been able to positively identified the remains of Roger Scott Dunn, which were found last we...

More information

Vidocq Journal 2011 Quarter 2

Vidocq Journal 2011 Quarter 2 Richard Walter, VSM is an international expert on Crime Assessment, Profiling, and Risk Evaluation; retired forensic psychologist for the State of Michigan prison system; and crime scene analyst/pr...

More information

Vidocq Journal 2013 Quarter 1

Vidocq Journal 2013 Quarter 1 Psychiatrist Mark Schroeder, VSM, had an article accepted in the Forensic Examiner. The article is entitled “Improving Reasoning in Medicolegal Evaluations.” The article discusses ways to improve t...

More information

Vidocq Journal 2011 Quarter 3-4

Vidocq Journal 2011 Quarter 3-4 A training team of Vidocq Society Members (VSMs) contributed their expertise to the Cold Case Conference hosted in conjunction with the Vidocq Society and the Unified Police Department of Greater S...

More information

Vidocq Journal 2015 Quarter 3-4

Vidocq Journal 2015 Quarter 3-4 encouraged to contact Ed Gaughan, Vidocq Society training coordinator for further information at (215) 5451450.

More information