Vidocq Journal 2012 Quarter 2
Transcription
V I D O C Q S Vidocq O C I E T Y Journal The Vidocq Society – Solving Unsolved Murders and Cold Cases Quarterly Journal! Scott Dunn Remains Found Page 1 Volume Twenty Three Number Two 2012 Fast Forensics Vidocq Motto Veritas Veritatum 2012 Vidocq Awards Dinner Invitation Digital Forensics with Peter Stephenson, PhD Vidocq Books and eBooks Pages 2 & 3 Page 4 Page 5 Pages 6 - 8 Pages 9 - 13 Bookspan's Bullets With Dr. Bookspan Remains of Roger Scott Dunn Identified By William L. Fleisher, VSM, Vidocq Society Commissioner To My Fellow Vidocqians: It is with mixed emotions that I report that the Lubbock Texas authorities have been able to positively identified the remains of Roger Scott Dunn, which were found last week near his late residence.! This is both sad and satisfying for the Dunn Family.!Scott’s father, Jim Dunn, VSM, has lived to see the recovery of his son’s remains and will now be able to give them a proper burial.! This will surely give him and his lovely wife, Barbara, relief.! Yet, this also opens old wounds and hurts. I ask that all of you keep the Dunns in your thoughts and prayers. And, I pray that Roger Scott Dunn will be Resting in Peace once and for all. Here is the link to the story from LubbockOnline: http://lubbockonline.com/filed-online/2012-05-23/investigators-identify-west-lubbock-remains-scott-dunn More from NCMIssingPersons.org - Finally At Rest - Roger Scott Dunn: http://www.ncmissingpersons.org/finally-at-rest-roger-scott-dunn/ The Vidocq Society helped solve the 1991 murder of 24 year old Scott Dunn when no weapon and no body could be found. The book, Trail of Blood, by Wanda Evans and Scott’s father James Dunn came out in 2005. Click to get the book Trail of Blood. 1 V I D O C Q S O C I E T Y Bookspan's Bullets by Jolie Bookspan, MEd, PhD, FAWM, VSM Each issue brings you summarized forensic news and education. Bookspan’s Bullets is dedicated to Frank Bender, VSM, who inspired and requested the column beginning in 1997. count.” The morgue is also designed with a lounge, a cafe and digital information panels to allow mourners to follow the washing and wrapping of the dead in accordance with Islamic tradition. Click each source for more: Ga Coffins Honor the Dead The Way They Lived Coffins of the Ga tribe, of the West African country of Ghana, are large brightly colored art forms reflecting an aspect of the person’s life, trade, status in the tribe or family, a clan totem, or things the person loved. Ga coffins are hand-made for each person and may be a carpenter’s plane for a carpenter’s burial, a fish for a fisherman, sewing machine for a seamstress, a treasured automobile, a coca cola bottle, a lobster, a chicken, onion, shoe, a vice like beer or cigarettes. The Ga people want to honor their dead in ways that celebrate the way they lived. Ga coffins are also called figurative coffins or proverbial coffins - abebuu adekai. Click each source for more: - Sources: TurkishClass OptimistWorld DNA Fingerprinting For Wine, Rice, & Drugs Wine producers are using DNA fingerprinting to identify which grapes have gone into making each wine, to be able to guarantee authenticity. Pharmaceutical manufacturers are working on DNA fingerprinting for medicines to identify counterfeits more readily. Chefs at a hotel in India use DNA labeling to identify types of basmati rice delivered to know optimum cooking settings. - Sources: Neatorama Wikipedia - Source: Itodt - Interesting Thing of The Day Washington Post Watch a short movie: http://www.ghanatoghana.com/Ghanahomepage/ghana-coffi ns-world Forensic DNA Detects Illegal Whale Meat DNA detective work found that sushi restaurants in Los Angeles, USA, and Seoul, South Korea, illegally sold whale meat from Japan. Analyses of sequences confirmed that the products included three species of whale protected from international trade. The findings resulted in police raids on the restaurants. Japan, Iceland and Norway say they can prevent smuggling by matching the DNA of whale meat sold in markets to a register of all legally caught whales, however, those countries have, so far, refused to make their DNA registers public. - Source: Biology Letters, DOI: 10.1098/rsbl.2010.0239 Turkish Morgue Installs Alarms So Still-Living Can Signal and Escape A mortuary in Malatya, in rural eastern Turkey, has outfitted their morgue with alarms and electronic motion detectors that can, “detect the slightest movement by a living person emerging from a coma or long period of unconsciousness… and send out an alarm” in case any of the bodies have been declared dead by mistake. The 36 refrigerators also have interior door handles. A system at the feet of the supposed deceased can open the refrigerator in case of contact, allowing the occupant to climb out. Akif Kayadurmu, head of the municipal funerals service, told the state news agency Anatolia, “The resurrections may be rare but we have taken every possibility into ac- Researcher Contact: [email protected] 2 Continued on Next Page V I D O C Q S O C I E T Y Bookspan's Bullets By Dr. Jolie Bookspan, VSM Continued from Previous Page fingerprint into two parts. The first contains ridge patterns, the second has distinctive features such as the point at which two ridges merge. Combining one part of each print creates a new and unique print for authentication. Can Computers Catch a Lie from Eyes Alone? Researchers at the University at Buffalo, State University of New York (U.B.), claim their video-analysis software can analyze eye movement successfully enough to identify if a subject is lying 82.5 percent of the time. Counterintelligence special agent Joe Navarro comments on fundamental flaws with the study: “One problem with this research is its over-reliance on the face as the only place to evince information from the body. I can tell you as an investigator and somebody who’s studied this not just superficially but in depth, you have to observe the whole body; it can’t just be the face,” he says, adding that a failure to take body language into consideration could lead to “an inordinate amount of false positives.” - Source: New Scientist 17 December 2011 issue 2843. - Researcher Contact: Arun Ross RC Byrd Associate Professor, West Virginia University and Asem Othman. +1-304-293-9135 [email protected] http://www.csee.wvu.edu/~ross/ Dr. Bookspan loves good science. Send forensic jokes, quotations, websites and stories for possible inclusion in “Bookspan’s Bullets.” - Source: Scientific American. Comments by readers of the linked story are also helpful. Editors recommend checking them. Email: Bookspan’s Bullets Laser “Unprinter” Removes Ink from Copies Engineers at the University of Cambridge have developed a process to “unphotocopy” by removing toner ink from paper. Short laser pulses heat printed words and images until they vaporize, erasing them. The engineers say the process works with common papers and toner inks, and is more eco-friendly than recycling. NoirCon By William L. Fleisher, VSM, Vidocq Society Commissioner - Source: Leal-Ayala1 DR, Allwood JM, Schmidt M, & Alexeev I. Toner-print removal from paper by long and ultrashort pulsed lasers. Proceedings of The Royal Society A journal. 2012, doi: 10.1098/rspa.2011.0601 I would like to introduce you to Noir Con 2012. Noir Con is a mystery fan’s delight. They will be honoring the memory of our own Frank Bender at their upcoming convention. !Run by Lou Boxer and Deen Kogan, the organization has been big supporters of the Vidocq Society, and I invite our members to learn about this great event at www.noircon.info. Researcher Contact: J. M. Allwoo: [email protected] Dates: 8-11 November 2012. Location: Society Hill Playhouse. Philadelphia, Pennsylvania, 19147. Contact: (215) 923-0210. Online Registration: http://www.noircon.inføp/noircon-2012-registration-f orm.html Merge Two Fingerprints to Create Novel Authentication A software technique developed at West Virginia University in Morgantown, blends two fingerprints to create a third, which could provide a solution to fingerprint copying for purpose of data hacking. New software splits a 3 V I D O C Q S O C I E T Y News of Vidocq Members Origins of Vidocq Motto Veritas Veritatum Hon Lynne Abraham Lectures at College of Physicians By William L. Fleisher, VSM, Commissioner By the Editors Albert Laurilliard, VSM, gave us “Veritas Veritatum” as our motto. It is from a medieval collection of poetry called the Carmina Burana, Latin for “Songs from Beuern” (short for Benediktbeuern). Composer Carl Orff later wrote music based on 24 of the poems. Here is the Latin and English text: The Honorable Lynne Abraham appeared at The College of Physicians of Philadelphia, Tuesday, 17 April, 2012, to give the annual Robert L. Sadoff, MD, FCPP Lecture: A Prosecutor Takes a Hard Look at Ethical Issues. She discussed ethical issues she believes are essential for prosecutors to embrace and practice. Ms. Abraham called on her years of service as both Common Pleas Judge and District Attorney of Philadelphia to illustrate her concerns. The Honorable Lynne Abraham, is a partner in Archer & Greiner, PC. Veritas veritatum, via, vita, veritas, per veritatis semitas eliminans peccatum! te verbum incarnatum clamant fides, spes, caritas, tu prime pacis statum reformas post reatum, tu post carnis delicias das gratias, ut facias beatum. o quam mira potentia, quam regia vox principis, cum egrotanti precipis: surge, tolle grabatum! Vidocq Member Badges Members who wish to have Vidocq member badges, contact: Rosa Lazinger [email protected] Vidocq Society Truth of truth, The Way, the Life, the Truth Who by the strait paths of thy Truth Drivest our sin beyond the threshold of our door, To thee, Incarnate Word, Faith, Hope, and Charity Continually do cry Thou who dost set thy prisoner at thy bar and then Makest him a man again, And for that forespent carnal ecstacy Givest such grace, That he accounts him blessed. O miracle of strength! O kingly word, That once a sick man heard ‘Arise, take up thy bed, and ‘go thy way.’ -------Full text here Carmina Burana Manuscript photo from Wikipedia Carmina Burana album photo by the NJ Symphony Cost is $10. Ms. Lazinger can advise style and ordering details Healthy Wishes Our thoughts to Vidocq members Bill Kelly, Donna Fontana, Joe McGillen, and others who wish to keep their names private during their recovery ~ Your Friends and Colleagues at Vidocq Society 4 V I D O C Q S O C I E T Y Vidocq Annual Awards Banquet You are cordially invited to the Annual Awards Dinner Sunday, 30 September, 2012 6:00 p.m. To 11:00 p.m. Held at the Luxurious Pen-Ryn Mansion 1601 State Road, Bensalem, Pa. 19020 Telephone: 215-633-0600 Hors d’Oeuvres, Top Shelf Open Bar: 6:00 p.m. to 7:00 p.m. Seating 7:10 p.m. Main Course Including Vegetarian Sweet Desserts, Coffee & Tea Presentation and Awards Dancing, Port Wine and Fine Cigars Guests Encouraged Black Tie or Dress Uniform Suggested Kindly RSVP no later than 1 August, 2012 with names of attendees and your check for $125.00 each person Send payments to: Vidocq Society Second Floor 1704 Locust Street Philadelphia, PA 19103 Banquet information: Contact Banquet Chairman Joseph M. O’Kane, VSM [email protected] (215) 322-2279 Purchase advertisements for the Awards Program. Sell $1000.00 in ads, receive two dinner dance tickets: Contact Treasurer Zeff Lazinger [email protected] (484) 362-8800 5 V I D O C Q S O C I E T Y Digital Forensics with Peter Stephenson, PhD AntiSec and Anonymous – The New Cyber Terrorism By Peter Stephenson, PhD, VSM, CISSP, CISM, FICAP still in place today. Mark’s definition of cyber terrorism is: “Cyberterrorism is the premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub national groups or clandestine agents.” I have been told by people who are supposed to know better, that there is no such thing as cyber terrorism. After all, terrorists kill people - lots of people – and who ever heard of someone being killed by a computer? Well, I really could not disagree more. I am well known in the information security community for opposing “Chicken Little” “the sky is falling” pronouncements. There is more than enough hype in today’s journaltainment to satisfy even the most depraved gossip-monger. What passes for news and journalism in this age of sound bites and commercials that exceed the programs they sponsor in duration is, in my view, an embarrassment to every American journalist. That said, this is the real deal. Cyber terrorism is a genuine threat to our nation and our way of life and, yes, people can get killed. I like that. It covers the bases and it does not say that thousands of people need to be killed, maimed or deprived of their property in order for there to have been a cyber terrorist attack. We do need to think a bit about “violence” but I’ll get to that momentarily. What is AntiSec? AntiSec is one of today’s big cyber buzzwords. Believe it or not, it does have a real meaning, unlike many buzzwords that fit in that category of pure hype and that sprang unbidden out of some would-be journalist’s imagination. AntiSec is a movement that opposes security of information and computing systems. More accurately, AntiSec is the philosophy behind Operation AntiSec. For that definition, let’s get it straight from the horse’s mouth: In a paper I wrote some years ago I attempted to define terrorism and found that, if one examines the laws and treaties of other nations, one find a wide disparity in definitions – over thirty, in fact. If we cannot define terrorism clearly, how are we to define cyber terrorism? What I did find, however, was that there are some elements that all definitions seem to have in common. Those elements include, but certainly are not limited to, acts against non-combatants, acts intended to terrorize or cause wide-spread fear, acts that are ideologically motivated, and acts carried out by sub-state groups or agents. That said, of course these definitions are very contemporary and if one looks at the history of terrorism one finds that those elements have not always been present. For example, during the Russian Revolution it was not uncommon to see terrorist acts carried out against the Czar and the ruling regime. “Operation Anti-Security, also referred to as Operation AntiSec or #AntiSec, is a series of hacking attacks performed by members of hacking group LulzSec, the group Anonymous, and others inspired by the announcement of the operation.” Going a bit further into the motivation behind the movement: “The groups involved claim that the operation aims to protest government censorship and monitoring of the internet. LulzSec members also mention ending what they believe are corrupt racial profiling and copyright laws as a goal of the operation.” So, given that we still need a working definition of cyber terrorism, at least for the purposes of this article, I will take one from my old friend and colleague, Mark Pollitt. Mark is a retired FBI special agent and he started the FBI’s digital forensic units – the CARTs – and the regional computer forensic lab system, both of which are 6 Continued on Next Page V I D O C Q S O C I E T Y AntiSec and Anonymous – The New Cyber Terrorism Continued from Previous Page Cyber Terrorism and AntiSec Let’s return to FBI Special Agent (ret) Pollitt’s definition. It has three elements: What kinds of actions does Operation AntiSec carry out? “LulzSec [a leading proponent of the AntiSec movement] launched the first attacks of the operation against the Serious Organized Crime Agency, the national law enforcement agency of the United Kingdom that handles cybercrime.” • • • What about an example of Operation AntiSec? Here is one from one of the other major proponents of the AntiSec movement: The premeditated, politically motivated attack against information, computer systems, computer programs, and data Results in violence against noncombatant targets By sub national groups or clandestine agents Let’s take them on at a time. Premeditated: certainly there is no doubt about this one. The core groups in Anonymous and LulzSec announce their intentions broadly to the world using many different venues such as YouTube, Facebook and Twitter. They appear behind grinning masks intended to represent Guy Fawkes, plotter against English Parliament in 1605. They proclaim in ominous droning tones that we all should fear them. And then they announce their intentions. “We have used a Distributed Denial of Service (DDoS) campaign to draw attention to abuses of power and the criminalization of dissent. Some of us participated actively in these attacks, and while we are aware of the severity of those actions, we believe they were in service of a greater good. Operation Payback aimed to tarnish the public image of those entities who aided in the attempted censorship of WikiLeaks. The carefully chosen targets included Visa, Mastercard, Postfinance Switzerland, and PayPal.” Politically motivated? Certainly no doubt about this one either. Looking at the quotes above and taking a cursory tour of the Operation AntiSec, Anonymous and LulzSec web sites that much is very clear; in-your-face clear, in fact. Although the movement claims to oppose various government crimes against the people – censorship, suppression of dissent, etc. – it can hardly be denied that taking down Mastercard would have an impact on noncombatants. Anonymous claims that no card processing was hampered, but that probably is arguable. Against information, computer systems, computer programs and data… this is a no-brainer. It is the declared target of these individuals. Violence against non-combatant groups? This one is not quite so clear. In fact, it appears that the proponents of Operation AntiSec are rather indiscriminate when they target. Sometimes, as in the MasterCard attacks the target is arguably non-combatant. Sometimes the target is the government but certainly not a combat component of the government. And sometimes it is against a government agency that is, again arguably, a combatant group in that it support the armed military. So, who are Anonymous and LulzSec? They claim to be everyone. They are not organized. They operate in cells – though they do not characterize themselves in that manner – of one to a few individuals. They do not claim to be hackers. However, the key individuals in these organizations who have been arrested are, in fact, very competent hackers. They claim to be pervasive and, certainly, the lay public believes that. One organization claimed that Anonymous is among the most influential organizations in the world. That may or may not be true but they certainly are a force with which to reckon. But most important, why do I claim that they are cyber terrorists? Certainly there have been lots of attacks against law enforcement but whether that constitutes a combatant group is a good topic for debate. One of the most egregious activities of Operation AntiSec is “doxing”. 7 Continued on Next Page V I D O C Q S O C I E T Y AntiSec and Anonymous – The New Cyber Terrorism Continued from Previous Page Doxing is the systematic collection of personal and professional information about an individual and his or her family. It can include emails, personal address and phone numbers, information about the individual’s family including children and anything else that can build a portfolio or dossier on the person. This collection of documents (or “docs”, hence the term “doxing”) then is made public. At the least, it can be embarrassing. At worst, it can cost the individual his or her life and have catastrophic impact on the individual’s family and job. Law enforcement officers often are the targets of doxing attacks. “During the past 15 years, technological innovation and globalization have proven to be an overwhelming force for good,” Obama said in the introduction to the strategy. “However, transnational criminal organizations have taken advantage of our increasingly interconnected world to expand their illicit enterprises.” Those are the facts. That same interconnected world also provides a conduit for terrorism and subsequent murder on a grand scale. Imagine, for a moment the additional lives that would have been lost on 9/11 if hackers had disabled the traffic light system, the ATM banking machines, the 911 phone system, the emergency dispatch system, the subway management system and the air traffic control system all in support of the 9/11 terrorists. Believe it or not – and you really should believe it, because it is a fact – the ability to do all of this was available in 2001. This is what is called a force multiplier and it is absolutely the most frightening aspect of cyber terrorism. Sub national groups or clandestine agents. No question here. Unless Anonymous became a sovereign state while I wasn’t looking this fits them to a tee. So What? So what does this mean to us in the crime solving business? It means that there is a new troublemaker in town. And this time it is a really bad bunch of dudes. It means that more and more there are cyber components to the crimes we strive to solve. That much is an object lesson for us and, for now, it sounds as much a philosophical warning as it does a practical one. For those of us concerned specifically with cybercrime it is the here and now. No Chicken Little for us. For the rest of our colleagues it is, for now a cautionary tale. Is Operation AntiSec cyber terrorism? Certainly it is. Is it effective? Many argue that it is superbly effective. Can we combat it? Only if we understand it and respond accordingly. Is the sky falling? Not yet, but I did feel something hit my head recently. Might just have been a nut from a squirrel in the tree I was walking under, but, unfortunately, today those are not the only kinds of nuts we need to be concerned about. But there really is a bit more to it than that for all of us – and this is the “cautionary tale” part: this is the future. It is with us and it is going to stay with us. There will come a day – not too far in the future, I fear – when groups such as Anonymous evolve way past the stage of hactivism - a term, the validity of which I am prepared to debate on the grounds that it is, in my view, an excuse for terrorism, hooliganism and criminal activity in cyberspace – an enter the stage of full-blown terrorism and organized criminal enterprise. That day is nearly here. Indeed, some would argue that it is here and has been for some time. When this crime wave hits us, we need to be ready for it. I don’t care what your politics are, this statement by President Obama when he unveiled his strategy to combat transnational organized crime is right on the money: Until next issue…… Dr. Peter Stephenson, VSM, CISSP, CISM, FICAP, holds a PhD in digital investigation and a Master’s Degree in diplomacy with a concentration in terrorism. He is the director of the Norwich University Center for Advanced Computing and Digital Forensics and is an Associate Professor of cyber investigation at that university. 8 V I D O C Q S O C I E T Y Books and eBooks By and About Vidocq Members - www.Vidocq.org/books Effective Interviewing and Interrogation Techniques, Third Edition, by Nathan J. Gordon and William L. Fleisher. A practical manual providing the forensic practitioner/investigator critical insight into human behavior, enabling one to become a better interviewer, interrogator and, most importantly, an expert detector of truthful and deceptive behavior. Gordon and Fleisher have created a one-stop guide to mastering the art of credibility assessment during an interview, with successfully tested techniques for obtaining a confession from guilty suspects. Forensic practitioners, law enforcement, the intelligence community, the private security sector, attorneys, and forensic and criminal justice students will all find this volume a valuable resource. • The only book to address FAINT, IIT, and MITT in one source • Enables the interviewer to obtain a confession that can stand up in court • Includes an online workbook with practical exercises to assist the reader The third edition expands chapters on torture, assessing the interview, statement analysis, MITT, and interrogation. It contains new chapters on passenger screening, and report writing, along with new case studies. Also covered are ways to maximize the collection of information from a prospective employee, and legal considerations. The Forensic Assessment Interview Technique (FAINT) and the Integrated Interrogation Technique (IIT) were developed at the Academy for Scientific Investigative Training and are used by forensic practitioners and investigators to detect truthful or deceptive behavior. FAINT is applicable to all forensic type interviews and incorporates the assessment of nonverbal behavior, projective analysis of unwitting verbal cues, statement analysis and the Morgan Interview Thematic Technique (MITT). This volume teaches how to combine, apply and quantify these techniques to reach a numerical conclusion to the truthfulness of the interviewee. Order here in hardcover and Kindle. Cold Case Homicides: Practical Investigative Techniques by Richard H. Walton, EdD, VSM, provides effective and accessible information to those responsible for investigating and resolving previously examined, but still unsolved, cold case homicides. The book merges theory with practice through use of case histories, photographs, illustrations, and checklists that convey essential, fundamental concepts, while providing a strong, practical basis for the investigative process. It combines proven techniques from forensics, psychology, and criminal investigation, and focuses on technologies that may not have been available at the time of the crime. This guide defines the characteristics of a cold case homicide; details various investigative methods used by law enforcement agencies; explores the actual experiences of detectives in reopening case files; and presents current technologies such as ViCAP, HITS, and TracKRS used in the identification of cases related to the reopened case, or its perpetrator. It also highlights technological changes that contribute to law enforcement's abilities to solve cold case homicides, such as computerized print technology, the specificity of DNA, and the expanding data banks that enable the linkage of previously unknown suspects to the crimes they committed. Available for order in hardcover and Kindle. Submit Books By and About Members for Listing in the Vidocq Journal Include: !Graphic of Cover !Synopsis !Author Bio and Member Status Email Dr. Bookspan, Science Editor 9 Continued on Next Page V I D O C Q S O C I E T Y Vidocq Society in Print: Books By and About Members Continued from Previous Page Deadly Betrayal: The CBS Murders is based on an actual major, high-profile investigation, told from the inside by FBI man Don Richards, VSM. “An undercover agent is killed in a Chinese Tong gangwar and FBI Supervisor Dan Robertson can't prove the operation was authorized. He is set up as the scapegoat, and told to involve himself in a safe white collar fraud case until things get sorted out. But that case is far more sinister, and soon Robertson finds himself partnered with NYPD Detective Richie LeBeau in a complex multiple murder investigation which might connect to the Tong. Overcoming personal clashes, inherent distrust, agency rivalry, and leaks to the media, they use every crimesolving and forensic technique to identify the killer, and build their case. When sharp legal maneuvering threatens to dismantle their work and free the killer, they must find a way to resurrect the case and bring justice to a terrible crime.” Click to order Deadly Betrayal. The Murder Room. Michael Capuzzo introduces the founders of the Vidocq Society, talented courageous sculptor Frank Bender, Commissioner William Fleisher, and criminal profiler Richard Walter. Learn what inspired them to help solve cold case murders. Click to order in Print, Kindle Edition and Audio Versions. The Girl With The Crooked Nose by Ted Botha. Tells of Frank Bender’s work as a forensic artist and founding member of the Vidocq Society, to bring attention and resolution to hundreds of neglected murders of women near Ciudad Juarez, Mexico. From this work, Frank and his daughter Vanessa have donated time and talents to assist the Ni Una Mas project (Not One More). Click to order The Girl With The Crooked Nose. In Someone’s Daughter, historian Silvia Pettem tells of a young woman, known only as "Jane Doe," found murdered in 1954 in Colorado. Pettem spurred the Vidocq Society and Boulder County Sheriff’s Detective Steve Ainsworth to find the woman's name and killer. Several Vidocq members selflessly volunteered resources and time: Dr. Richard Froede and Frank Bender did skull and facial reconstructions. Dr. Walter Birkby, Dr. Robert Goldberg, and Dr. Terry Melton worked on DNA. Fred Bornhofen coordinated. Many others contributed. In October 2009, DNA comparison with a surviving sister confirmed Jane Doe's identity as Dorothy Gay Howard, an 18-year-old missing from Phoenix, Arizona. Click to order Someone’s Daughter. In Trail of Blood, The Vidocq Society helps solve the murder of 24 year old Scott Dunn. Scott's parents never gave up when his killers left no body, no weapon, only blood, so much blood. “When Jim Dunn got the heart stopping call every parent dreads: "Your son has disappeared" on a Sunday night, it set into motion a six year nightmarish odyssey of desperate searches. Dunn turned to Richard Walter of the Vidocq Society, forensic pathologist and criminal profiler, who consulted Scotland Yard, studied DNA evidence and blood spatter patterns, and then pointed out who he deduced killed Scott Dunn, and why.” Click to order Trail of Blood. 10 Continued on Next Page V I D O C Q S O C I E T Y Vidocq Society in Print: Books By and About Members Continued from Previous Page I Have Lived in the Monster: Inside the Minds of the World’s Most Notorious Serial Killers by Robert K. Ressler and Tom Shachtman. Agent Ressler, who coined the term “serial killer” in the 1970s, recounts his years since leaving the FBI, working as an independent criminal profiler on some of the most famous serial murder cases of our day. Piecing clues from crime scenes, along with killing patterns and methods, Ressler explains his role assisting investigations of such perplexing international cases as England’s Wimbledon Common killing, the ABC Murders in South Africa, and the deadly gassing of Japan’s subway. We’re also witness to Ressler’s fascinating, in-depth interviews with John Wayne Gacy, plus a shockingly candid discussion with “cannibal killer” Jeffrey Dahmer. Click here to order. Investigating Religious Terrorism and Ritualistic Crimes by Dawn Perlmutter, VSM, director of Symbol & Ritual Intelligence, is the first complete resource to assist in crime scene identification, criminal investigation, and prosecution of religious terrorism and occult crime. It analyzes occult and religious terrorist practices from each group’s theological perspective to help you understand traditional and contemporary occult groups and domestic and international terrorist religions, demarcate legal religious practice from criminal activity, and acquire techniques specific to occult and terrorist religion crime scene investigation. Click here to order in hardcover and Kindle. Investigating Computer-Related Crime, Second Edition (2004) by Peter Stephenson with NEW Third edition coming soon. Written by an information security specialist, this second edition of Investigating Computer-Related Crime discusses cybercrime, its investigation, and the difficulties encountered by both public law enforcement officials and private corporate investigators. The book offers insights into collecting evidence, interrogating suspects and witnesses, handling crime in progress, as well as issues involving the authorities, and helpful case studies. Updated chapters incorporate new kinds of attacks, current work of the Digital Forensic Research Workshop and their investigative model, new operating systems, the impact of the Patriot Act, and new ways of analyzing computer media. 448 pages. Order here in hardcover edition and here for Kindle electronic version. Sexual Homicide: Patterns and Motives by John E. Douglas, Ann W. Burgess, & Robert K. Ressler. This authoritative book represents the data, findings, and implications of a long-term F.B.I.-sponsored study of serial sex killers. Specially trained F.B.I. agents examined thirty-six convicted, incarcerated sexual murderers to build a valuable new bank of information which reveals the world of the serial sexual killer. Data was obtained from official psychiatric and criminal records, court transcripts, and prison reports, and from extensive interviews with the offenders. Detailed information is included on the FBI’s Violent Criminal Apprehension Program (VICAP) along with a sample VICAP Crime Analysis Report Form. Attention is given to child/adolescent formative events, societal perceptions & pressures which may be motivational to sexual killers who exhibit aberrant thought patterns, deviant behavior, and aggression linked to sexual expressivity. 234 pages. Click to order in Kindle, paperback and hardcover. 11 Continued on Next Page V I D O C Q S O C I E T Y Vidocq Society in Print: Books By and About Members Continued from Previous Page sample standard operating procedures from three different agencies to use as a guide for setting up a cold case unit and a list of additional resources a department may look to for assistance. 264 pages. Click to order. The Unknown Darkness: Profiling the Predators Among Us by Gregg McCrary. McCrary’s 25 years in the Bureau have yielded over 1000 cases to draw upon. The 10 he describes in the book reveal the strengths and pitfalls of modern criminal investigation, including the siege of the Branch Davidian compound in Waco, the Buddhist Temple Massacre in Phoenix, Arizona, the search for the Scarborough Rapist (who eventually became a serial murderer), the prosecution of Jack Unterweger (an international serial killer who committed murders in Czechoslovakia, Austria and Los Angeles), the Sam Sheppard murder case and others. McCrary answers what happens at the crime scene, what kind of person does it take to grapple with the serial killers among us, and exactly how do we disarm the enemy. 400 pages. Click here to order in hardcover or paperback. Healthy Martial Arts by Jolie Bookspan, Med, PhD, FAWM is for all in law enforcement, military, athletes, and those who need to be in top shape and prevent injuries for work and life. Covers training techniques for all athletes, strength, abdominal training that transfers to Spec Ops (train like you fight), nutrition, flexibility, performance enhancement drugs and foods, soreness, injuries, breathing, spirit, speed, balance, joint stability, back, neck, and knee pain prevention, handling stress, making training and daily life healthy, brain power & mental exercise, wheelchair athletes, more. Dr. Bookspan is a sports medicine specialist, military scientist, 4th degree Black Belt, 2009 Master Instructor of the Year, and former full contact fighter inducted into the International Black Belt Hall of Fame. Healthy Martial Arts won Reader’s Choice Award of the International EUSA Martial Arts Association. Approx 200 photos. 228 pages. Click here to order from Amazon, or here (www.drbookspan.com/books) for print and eBook from the Author’s website. Cold Cases: An Evaluation Model with Follow-up Strategies for Investigators (Advances in Police Theory and Practice) by James M. Adcock and Sarah L. Stein, begins with a historical perspective on how cases get to the point where it appears all investigative leads have been exhausted, and includes a chapter on understanding the process of homicide and those who kill. Next, the authors explain the evaluation model, theories of the crime, evidentiary issues and concerns, informational and behavioral aspects relative to the crime and the participants in the crime, and documents investigative strategies for future efforts on the case. The third section discusses the investigation, questions investigators must ask, choice of interview/interrogation techniques based on the behavioral aspects involved, and how the growth in technology since the date of the incident might provide new opportunities to uncover clues. Finally, the authors suggest how investigators can maximize their efforts and obtain not just an arrest, but a conviction. Appendices include Diving Physiology in Plain English by Dr. Jolie Bookspan, former research physiologist for the U.S. Navy, inducted into the NAUI SCUBA instructor Hall of Honor. For divers, search and rescue teams, training departments. Clear information to understand (not memorize) physiology and medicine, and apply all to safer decompression, thermal, equipment, gas mixing, fitness to dive, rescue, and other protocols. Order from the Hyperbaric Society publisher, retail stores, or the author through website: www.DrBookspan.com/books. 12 Continued on Next Page V I D O C Q S O C I E T Y Vidocq Society in Print: Books By and About Members Continued from Previous Page The Ab Revolution by award winning research scientist Jolie Bookspan, MEd, PhD, FAWM, teaches a groundbreaking sports medicine method now used by athletes, military, law enforcement personnel, and top spine docs and rehab centers around the world. It trains spine and pelvic angle to neutral, quickly stopping a major source of lower back pain, and functionally strengthening abdominal and core during actual operations. Part I teaches neutral spine for back pain control in everyday life (no exercises needed). Part II covers functional strengthening from simple to the toughest you can get. No flexion that stresses discs or reinforces bent-forward posture. Change your knowledge of exercise, biomechanics, posture, back health, neutral spine, and what abdominal muscles do. New Third Edition Expanded - 114 photos and drawings in 124 pages, gym-bag 6x9” size. Click here to purchase from Amazon or here (www.drbookspan.com/books) for print and eBook from the Author’s website. Death Investigations (Jones & Bartlett Learning Guides to Law Enforcement Investigation) by James M Adcock, PhD, ! and Steve Chancellor. Each crime type requires a unique approach with distinct steps. This book presents the specific functions and processes necessary to accurately assess and document cases (Homicides, Suicide, Accident, Natural, and Undetermined). Click here to purchase. Stretching Smarter Stretching Healthier by military researcher Jolie Bookspan, MEd, PhD, FAWM. Not the same old stretches. Immediately helpful innovative techniques to retrain daily movement habits to make flexibility, mobility, and injury prevention built-in to daily life. Stop injuries and poor posture from bad stretching. Nearly 200 ilustrations guide you step-by-step. Click here for ordering from Amazon or www.drbookspan.com/books from the Author’s website. Fix Your Own Pain Without Drugs or Surgery by Jolie Bookspan, MEd, PhD, FAWM. Prevent pain common to enforcement work: Upper and lower back pain, neck, shoulder, rotator cuff, hip, knee pain, and foot pain. Ankle sprains, Achilles tendonitis, fasciitis, pronation, supination, and flat feet. Herniated/ bulging/ slipping/ degenerated discs, sciatica, swayback, lordosis, spondylolisthesis, SI joint, pinched nerve and impingement. Plus stories from real patients in each chapter illustrate what works, what doesn’t, and when. Drawings and photos illustrate concepts. Each page, of 330 total, has specific things to do, things to avoid, things to check for, and/or a story of people who did and didn’t fix pain and why. Click here to order from Amazon or here (www.drbookspan.com/books) from Author’s website. Health & Fitness - How to Be Healthy Happy and Fit for The Rest of Your Life, 3rd ed, by Dr. Jolie Bookspan. Very helpful if you have a desk job. 31 chapters of what works & what doesn’t for healthier body, spirit, and brain. Includes heart, cholesterol, diabetes, digestion, osteoporosis, body fat tests, weight loss, supplements and performance enhancing products, mental and emotional health. Full chapters on fixing discs, neck pain, upper and lower back pain, leg cramps, and headaches. Sections on knee and shoulder pain, ankle sprains. Funny Facts about the body, and an A to Z glossary. 379 pages all-in-one-source. Click here to order from Amazon or www.drbookspan.com/books from Author’s website. 13 V I D O C Q S O C I E T Y 2012 Meetings at Union League Meeting Reservations Next Meeting Dates in 2012 Please Mark Your Calendars Only Vidocq Society Members (VSMs) and their guests who are pre-registered and accompanied by members may attend Vidocq Society meetings. You must reserve your place with Ms. Gloria Alvarado at Vidocq, 215-545-1450, by close of business, the Monday before each meeting. There is a tight head count. Reserve By Close of Business For Meeting Date Jun 18 21 June July and August No Meeting Meetings are the third Thursday of each month at the historic Union League at 140 S. Broad Street, Philadelphia, PA, http://www.unionleague.org/. The Union League has a dress code; Business attire is required for both men and women—jackets and no jeans. Cost for the luncheon meeting is $35.00 per member and $40.00 for non-member guests. Both members and guests with reserved places will be asked to pay if they do not honor the reservation made for them. 17 September 20 September 1 August Awards Banquet Sunday 30 Sept 15 October 18 October 12 November 15 November December No Meeting Parking is available at reduced rate, courtesy of Ryan Shapiro, VSM. The garage is on Sansom Street opposite the Union League entrance, between Broad and 15th Street. Get your parking validation at the meeting. 14 V I D O C Q S C I E T Y Get In Shape - Self Defense The Vidocq Society Shotokan Karate Novice to Black Belt The Vidocq Society is a Nonprofit, 501c(3) corporation, which, by the terms of its charter, is a fraternal organization comprising professionals and nonprofessionals who meet in a social setting to discuss unsolved crimes. Our work is pro not consider sented to us. Our to act as a catalyst ance to law ento assist them in solving O Small class, Personal attention. Fitness, injury prevention, katas, confidence, self defense. bono and we do every case presole purpose is and provide guidforcement agencies these crimes. Mondays: 8:00 p.m. - 9:30 p.m. Thursdays: 7:30 p.m. - 9:00 p.m. 2nd Floor 2100 Chestnut Street Philadelphia, PA 19103 Entrance on 21st Street Opinions offered by our members are personal opinions offered in the spirit of cooperation and goodwill, based only upon the facts presented, and should not be considered formal or legally binding opinions of the Vidocq Society. Taught by: Paul Plevakas, Karate Sensei 3rd Degree Black Belt Black Belt Hall of Fame Telephone: (215) 778-2634 Email: [email protected] Website: www.PaulPlevakas.com Solve The Mystery K a r a t e Vidocq Society Journal A new mystery each issue The Vidocq Journal © Copyright 2012 Published by The Vidocq Society, Q. The fraud some consider to be the greatest fraud in publishing was perpetrated in 1981 when the German publisher Gruner and Jahr purchased the “Hitler Diaries.“ Three experts declared the diaries genuine based on handwriting. It was later revealed as a hoax. What was the crucial evidence? Super-sleuths, send your verdicts to Dr. Bookspan, science editor a 501 (c) (3) nonprofit organization Second Floor 1704 Locust Street Philadelphia, PA 19103 Voice: 215-545-1450 — Fax: 215-545-1773 — www.vidocq.org Subscription $100 per year Commissioner William L. Fleisher - [email protected] Deputy Commissioners Fred A. Bornhofen - [email protected] Benjamin J. Redmond - [email protected] Solution to Last Solve the Mystery: Q. What does the term "forensic" mean in Latin? A. “Before the forum.” In 44 B.C., Roman physician Antistius was summoned to examine the corpse of would-be emperor Gaius Julius Caesar. “Before the forum” - the place for judicial business - is where Antistius made his fateful decision. Communications Ed Tenuto - [email protected] Journal Paul D. Plevakas and Jolie Bookspan Plevakas, Editors Submissions to: Vidocq Editors 15
Similar documents
Vidocq Journal 2011 Quarter 2
Vidocq Society. We all have heard communicators referred to as “PR people.” Many titles are used synonymously to describe the communications practitioner such as: media relations person; press offi...
More informationVidocq Journal 2012 Quarter 1
have appeared throughout the development of truth verification. In the early 1900’s another Italian scientist, Vittorio Benussi, reported high degrees of accuracy detecting deception by monitoring ...
More informationVidocq Journal 2014 Quarter 3-4
The Vidocq Society Medal of Honor went to Philadelphia Homicide Lieutenant Phil Riehl and his crack team of detectives Howard Peterman and Gregory Santamala, who solved the recent murder of Connie ...
More informationVidocq Journal 2013 Quarter 1
Crimes the Experts’ Way” at Smithsonian’s Ripley Center. In the day-long program, members of the AAFS lectured on intriguing cases, reported what they had learned, and their professional motivation...
More informationVidocq Journal 2014 Quarter 1-2
New Jersey State Police. Since 1981, she has been providing assistance to New Jersey law enforcement agencies and county medical examiners in the forensic anthropological analysis of human skeletal...
More informationVidocq Journal 2015 Quarter 3-4
bag recorded through sound proof glass. The technology could be used for law enforcement, space research to recover sounds across space, where sound cannot travel, and more. - Source: MIT News http...
More information