Vidocq Journal 2013 Quarter 1
Transcription
V I D O C Q S Vidocq O C I E T Y Journal The Vidocq Society – Solving Unsolved Murders and Cold Cases Quarterly Journal Volume Twenty Four Number One 2013 Vidocq Public Face Fast Forensics With Dr. Bookspan Vidocq Member News Digital Forensics Peter Stephenson, PhD Submission Rules Articles & Advertisements Forensic Linguistics and Threat Program Page 1 Pages 2-4 Pages 4-6 Pages 7-9 Pages 16-17 Page 18 Bookspan's Bullets Vidocq Society on Facebook and Wikipedia By the Editors The Vidocq Society appears on the online (Internet) entities of Facebook and Wikipedia. Facebook is a site where people and groups put information and photos about themselves and others. The topic page may be started and added to by the people involved or by strangers. Information may be true or not, beneficial or frivolous. Facebook is a profit company that manages to get people to give much private info, which is sold to advertisers. With Vidocq member expert involvement, a Facebook page affords opportunity to use it for higher good. Vidocq has had a Facebook page since March 2011. Don’t lose this chance to monitor, add good, truth, and benefit, as intended: http://www.facebook.com/pages/The-Vidocq-Society/201544689874340 Wikipedia is an online collection of articles, allowed to be written and edited by anyone, at home over the Internet using their own web browser, on nearly any topic. Articles have no bylines; authors aren’t publicly accountable for what they write. A separate site called WikiScanner can be used to track sources of edits. Without effort and review, articles may not reflect topics accurately. The entry on the Vidocq Society is brief with only one reference. Add your careful, truthful, abilities to make the Vidocq Wikipedia page a world resource for benefit, as intended: http://en.wikipedia.org/wiki/Vidocq_Society 1 V I D O C Q S O C I E T Y Bookspan's Bullets by Jolie Bookspan, MEd, PhD, FAWM, VSM Each issue brings you summarized forensic news and education. Bookspan's Bullets is dedicated to Frank Bender, VSM, who inspired and requested the column beginning in 1997. DNA Ancestry Tracing Too Vague For Accuracy SOCOM Seeks SubSonic Bullets Fired bullets may produce a brief, highly audible sonic boom. One way to make bullets quieter is to keep them below the sound barrier of ~1,125 ft or 343 meters per second (dry air, 20°C (68°F), sea level). Propellant charge for subsonic ammunition must be smaller than for supersonic, the bullet heavier, fired at lower pressures, making large-caliber war rifles less accurate, with reduced range, and increased burn problems causing jamming and fouling of the weapon. Bullets must obdurate (expand during firing) to the size of the barrel to keep the bullet on target and prevent propellant gases from leaking and melting to the inside barrel--difficult to remove and damaging to the weapon. A bullet can't be too light or heavy, too hard or soft, all of which affect ability to obdurate properly. Since World War II, subsonic bullets are considered effective mainly in smaller .22 and 9 mm pistols. Ancestry companies which base genetic history on DNA may tell individuals they have links to historical figures such as Napoleon or Cleopatra, however researchers say DNA tests cannot provide such specific information. Professor David Balding and Professor Mark Thomas of University College London published a public guide in Sense About Science stating, "Such histories are either so general as to be personally meaningless or they are just speculation from thin evidence." They further stated, "The genetic ancestry business uses a phenomenon wellknown in other areas such as horoscopes, where general information is interpreted as being more personal than it really is." Professor Balding stated that news items about famous people being related to historical figures often come from PR material provided by genetic testing companies. DNA Worldwide group director David Nicholson stated, "Testing can provide a general ancestry indication i.e. Northern European, Western Africa or Middle Eastern and in some cases even more specific. DNA cannot tell you that your ancestors were Viking, simply that your ancestry came from a part of the world common to the Vikings based on historic facts." SOCOM, The Pentagon Special Operations Command, wants to "provide superior covert and stealth capabilities" for military, police, and Department of Homeland Security. The Defense Department does not presently have subsonic bullets "classified for use in calibers provided by DoD service." One Pentagon solution for subsonic bullets is "polymer cased ammunition" which "produce a reliable and consistent powder burn" and which obturate at lower pressures making it possible to use a heavier bullet with less propellant. Polymer cartridges are not new. During the late 1980s to early 1990s, the Army spent $300 million on the canceled project Advanced Combat Rifle to replace the M16 standard. One proposed replacement was the Steyr ACR, which used polymer cartridges. It supposedly was inaccurate due to inconsistent strength of the cartridges. - Sources: - Sources: Sense about Science http://www.senseaboutscience.org/? http://www.senseaboutscience.org/news.php/306/we-are-allrelated-to-romans-vikings-egyptians-attila-the-hun Sense About Genetic Ancestry Testing http://www.senseaboutscience.org/resources.php/119/senseabout-genetic-ancestry-testing GizMag http://www.gizmag.com/us-special-forces-subsonic-ammunition/25172/ CNN http://www.cnn.com/2012/11/20/tech/innovation/subsonic-bullets-wired/in dex.html?hpt=hp_c3 2 Continued on Next Page V I D O C Q S O C I E T Y Bookspan's Bullets By Dr. Jolie Bookspan, VSM Continued from Previous Page Hiding Secrets in Email Jokes Clothes That Block Drone Cameras A new line of clothing using "metalized" fabric blocks the wearer from drone-mounted infrared camera detection. New York City privacy advocate Adam Harvey states that his three-item Stealth Wear line of scarves, capes, and burqas is more "a political statement than a moneymaking venture." Harvey is an instructor of physical computing at the Manhattan School of Visual Arts and is creator of the CV Dazzle project to develop makeup and hairstyles that camouflage people from face-recognition cameras and software. Steganography is designed to hide a secret message in digital form, hiding the binary strings of 0s and 1s in a photo or music file. The message looks like the original image or song, and the recipient who knows a message is encoded uses software to extract it. This kind of encryption requires large file size. Hiding a message in a plain text document yields a small file sizes but the problem is that the grammar, syntax, or spelling looks suspicious because it is changed to hide the real message. A new method developed by computer scientist Abdelrahman Desok of the University of Maryland, uses a joke to hide the meaning. Metal is an excellent material to absorb and scatter infrared waves. Metalized fabric prevents heat dissipation of the wearer to surroundings, where infrared cameras could detect them. Woven fabric is treated so that prepared metal particles adhere, producing a "flexible, breathable fabric that can be cut with ordinary tools but that protects against electromagnetic interference and masks infrared radiation." The metalized fabric is only about double the weight of untreated fabric. Harvey says his fabric, coated with copper, nickel and silver, gives his scarves, cloak, and thigh-length burqa "a silvery and luxurious feel.” The material also blocks cell signals. Harvey sells his Stealth Wear via U.K. Web site. The burqa costs about $2,300, the cloak "hoodie" $481, and the scarf is $565 - "luxury items, but so, too, is privacy today," according to Harvey. For example, to hide the code word "shaking" in an email joke, such as "Where do milk shakes come from?" with the correct answer, "From nervous cows" the system can substitute the word "shaking" for "nervous" so that the answer becomes "From shaking cows." It loses wit, but makes enough sense to merely seem like a poorly done joke. Another substitution example is, “Where is Dracula's American office? The Vampire State Building.” The question could be substituted as,“Where is Dracula's American home?” with the same answer. The Automatic Joke Generation Based Steganography Methodology (Jokestega) uses software to automatically write jokes using large dictionary databases. "A collection of jokes sent in a message with the non-obvious answer substituted for the wittier version could conceal a message using Jokestega. Desoky suggests that 8 bits of data might be hidden in a simple joke of the type discussed." In February 2012, President Obama signed a law giving the FAA until September 2015 to draw up rules to dictate how entities such as law enforcement, military, and private sector may use drones in U.S. airspace. The Federal Aviation Administration (FAA) predicts 10,000 commercial drones in domestic airspace by 2017—almost twice the estimates current unmanned aircraft. - Source: - Sources: Desoky, A. 2012. Jokestega: Automatic joke generationbased steganography methodology. Int. J. of Security and Networks, 7:3, 148-160. DOI: 10.1504/IJSN.2012.052529 http://www.inderscience.com/inføinarticletoc.php?jcode=ijs n&year=2012&vol=7&issue=3 http://www.inderscience.com/inføinarticle.php?artid=52529 Scientific American http://www.scientificamerican.com/article.cfm?id=drone-pro of-anti-infrared-apparel&WT.mc_id=SA_WR_20130313 Contact: Albert Ang [email protected] Inderscience Publishers 3 Continued on Next Page V I D O C Q S O C I E T Y Bookspan's Bullets By Dr. Jolie Bookspan, VSM Continued from Previous Page Doctor Used Silicone Fingers To Falsify Sign-In for Colleagues A council spokesman stated those who receive regular wages without showing up for work included public workers in the areas of health, education and security. - Source: A Brazilian doctor used prosthetic silicone fingers to fool the biometric employee attendance device at the hospital where she works to sign in for absent colleagues. Police said they recovered six silicone fingers at the time of the doctor's arrest, three of which have already been identified as bearing the fingerprints of co-workers. She faces charges of fraud for covering up the absence of six colleagues. BBC News http://www.bbc.co.uk/news/world-latin-america-21756709 Dr. Bookspan loves good science. Send forensic jokes, quotations, websites and stories for possible inclusion in “Bookspan’s Bullets.” The town's mayor, Acir Fillo, says that the police investigation found about 300 public employees in the town, whom he described as “an army of ghosts” had been receiving pay without going to work. Email: Bookspan’s Bullets News of Vidocq Members Donna Fontana, M.S., VSM, Featured in The Courier Post Donna Fontana, M.S., respected forensic anthropologist for the New Jersey State Police, was featured in the Courier Post for her tireless careful work in forensic reconstruction to identify unknown h u m a n skeletal remains. the World Trade Center on Sept. 11, 2001, as well as many other plane crashes. She earned a bachelor's degree in anthropology at Penn State, a master's degree in pathology from the Medical College of Virginia, and is a fellow in the physical anthropology section of the American Academy of Forensic Sciences. The nation’s morgues hold an estimated 50,000 sets of unidentified remains, without national or central cataloguing database. Ms. Fontana was the first to start a police site to centralize and advance identification ability. Photo courtesy Penn State. For the full article, click: Courier-Post Feb 2013. Fontana has helped New Jersey law-enforcement agencies and county medical examiners since 1981, worked to identify victims of the attack on http://www.courierpostonline.com/apps/pbcs.dll/article?AID=20133 02150088&gcheck=1 4 Member News Continued on Next Page V I D O C Q S O C I E T Y News of Vidocq Members Continued from Previous Page Fred Martens, VSM, on History Channel In the afternoon, VSM Warren Tewes, DDS, and VSM Richard Walter, MS presented “Cold Cases Breakthroughs.” Dr. Tewes presented the biography of E.F. Vidocq, the founding history of the Vidocq Society and the process of hearing cold cases and contributing intervention to law enforcement. Mr. Walter examined several cold cases and pinpointed roadblocks that may have slowed investigators, but continued pursuit to resolution. He highlighted breakthrough cases that lead to trial. The History Channel broadcasted "The Definitive Guide to the Mafia" narrated by Michael Franzese---the "Hollywood Don." Represented in this 2 hour program were Michael Chertoff, Selwyn Raab, and Fred Martens, VSM, former OC Lt. with NJSP, and Chairman of the PA Commission on Organized Crime. Fred stated the program was done “quite well and accurately.” Concluding the day, VSM James Adcock, PhD and Robert Davis, MS, presented “Research and Assessment of Unresolved Homicides.” They discussed the future of forensic sciences regarding national information databases, DNA evidence, and tech tools like GPS systems and other emerging forensic science techniques. They examined the combinations of these sciences and how this has lead to changes in both crime solving and the expectations of the public, law enforcement, and the judicial system. VSMs Lecture at the Smithsonian By Warren Tewes, DDS, MS, DABFO, VSM The American Academy of Forensic Sciences (AAFS) meets annually in a major city in the US, with 2500 to 3000 attendees each year. When the AAFS Annual Meeting is in Washington DC, which is every 6-8 years, the Smithsonian Institution invites the Academy to select a panel of presenters for a day of lectures to the Smithsonian Associates and the public. In separate sessions on Thursday, 21 Feb 2013, Vidocq members Richard Walter and Dr. Peter Stephenson made presentations in the Digital and Multimedia Section. Donna Fontana, VSM, presented a paper in the Odontology section with Dr. Sheila Dashkow and Dr. Stuart Alexander, entitled "What Are We Accomplishing With Dental Information? Obstacles Facing Forensic Odontologists and Working Solutions." On February 23, the panel presented, “Forensics: Solving Crimes the Experts’ Way” at Smithsonian’s Ripley Center. In the day-long program, members of the AAFS lectured on intriguing cases, reported what they had learned, and their professional motivation in forensic investigations. Henry Lee, PhD began with his lecture on “Famous and Infamous Case Files” including the JonBenet Ramsey murder, the DC snipers shootings, the murders of Nicole Brown Simpson and Laci Peterson, as well as the kidnapping of Elizabeth Smart. Defense attorneys Linda Kenney-Baden, JD and Barry Scheck, JD presented “Forensic Tests in the Courtroom.” They discussed how experts move from the crime scene, autopsy table, and crime lab into the courtroom. What does the jury hear in contrast to what the public hears via media’s summarized reporting? They shared their involvement in the Phil Spector, Jayson Williams, and Casey Anthony cases, as well as the Innocence Project. Christopher Anderson presented a paper at The Last Word Society, entitled “DNA and Forensic Anthropology in a Cold Case.” It involved a 44 year old cold case and the conviction of Robert Bowman. Mr. Anderson is a member of the Jurisprudence Section. It is very nice of the Smithsonian Institution to ask the AAFS, and very nice of the AAFS to ask us to represent them at the SI. 5 Member News Continued on Next Page V I Continued from Previous Page D O C Q S O C I E T Y News of Vidocq Members Knot and Insect Experts Sought Article Accepted in Forensic Magazine By Dr. Peter Hahn, Vidocq Postmaster By Mark Schroeder KNOTS Jim Trainum, VSM, is looking for a Vidocq member or other expert who knows about knots. Please contact Jim directly: Jim Trainum Criminal Case Review & Consulting 414 Seward Square SE #101 Washington, D.C. 20003 202-359-9454 [email protected] Psychiatrist Mark Schroeder, VSM, had an article accepted in the Forensic Examiner. The article is entitled “Improving Reasoning in Medicolegal Evaluations.” The article discusses ways to improve the reasoning and logic used in medical and psychological consultations to criminal or civil legal matters, such as assessment of claimed disability or insanity. In his work performing disability and other medicolegal evaluations, Dr. Schroeder has found that little attention has been paid to the reasoning involved in these evaluations, so that is often hard to tell how an evaluator reached his or her conclusions. It is the author’s hope that the use of a systematic approach to analysis in such evaluations, with attention to the reasoning involved, can improve the quality and reliability of these evaluations and facilitate their understanding and acceptance by courts and other requesting parties. This article does not specifically address reasoning used in the criminal investigations that are considered by the Vidocq Society. However, there are similarities and the reader may find useful applications to our work. INSECTS Vidocq member Bob Benowitz asks if there any members of the Vidocq Society that teach about how insects interact with decaying bodies. Bob had a friend who is interested in the forensic aspect of entomology. If you can help with this question, please contact Bob Benowitz: [email protected]. Contact Joe McGillen By Bill Fleisher, VSM, Vidocq Commissioner - In his work, Mark Schroeder performs peer reviews and independent examinations regarding psychiatric disability for several insurance companies and disability management companies. VSM Joe McGillen is 86 years-old, and now residing in a retirement home. He would love to hear from his friends in Vidocq. Here is his contact information: Joe McGillen, VSM Deer Meadow Retirement Home 8301 Roosevelt Blvd. Apt 700 Philadelphia, PA 19152 215-543-2180 First Rule of Investigation: “No amount of inductive evidence guarantees the conclusion.” Joe does not have internet access. Think of mailing or bringing him the copies of your Vidocq Journal that you print and would otherwise discard or destroy for security. 6 V I D O C Q S O C I E T Y Digital Forensics with Peter Stephenson, PhD Advanced Persistent Threats and Cybercrime By Peter Stephenson, PhD, VSM, CISSP, CISM, FICAF, LPI sort that is not supposed to be in our computer and that it will do bad things if we let it hang out for long. This quarter we address murder, fraud, theft and other forms of mayhem and we do it all through the medium of cybercrime. We get infected with malware by doing things that we should not do. Sometimes we know that we are doing these things and sometimes we don’t. If we visit a pornography site we have about a 37% or better chance of getting a malware infection. If we go to a hacker site the odds are even less in our favor. There has been much in the news lately about advanced persistent threats (APT). You may not recognize the term, but it is there, none-the-less. It is there, for example, in the context of the revelations by Mandiant Corp. that the Chinese have been hacking US organizations – from companies to universities to governments – for years. To many of us that probably isn’t a particularly big surprise but surprise or not, it seems to have become a fact of life. So this quarter we take a brief excursion into APTs and think a bit about how incursions by a nation-state affect us as crime fighters of one form or another. But we could be phished – we really should know better than to fall for that these days – or we could be infected by visiting a trusted site such as CNN or Yahoo. We might click on an email attachment or do something else that exposes us to a transfer vector for malware. Really, the only defense is to be sure that our antimalware software (McAfee, Symantec, etc.) is up to date and, unfortunately, that doesn’t offer full protection either. Some bugs are detected only about 55% of the time. For some readers this column will provide some specific insights into the role of APTs in crime, especially organized crime, in the United States. For others it simply will be an interesting side trip into the dark side of the Internet. Whichever kind of reader you happen to be, let me assure you that the idea – and reality – of APTs is with us for the long term and it will affect us in ways we may not imagine today. Malware that is used for APTs has a special mission. It sits quietly in the background and harvests such things as your on-line banking credentials or you login to your business network. Why are you not protected by your organization’s firewall? Simply because you were not attacked from the outside… you brought the bug into the network by doing something – reading email, browsing the Web, for example – that the firewall saw as a legitimate activity. There are devices that your organization can put at its perimeter that catches most malware entering that way but not all companies use them. Before we start let’s get an understanding of what we mean by APTs. We can dissect the term to get a clearer picture of APTs and how they impact us. We start with “Advanced”. That means that the mechanism for delivering the threat is complicated and sophisticated. “Persistent” implies that the threat stays in our systems and hides from all of our efforts to identify and eradicate it. And “Threat” tells us that whatever this APT thing is, it means us harm. So, now we need examples. So how does an APT enable organizations such as the Chinese group that Mandiant found? And what does that have to do with crime? First, any organization can use the same techniques to catch you. It could be an economically hostile nation-state such as China or it could be a gang of thieves. APTs are equal opportunity crimeware. They don’t care who they work for. Some are optimized for financial crime and some are opti- The most typical APT is a piece of malware – malware means malicious software. We usually think of it as a computer virus, worm or Trojan horse of some kind. I won’t go into the technical details of what distinguishes these types of malware but I am sure that you get the idea that we are talking about a computer bug of some 7 Continued on Next Page V I D O C Q S O C I E T Y Advanced Persistent Threats and Cybercrime Continued from Previous Page These developers are very professional. In some cases their support and the quality of their software exceeds that of legitimate developers. They know full well that their customers are not computer gurus so, like commercial software vendors, they make their products userfriendly and they support them well. They also charge what seems like a lot of money. However, if you consider that the cost of the software pales in comparison to the ill-gotten revenues that it generates, perhaps – for the criminal, anyway – the price is not so high after all. mized for international cyber theft but they all, at their core, work the same way. Here are two examples. Let’s start with Mandiant’s “APT-1” Chinese hackers. They use such techniques as phishing to get you to invite their bug into your system. Phishing is a technique where you receive an email that appears legitimate but is not. Once you click on an attachment or open the email in some cases you are redirected to a web site that is infected with a piece of malware that does what the Chinese want. This is not a legitimate web site but it looks exactly like one. It could be masquerading as your bank or your tech support department as examples. Here is one that came to me recently: The financial crimeware works much like the nation-state software. It infects the same way and it harvests financial information from your computer. It then communicates, not with the criminal – too easy to get caught that way – but with a command and control server (CC, C2 or C2). The C2 issues the malware – sometimes called a “bot” – its instructions (these have been pre-programmed by the criminal or “bot master”) and sits back waiting for the results. It may then send the results to another C2 server or it may wait for the bot master to come fetch them. If you go to this site you will find that it has been disconnected. However, if it was not, it likely would have been infected and after connecting so would your computer. This is a very blatant form of phishing but most are quite subtle, masquerading as a trusted site. There are many clues here, though. First, the person claims to be Chinese. Second, the web site is in Russia (www.beautyasian.ru) and finally, the email address is in Finland ([email protected]). These inconsistencies fairly scream, “Scam!” The bot master then uses the stolen credentials to log into your bank account just as if he was you and he nearly empties your bank account. “Nearly” because even criminals have ways to keep under the RADAR. First, the criminal cannot transfer – and transfers are the preferred way to get the money – more than the particular country’s limit without arousing suspicion. In the US that keeps transfers under $10,000. Once your computer is infected with the malware, the malware often attempts to move onto your network infecting other users and harvesting information. That information could be financial but for a nation-state it likely is trade secrets. It will stay in the network – Advanced – hiding from detection – Persistent – and continuing its work – Threat - until your administrator finally finds and eradicates it. Second, you might check your balance on-line, see that it is depleted and sound the alarm before the criminal is finished. To avoid that the criminal alters your computer screen image so that it looks as if you still have money in your account even though you don’t. Now, what about crimeware in the financial community? Crimeware is a general category of malware that usually means a kit that consists of everything criminals need to perform on-line fraud or theft. There are thriving crimeware developer communities in several places such as Eastern Europe, Africa and Asia. They develop, sell and support their wares over the Internet, well hidden from average users but accessible to criminal enterprises. Finally, if the criminal empties the account completely that sends up a flare to the bank so he or she will leave some token amount in the account to avoid raising the bank’s suspicions. 8 Continued on Next Page V I D O C Q S O C I E T Y Advanced Persistent Threats and Cybercrime Continued from Previous Page year we have added cyber criminalistics and malware forensics. We are one of a handful of schools that teaches malware forensics using live malware but it is such a big part of the cybercrime landscape that we cannot avoid it. So how can these activities generate all of the kinds of crimes I mentioned at the start? Well, financial crimes should by now be pretty obvious as should trade secret thefts by foreign powers. But what about murder? The answer to this is rather convoluted. First, the obvious: gang-related activity. Gangs and other forms of organized crime from all over the world now participate in various frauds and thefts using on-line resources and crimeware. A recent case that I was involved with was a large card theft (tens of millions of dollars) by a loosely organized international group of criminals. The core of the group was well-organized while the foot soldiers were sort of like casual employees. So what are my messages to you? First, keep your antimalware programs current at all times. Second, don’t play in the mud. When you mud wrestle with pigs you both get dirty and the pig likes it. Surfing sites that are high risk is wrestling with pigs and you, not the pigs, will come out on the short end of the stick. Finally, if you are investigating a financial or intellectual property theft crime, there is a way better than average chance that you are involved with a cyber crook. Get the help you need to fight at that level. The core of the group engaged skilled hackers to steal data that allowed the manufacture of fake cards. The cards were built by the foot soldiers in countries around the world. At a pre-determined time all of the foot soldiers – or “mules” – went to ATMs and emptied them (the limits on the cards were significantly increased as part of the initial hack) in a short – under 24 hours – period of time. The mules then transferred the stolen funds to the leaders’ bank accounts and were summarily paid their cuts. What do you suppose would have happened if a mule decided to shortchange the bosses? These crime groups are not nice people and, contrary to common opinion, it is not the hackers but the hard core crooks who run the enterprise. More about what that means in a future column, but for now, just doing a routine computer forensic analysis is no longer going to be enough. In most crimes today there is little distinction between the physical and the digital crime scenes. I consider them as one and that is what you need to do. Think about the extent of your crime scene and just the way you would tap a blood or fingerprint expert or a DNA specialist, get the right kind of cyber investigator to help you through the tall weeds. Today, almost every crime – no matter what it is – has a digital component to it. And that digital component, investigated properly, can help you close your case faster than without it. Now a not-so-obvious example. Crimeware, as wellwritten as most of it is, is not perfect any more than Microsoft products are perfect. What happens if the computer of an employee at a hospital, a railroad or an airline becomes infected and the bug misbehaves? Depending upon the extent of the misbehavior, the network could come down costing real human life. That’s murder in my view. Misbehavior is not as uncommon as one might think, either. Until next issue…… Dr. Peter Stephenson, VSM, CISSP, CISM, FICAF, holds a PhD in digital investigation and a Master’s Degree in diplomacy with a concentration in terrorism. He is the director of the Norwich University Center for Advanced Computing and Digital Forensics and is an Associate Professor of cyber investigation at that university. There certainly is a lot more to this than I have had time or space to cover. However, it is a very interesting topic and one which potentially impacts us all. Up until this year I taught computer and network forensics as well as cyber investigation in my program at the university. This 9 V I D O C Q S O C I E T Y Books and eBooks By and About Vidocq Members - www.Vidocq.org/books Effective Interviewing and Interrogation Techniques, Third Edition, by Nathan J. Gordon and William L. Fleisher. A practical manual providing the forensic practitioner/investigator critical insight into human behavior, enabling one to become a better interviewer, interrogator and, most importantly, an expert detector of truthful and deceptive behavior. Gordon and Fleisher have created a one-stop guide to mastering the art of credibility assessment during an interview, with successfully tested techniques for obtaining a confession from guilty suspects. Forensic practitioners, law enforcement, the intelligence community, the private security sector, attorneys, and forensic and criminal justice students will all find this volume a valuable resource. • The only book to address FAINT, IIT, and MITT in one source • Enables the interviewer to obtain a confession that can stand up in court • Includes an online workbook with practical exercises to assist the reader The third edition expands chapters on torture, assessing the interview, statement analysis, MITT, and interrogation. It contains new chapters on passenger screening, and report writing, along with new case studies. Also covered are ways to maximize the collection of information from a prospective employee, and legal considerations. The Forensic Assessment Interview Technique (FAINT) and the Integrated Interrogation Technique (IIT) were developed at the Academy for Scientific Investigative Training and are used by forensic practitioners and investigators to detect truthful or deceptive behavior. FAINT is applicable to all forensic type interviews and incorporates the assessment of nonverbal behavior, projective analysis of unwitting verbal cues, statement analysis and the Morgan Interview Thematic Technique (MITT). This volume teaches how to combine, apply and quantify these techniques to reach a numerical conclusion to the truthfulness of the interviewee. Order here in hardcover and Kindle. Cold Case Homicides: Practical Investigative Techniques by Richard H. Walton, EdD, VSM, provides effective and accessible information to those responsible for investigating and resolving previously examined, but still unsolved, cold case homicides. The book merges theory with practice through use of case histories, photographs, illustrations, and checklists that convey essential, fundamental concepts, while providing a strong, practical basis for the investigative process. It combines proven techniques from forensics, psychology, and criminal investigation, and focuses on technologies that may not have been available at the time of the crime. This guide defines the characteristics of a cold case homicide; details various investigative methods used by law enforcement agencies; explores the actual experiences of detectives in reopening case files; and presents current technologies such as ViCAP, HITS, and TracKRS used in the identification of cases related to the reopened case, or its perpetrator. It also highlights technological changes that contribute to law enforcement's abilities to solve cold case homicides, such as computerized print technology, the specificity of DNA, and the expanding data banks that enable the linkage of previously unknown suspects to the crimes they committed. Available for order in hardcover and Kindle. Submit Books By and About Members for Listing in the Vidocq Journal Include: ➡Graphic of Cover ➡Synopsis ➡Author Bio and Member Status Email Dr. Bookspan, Science Editor 10 Continued on Next Page V I D O C Q S O C I E T Y Vidocq Society in Print: Books By and About Members Continued from Previous Page Deadly Betrayal: The CBS Murders is based on an actual major, high-profile investigation, told from the inside by FBI man Don Richards, VSM. “An undercover agent is killed in a Chinese Tong gangwar and FBI Supervisor Dan Robertson can't prove the operation was authorized. He is set up as the scapegoat, and told to involve himself in a safe white collar fraud case until things get sorted out. But that case is far more sinister, and soon Robertson finds himself partnered with NYPD Detective Richie LeBeau in a complex multiple murder investigation which might connect to the Tong. Overcoming personal clashes, inherent distrust, agency rivalry, and leaks to the media, they use every crimesolving and forensic technique to identify the killer, and build their case. When sharp legal maneuvering threatens to dismantle their work and free the killer, they must find a way to resurrect the case and bring justice to a terrible crime.” Click to order Deadly Betrayal. The Murder Room. Michael Capuzzo introduces the founders of the Vidocq Society, talented courageous sculptor Frank Bender, Commissioner William Fleisher, and criminal profiler Richard Walter. Learn what inspired them to help solve cold case murders. Click to order in Print, Kindle Edition and Audio Versions. The Girl With The Crooked Nose by Ted Botha. Tells of Frank Bender’s work as a forensic artist and founding member of the Vidocq Society, to bring attention and resolution to hundreds of neglected murders of women near Ciudad Juarez, Mexico. From this work, Frank and his daughter Vanessa have donated time and talents to assist the Ni Una Mas project (Not One More). Click to order The Girl With The Crooked Nose. In Someone’s Daughter, historian Silvia Pettem tells of a young woman, known only as "Jane Doe," found murdered in 1954 in Colorado. Pettem spurred the Vidocq Society and Boulder County Sheriff’s Detective Steve Ainsworth to find the woman's name and killer. Several Vidocq members selflessly volunteered resources and time: Dr. Richard Froede and Frank Bender did skull and facial reconstructions. Dr. Walter Birkby, Dr. Robert Goldberg, and Dr. Terry Melton worked on DNA. Fred Bornhofen coordinated. Many others contributed. In October 2009, DNA comparison with a surviving sister confirmed Jane Doe's identity as Dorothy Gay Howard, an 18-year-old missing from Phoenix, Arizona. Click to order Someone’s Daughter. In Trail of Blood, The Vidocq Society helps solve the murder of 24 year old Scott Dunn. Scott's parents never gave up when his killers left no body, no weapon, only blood, so much blood. “When Jim Dunn got the heart stopping call every parent dreads: "Your son has disappeared" on a Sunday night, it set into motion a six year nightmarish odyssey of desperate searches. Dunn turned to Richard Walter of the Vidocq Society, forensic pathologist and criminal profiler, who consulted Scotland Yard, studied DNA evidence and blood spatter patterns, and then pointed out who he deduced killed Scott Dunn, and why.” Click to order Trail of Blood. 11 Continued on Next Page V I D O C Q S O C I E T Y Vidocq Society in Print: Books By and About Members Continued from Previous Page Investigating Religious Terrorism and Ritualistic Crimes by Dawn Perlmutter, VSM, director of Symbol & Ritual Intelligence, is the first complete resource to assist in crime scene identification, criminal investigation, and prosecution of religious terrorism and occult crime. It analyzes occult and religious terrorist practices from each group’s theological perspective to help you understand traditional and contemporary occult groups and domestic and international terrorist religions, demarcate legal religious practice from criminal activity, and acquire techniques specific to occult and terrorist religion crime scene investigation. Click here to order in hardcover and Kindle. I Have Lived in the Monster: Inside the Minds of the World’s Most Notorious Serial Killers by Robert K. Ressler and Tom Shachtman. Agent Ressler, who coined the term “serial killer” in the 1970s, recounts his years since leaving the FBI, working as an independent criminal profiler on some of the most famous serial murder cases of our day. Piecing clues from crime scenes, along with killing patterns and methods, Ressler explains his role assisting investigations of such perplexing international cases as England’s Wimbledon Common killing, the ABC Murders in South Africa, and the deadly gassing of Japan’s subway. We’re also witness to Ressler’s fascinating, in-depth interviews with John Wayne Gacy, plus a shockingly candid discussion with “cannibal killer” Jeffrey Dahmer. Click here to order. Sexual Homicide: Patterns and Motives by John E. Douglas, Ann W. Burgess, & Robert K. Ressler. This authoritative book represents the data, findings, and implications of a long-term F.B.I.-sponsored study of serial sex killers. Specially trained F.B.I. agents examined thirty-six convicted, incarcerated sexual murderers to build a valuable new bank of information which reveals the world of the serial sexual killer. Data was obtained from official psychiatric and criminal records, court transcripts, and prison reports, and from extensive interviews with the offenders. Detailed information is included on the FBI’s Violent Criminal Apprehension Program (VICAP) along with a sample VICAP Crime Analysis Report Form. Attention is given to child/adolescent formative events, societal perceptions & pressures which may be motivational to sexual killers who exhibit aberrant thought patterns, deviant behavior, and aggression linked to sexual expressivity. 234 pages. Click to order in Kindle, paperback and hardcover. Diving and Hyperbaric Medicine Review for Physicians by US Navy diving and hyperbaric research physiologist Jolie Bookspan, MEd, PhD, FAWM, NAUI SCUBA instructor Hall of Honor inductee. Extensive information in quick clear bulleted format for personnel involved in hyperbaric chamber operations, scuba medical support, wound healing, and autopsy. Include all 13 approved indications for clinical hyperbaric oxygen treatment complete with protocols, equipment, codes, fire safety, and regulations. Sample test questions and answers to prepare for the Board exams in Primary or Secondary Board Certification. A complete reference of the entire field for anyone interested in hyperbarics and chamber medicine. From the Undersea and Hyperbaric Society publisher through author website: www.DrBookspan.com/books. 12 Continued on Next Page V I D O C Q S O C I E T Y Vidocq Society in Print: Books By and About Members Continued from Previous Page not just an arrest, but a conviction. Appendices include sample standard operating procedures from three different agencies to use as a guide for setting up a cold case unit and a list of additional resources a department may look to for assistance. 264 pages. Click to order in hardcover, Kindle, and rental. The Unknown Darkness: Profiling the Predators Among Us by Gregg McCrary. McCrary’s 25 years in the Bureau have yielded over 1000 cases to draw upon. The 10 he describes in the book reveal the strengths and pitfalls of modern criminal investigation, including the siege of the Branch Davidian compound in Waco, the Buddhist Temple Massacre in Phoenix, Arizona, the search for the Scarborough Rapist (who eventually became a serial murderer), the prosecution of Jack Unterweger (an international serial killer who committed murders in Czechoslovakia, Austria and Los Angeles), the Sam Sheppard murder case and others. McCrary answers what happens at the crime scene, what kind of person does it take to grapple with the serial killers among us, and exactly how do we disarm the enemy. 400 pages. Click here to order in hardcover or paperback. Cold Case Research: Resources for Unidentified, Missing, and Cold Homicide Cases by Silvia Pettem presents profiles and actual case histories to illustrate how investigators can successfully apply resources that will enable them to reopen and solve cases gathering dust in the file room. Today’s investigators have found that, to solve cold cases, they need to be internet savvy and make the best use of the rapidly changing methodologies of the twenty-first century, but they also have to be time travelers and open the door to the past. This volume weaves together the nearly forgotten skill sets of traditional historical researchers with the latest online tools, including TLO, a premier investigative system; and NamUs, the revolutionary dual databases for missing persons and unidentified remains. Along with practical applications, Cold Case Research gives investigators the tools they need to save time and money and to jump-start their cold cases, while keeping others from going cold in the future. Topics discussed include: · Implementing cold case units · People searches and working with databases · Overlooked DNA in PKU cards · The plight of the missing and unknown · Applying historical and geographical context · Online and off-line newspaper research · Public and published records · The use of volunteers · Contact with co-victims · Cold-case review teams and information-sharing resources · Taking advantage of the media Click here to order in hardcover and Kindle. Cold Cases: An Evaluation Model with Follow-up Strategies for Investigators (Advances in Police Theory and Practice) by James M. Adcock and Sarah L. Stein, begins with a historical perspective on how cases get to the point where it appears all investigative leads have been exhausted, and includes a chapter on understanding the process of homicide and those who kill. Next, the authors explain the evaluation model, theories of the crime, evidentiary issues and concerns, informational and behavioral aspects relative to the crime and the participants in the crime, and documents investigative strategies for future efforts on the case. The third section discusses the investigation, questions investigators must ask, choice of interview/interrogation techniques based on the behavioral aspects involved, and how the growth in technology since the date of the incident might provide new opportunities to uncover clues. Finally, the authors suggest how investigators can maximize their efforts and obtain 13 Continued on Next Page V I D O C Q S O C I E T Y Vidocq Society in Print: Books By and About Members Continued from Previous Page Healthy Martial Arts by Jolie Bookspan, Med, PhD, FAWM is for all in law enforcement, military, athletes, and those who need to be in top shape and prevent injuries for work and life. Covers training techniques for all athletes, strength, abdominal training that transfers to Spec Ops (train like you fight), nutrition, flexibility, performance enhancement drugs and foods, soreness, injuries, breathing, spirit, speed, balance, joint stability, back, neck, and knee pain prevention, handling stress, making training and daily life healthy, brain power & mental exercise, wheelchair athletes, more. Dr. Bookspan is a sports medicine specialist, military scientist, 4th degree Black Belt, 2009 Master Instructor of the Year, and former full contact fighter inducted into the International Black Belt Hall of Fame. Healthy Martial Arts won Reader’s Choice Award of the International EUSA Martial Arts Association. Approximately 200 photos. 228 pages. Click here to order from Amazon, or here (www.drbookspan.com/books) for print and eBook. Stretching Smarter Stretching Healthier by military researcher Jolie Bookspan, MEd, PhD, FAWM. Not the same old stretches. Immediately helpful innovative techniques to retrain daily movement habits to make flexibility, mobility, and injury prevention built-in to daily life. Stop injuries and poor posture from bad stretching. Learn how to understand for yourself what constitutes healthful muscle length and stretching. Nearly 200 illustrations guide you step-bystep. Click here for ordering from Amazon or here (www.drbookspan.com/books) for print and eBooks. Investigating ComputerRelated Crime, Second Edition (2004) by Peter Stephenson with NEW Third edition coming soon. Written by an information security specialist, this second edition of Investigating Computer-Related Crime discusses cybercrime, its investigation, and the difficulties encountered by both public law enforcement officials and private corporate investigators. The book offers insights into collecting evidence, interrogating suspects and witnesses, handling crime in progress, as well as issues involving the authorities, and helpful case studies. Updated chapters incorporate new kinds of attacks, current work of the Digital Forensic Research Workshop and their investigative model, new operating systems, the impact of the Patriot Act, and new ways of analyzing computer media. 448 pages. Order here in hardcover edition and here for Kindle electronic version. Diving Physiology in Plain English by Dr. Jolie Bookspan, former research physiologist for the U.S. Navy, inducted into the NAUI SCUBA instructor Hall of Honor. For divers, novice through instructor, search and rescue teams, training departments. Clear information to understand (not memorize) physiology and medicine, and apply all to safer decompression, injuries, heat and cold exposure, equipment, gas mixing, fitness to dive, rescue, and other protocols. Published by the Undersea and Hyperbaric Medical Society (UHMS). Click to order from: www.DrBookspan.com/books. Click links provided for each book, or see all on the Vidocq Society web site BOOKs page: www.Vidocq.org/books 14 V I D O C Q S O C I E T Y Vidocq Society in Print: Books By and About Members Continued from Previous Page The Ab Revolution by award winning research scientist Jolie Bookspan, MEd, PhD, FAWM, teaches a groundbreaking sports medicine method now used by athletes, military, law enforcement personnel, and top spine docs and rehab centers around the world. It trains spine and pelvic angle to neutral, quickly stopping a major source of lower back pain, and functionally strengthening abdominal and core during actual operations. Part I teaches neutral spine for back pain control in everyday life (no exercises needed). Part II covers functional strengthening from simple to the toughest you can get. No flexion that stresses discs or reinforces bent-forward posture. New Third Edition Expanded - 114 photos and drawings in 124 pages, gym-bag 6x9” size. Click here for Amazon or here (www.drbookspan.com/books) for print and eBook from the Author’s website. Death Investigations (Jones & Bartlett Learning Guides to Law Enforcement Investigation) by James M Adcock, PhD, and Steve Chancellor. Each crime type requires a unique approach with distinct steps. This book presents the specific functions and processes necessary to accurately assess and document cases (Homicides, Suicide, Accident, Natural, and Undetermined). Click here to purchase. Health & Fitness - How to Be Healthy Happy and Fit for The Rest of Your Life, 3rd ed, by Dr. Jolie Bookspan. Very helpful if you have a desk job. 31 chapters of what works & what doesn’t for healthier body, spirit, and brain. Includes heart, cholesterol, diabetes, digestion, osteoporosis, body fat tests, weight loss, supplements and performance enhancing products, mental and emotional health. Full chapters on fixing discs, neck pain, upper and lower back pain, leg cramps, and headaches. Sections on knee and shoulder pain, ankle sprains. Funny Facts about the body, and an A to Z glossary. 379 pages all-in-one-source. Click here to order from Amazon or www.drbookspan.com/books from Author’s website. Fix Your Own Pain Without Drugs or Surgery by Jolie Bookspan, MEd, PhD, FAWM. Prevent pain common to enforcement work: Upper and lower back pain, neck, shoulder, rotator cuff, hip, knee pain, and foot pain. Ankle sprains, Achilles tendonitis, fasciitis, pronation, supination, and flat feet. Herniated/ bulging/ slipping/ degenerated discs, sciatica, swayback, lordosis, spondylolisthesis, SI joint, pinched nerve and impingement. Plus stories from real patients in each chapter illustrate what works, what doesn’t, and when. Drawings and photos illustrate concepts. Each page, of 330 total, has specific things to do, things to avoid, things to check for, and/or a story of people who did and didn’t fix pain and why. Click here to order from Amazon or here (www.drbookspan.com/books) from Author’s website. Submit Books By and About Members for Listing in the Vidocq Journal Include: ➡Graphic of Cover ➡Synopsis ➡Author Bio and Member Status Email Dr. Bookspan, Science Editor 15 V I D O C Q S O C I E T Y Submission Guidelines for ARTICLES to be Considered for the Vidocq Journal The Vidocq Journal invites well-prepared beneficial articles to be considered for publication, as follows: References. Include if helpful. Don't ask us to look it up for you. If you have links for more on your story, add them at the end. Don't send us Google links or search engine words and tell us to look up the topic to write your story or get facts you are not sure of. Topics and Approximate Length: Interest items, accomplishments, appearances: one to three paragraphs. Include where, what you did, why, complete names and titles, the good it produced, and available links to more. Papers you delivered: Can be a simple paragraph to a page including photos, that report of the conference, you and co-presenters' roles, information presented, and the good you achieved. Include photos if possible and links to the conference site or your paper if published. Notices, news, and requests: a paragraph or two. Teaching articles: one to three pages. Photos. Indicate if your photo goes with an article or stands alone with caption only. Web resolution (under 100K, more or less). If you don't know how to reduce, we will do that for you. Clear caption for each photo. Send individual photos, not proof sheets. If you don't know how to separate, send the composite with a note letting us know which one(s) go in your article and where. Photos must have relation to the article and help the reader. Have a clear, complete topic before contacting us. If you don't have a topic, we can help you develop one. Format. Editable word processing files - WORD, text, dox, docs, e-mail. No PDFs, newspaper clippings, handwritten or typed hard copy that you want us to retype. Send by e-mail. Format: Shorter is (often) better. Edit to be to the point. Each paragraph is the next point. Outline it for yourself first to see what are your points Remember that writing is sequential; Sentence 2 logically follows Sentence 1. Use short sentences. Cut adjectives. Keep like thoughts together. No exclamation points; they remove authority. Journal copies. If you don't already receive Journals, contact HQ, not the editors, to add your e-mail to the distribution list. You will get your Journal copy when everyone else does. Questions from the Editors: If we ask you questions, answer in time for us to get you in the issue. Include a title. Title reflects or explains the article. Deadlines: 1st quarter Journal - March. Deadline: All the above completed before 1 March. 2nd quarter Journal - June. Deadline: All the above before May 10th 3rd quarter Journal - Sept. Deadline: Before Aug 10th 4th quarter Journal - Dec. Deadline: Before Nov 10th Are you qualified to write it? Include your first and last name, suffixes, credentials for writing your topic, pertinent work affiliation showing suitability to the topic. Document sources. Don't write beliefs, conclusions, or what people said without documentation or reference to where you got the information or quotation. Mail Submissions for Consideration to: [email protected] Subject line: Article For Consideration for Vidocq Journal Define terms. Some terms are exclusive to your field or may have different meaning or no meaning in other fields. Allow someone out of your specialty to understand your article without prior knowledge of your topic. 16 V I D O C Q S O C I E T Y Submission Guidelines for ADVERTISEMENTS for the Vidocq Journal We offer limited opportunities to advertise events and services of benefit in the Vidocq Journal. Here is How: Large Sunny 2 Bedroom FIRST e-mail Dr. Zeff Lazinger Vidocq treasurer, who sets advertisement pricing for the Vidocq Journal. E-mail [email protected] with the following: Apartment for Immediate Rent - - Size of the ad you are looking for: quarter page, half page, or full page. - How many entries: one time placement, 2 issues of the 4 per year, or all issues for the year. • Two sunny bedrooms, kitchen, large living room, lots of closets • Wall to wall carpet, washer and dryer, garbage disposal, refrigerator, tiled bathroom • Basement storage included • Quiet neighborhood, on-street parking, accessible to public transportation • Covered garages for car or extra storage also available • Close to Fox Chase Cancer Center, Northeast High School and Roosevelt Mall. 2nd Floor. • Burlholm Northeast Philadelphia • Walking to SEPTA Bus & Regional Rail • Convenient to Center City Philadelphia Northeast Philadelphia When you have your agreed-upon price, send your CAMERA-READY advertisement to Dr. Bookspan at [email protected] with a copy of Dr. Lazinger's pricing e-mail showing you already have a price. Your CAMERA-READY advertisement is a PDF with all graphics and text in place the way you want them. Advertisements may be refused based on suitability. You will receive a mail indicating acceptance. Send your check to: The Vidocq Society 1704 Locust Street, Second Floor Philadelphia, PA 19103 Mark your payment envelope - Att Dr Zeff Lazinger, Treasurer. Deadlines are the same as for articles: 1st quarter Journal - March. Deadline: Before 1 March. 2nd quarter Journal - June. Deadline: Before May 10th 3rd quarter Journal - Sept. Deadline: Before Aug 10th 4th quarter Journal - Dec. Deadline: Before Nov 10th Photos, map, more information - http://paulplevakas.com/store Contact Paul Plevakas [email protected] Thank you, The Editors 17 V I D O C Q S O C I E T Y ! ! FORENSIC LINGUISTICS AND THREAT ASSESSMENT FOR INVESTIGATIVE PRACTITIONERS April 29 ! May 3, 2013 Manassas, Virginia Modeled on the FBI Forensic Linguistic Workshop for Law Enforcement Practitioners created and taught by James Fitzgerald, AGI offers this unique 5-day program which introduces the cutting edge science of forensic linguistics and threat assessment to both public and private sector professionals. This multi-media program is presented through instruction and lectures incorporating interactive and practical exercises involving actual cases. This program has operational application for the investigator through examining and assessing communications and identifying characteristics, to include: Level of dangerousness represented in the communication Personal characteristics of anonymous authors, such as age, gender, region, native or non-native speaker status, potential motive, indications of possible mental illness, etc. Threats of a specific type such as blackmail, extortion, harassment, defamation, physical harm, stalking, terrorism, product tampering, threat to brand, etc. All the materials covered and relevant articles and guides for the investigative practitioner are included for retention by participants. Instructors: James R. Fitzgerald, M.S. (FBI SSA, Retired) Violent Crime Consultant/Forensic Linguist Academy Group, Inc. Natalie Schilling, Ph.D. Associate Professor/Forensic Linguist Georgetown University The cost of this unique 5-day program is $2,000.00 and is offered by application only. Please contact Mr. Martin Rehberg at 703-330-0697 or [email protected] for an application. Act now ! seating is limited! The Academy Group, Inc., "#$%&'()*+,%)-(.$,"%/(01-"$)2-owned forensic behavioral science firm, is comprised of former FBI and Secret Service Supervisory Special Agents who played a major role in the creation of the FBI's National Center for the Analysis of Violent Crime and later the Behavioral Analysis Unit, which manage and facilitate the FBI's investigative and behavioral response to all facets of crime and threats. www.Academy-Group.com 18 V I D O C Q S O C I E T Y 2013 Meetings at Union League Meeting Reservations 2013 Meeting Dates Remaining Only Vidocq Society Members (VSMs) who pre-register, and their guests who are pre-registered and accompanied by members may attend Vidocq Society meetings. You must reserve your place with Ms. Alvarado at Vidocq, 215-545-1450, by close of business, the Monday before each meeting. Meetings are customarily the third Thursday of each month at the historic Union League at 140 S. Broad Street, Philadelphia, PA, http://www.unionleague.org/. The Union League’s dress code: Business attire required for both men and women—jackets, no jeans. Cost for the luncheon meeting has increased to $40.00 per member and $45.00 for non-member guests. Both members and guests with reserved places will be asked to pay if they do not honor the reservation made for them. Parking is available at reduced rate, courtesy of Ryan Shapiro, VSM. The garage is on Sansom Street opposite the Union League entrance, between Broad and 15th Street. Ask for parking validation at the meeting. 19 Reserve By Close of Business For Meeting Date 18 March 21 March 15 April 18 April 13 May 16 May 17 June 20 June -- No July / Aug Meeting 14 August Awards Banquet 14 Sept 16 September 19 September 14 October 17 October 18 November 21 November -- No Dec Meeting V I D O C Q S C I E T Y Get In Shape - Self Defense The Vidocq Society Shotokan Karate Novice to Black Belt The Vidocq Society is a Nonprofit, 501c(3) corporation, which, by the terms of its charter, is a fraternal organization comprising professionals and nonprofessionals who meet in a social setting to discuss unsolved crimes. Our work is pro not consider sented to us. Our to act as a catalyst ance to law ento assist them in solving O Small class, Personal attention. Fitness, injury prevention, katas, confidence, self defense. bono and we do every case presole purpose is and provide guidforcement agencies these crimes. Mondays: 8:00 p.m. - 9:30 p.m. Thursdays: 7:30 p.m. - 9:00 p.m. 2nd Floor 2100 Chestnut Street Philadelphia, PA 19103 Entrance on 21st Street Opinions offered by our members are personal opinions offered in the spirit of cooperation and goodwill, based only upon the facts presented, and should not be considered formal or legally binding opinions of the Vidocq Society. Taught by: Paul Plevakas, Karate Sensei 3rd Degree Black Belt Black Belt Hall of Fame Telephone: (215) 778-2634 Email: [email protected] Website: www.PaulPlevakas.com Solve The Mystery K a r a t e Vidocq Society Journal A new mystery each issue Q. Name a famous fictive character using neither deductive nor inductive reasoning. Super-sleuths, send your verdicts to Dr. Bookspan, science editor The Vidocq Journal © Copyright 2013 Published by The Vidocq Society, a 501 (c) (3) nonprofit organization Second Floor 1704 Locust Street Philadelphia, PA 19103 Voice: 215-545-1450 — Fax: 215-545-1773 — www.vidocq.org Solution to Last Solve the Mystery: Q. Who or what may leave fingerprints virtually indistinguishable from those of a human? A. Chief Steven Labov, MEMS, CISM, MSO, CERT-3, TAPI (Guest of Ryan Shapiro, VSM) writes, “Koalas. However this would be a rare event as they have two thumbs on each hand and they also have claws instead of fingernails. Also humans have ridges all over their palms and koalas only part of their palms. It would further be an infinitesimally remote event to find a koala at a crime scene even though possible.” Subscription $100 per year Commissioner William L. Fleisher - [email protected] Deputy Commissioners Benjamin J. Redmond - [email protected] Fred A. Bornhofen - [email protected]. Communications Ed Tenuto - [email protected] Journal Paul D. Plevakas and Dr. Jolie Bookspan Plevakas, Editors Submissions to: Vidocq Editors, as per pages 16-17. Phil Bauso had points deducted for answering Koalas but complaining it was too easy to look up on the Internet. 20
Similar documents
Vidocq Journal 2012 Quarter 2
The Vidocq Society helped solve the 1991 murder of 24 year old Scott Dunn when no weapon and no body could be found. The book, Trail of Blood, by Wanda Evans and Scott’s father James Dunn came out ...
More informationVidocq Journal 2012 Quarter 1
http://www.lifeslittlemysteries.com/1149-mafia-victims-diss olve-sulfuric-acid.html Science News http://www.sciencenews.org/view/generic/id/70234/title/Maf ia_informants_fail_acid_test Facebook pag...
More informationVidocq Journal 2011 Quarter 2
Vidocq Society. We all have heard communicators referred to as “PR people.” Many titles are used synonymously to describe the communications practitioner such as: media relations person; press offi...
More informationVidocq Journal 2014 Quarter 3-4
The Vidocq Society Medal of Honor went to Philadelphia Homicide Lieutenant Phil Riehl and his crack team of detectives Howard Peterman and Gregory Santamala, who solved the recent murder of Connie ...
More informationVidocq Journal 2014 Quarter 1-2
Donna Fontana, VSM received the 2014 Ajit R. Tungare Meritorious Service Award on Tuesday June 17 at the NJSP in Hamilton, N.J. It is awarded to one forensic scientist each year who has been nomina...
More informationVidocq Journal 2011 Quarter 3-4
A training team of Vidocq Society Members (VSMs) contributed their expertise to the Cold Case Conference hosted in conjunction with the Vidocq Society and the Unified Police Department of Greater S...
More informationVidocq Journal 2015 Quarter 3-4
they picked up spoken words from an empty potato chip bag recorded through sound proof glass. The technology could be used for law enforcement, space research to recover sounds across space, where ...
More information