Vidocq Journal 2012 Quarter 1
Transcription
V I D O C Q Vidocq S O C I E T Y Journal The Vidocq Society – Solving Unsolved Murders and Cold Cases Quarterly Journal Volume Twenty Three Number One 2012 The Boy in the Box Memorial Lie Detection by Nate Gordon Page 1 Pages 2 - 4 Bookspan's Bullets Fast Forensics With Dr. Bookspan Pages 5 & 6 Vidocq Members In The News Page 7 & 8 Skeletons In The Closet Page 9 Digital Forensics Peter Stephenson, PhD Pages 10 - 12 Memorial for the Boy in the Box By William L. Fleisher, VSM, Commissioner On Saturday 25 February, 2012, several of our members and their family attended a memorial service for “The Boy in the Box” at his resting place in Ivy Hill Cemetery. The memorial marked the 55th anniversary of this child being found on Susquehanna Road in Northeast Philadelphia. The service was led by Bill Kelly, VSM, who holds the distinction of being the longest living original investigator on this case. Also attending were VSMs, Jack Maxwell, Jack Downs, Craig Mann, Lou Cabrelli, Jim Fitzgerald, Len Lebowitz and myself, as well as Bill Kelly’s daughter Kathy and her husband, Ed Greene, Bill’s grandchildren, Kevin Kelly and Jessica Greene, and Lou Cabrelli’s grandson, Jordan. Vidocq Society members have been receiving leads for years regarding this case, and our members are following them up. Someday soon, I hope we help get this case solved. – America’s Unknown Child website maintained by the Vidocq Society: http://americasunknownchild.net V I D O C Q S O C I E T Y Lie Detection: The Past – The Present – The Future By Nate Gordon, VSM In 1895, Cesare Lombroso, considered the father of modern criminology, is credited with performing the first instrumental lie detection examination for a police department in Italy. The case involved the murder of a young boy. Lombroso used a device that measured changes in blood flow in the suspect’s hand as Lombroso showed him pictures of several young boys, one of which was the victim. Lombroso theorized that if the suspect was innocent none of the pictures would hold any meaning on threat to the suspect. However, if the suspect was the murderer Lombroso anticipated, a sudden increase in blood flow to the hand as the sympathetic nervous system innervated due to the suspect’s threat upon seeing the boy he had murdered. Single parameter devices such as that mentioned above have appeared throughout the development of truth verification. In the early 1900’s another Italian scientist, Vittorio Benussi, reported high degrees of accuracy detecting deception by monitoring changes in a suspect’s breathing. Around the same time, an American attending Harvard University, William Marston, published a dissertation where he reported high degrees of accuracy by monitoring discontinuous changes in systolic blood pressure. In 1921, a Berkley California police officer, John Larson, under the direction of Chief of Police August Vollmer, decided to combine the work of Benussi and Marston and developed a two pen polygraph instrument, believing that the more physiological data he could collect the greater his accuracy would be in verifying truth. Unlike Marston’s discontinuous method, Larson’s new instrument collected continuous changes in cardiovascular activity. By the 1930’s, a third parameter, Galvanic Skin Response was added to the polygraph which monitored changes in the suspect’s resistance to a minute electrical current, below the threshold of feeling, that was introduced through the instrumentation. The three physiological parameter polygraph became, and still is, the “gold standard” for truth verification. Today, most exam- iners are using computerized systems that also offer several scoring algorithms for quality control. Lafayette Computerized LX-4000 In the 1970’s single parameter instruments that monitored changes in the voice to detect deception began being produced. Based on the non verbal research of Paul Eckman, a California professor, a computerized system to detect deception based on micro facial expressions was offered. Lawrence Farwell introduced a “Brain Fingerprinting” system to detect deception by brain waives indicating previous memory of an event. Since the attacks of 9/11 we have seen the introduction of thermal imaging to monitor facial blood flow changes and the use of functional magnetic resonance imaging (fMRI) to look for differences in brain activation between suspect’s telling the truth and lying. In 2008, the U.S. Government introduced the Preliminary Credibility Assessment Screening System (PCASS); a hand held device that monitored electro dermal and cardiovascular activity to be used by interviewers in Iraq and Afghanistan. The questions become, “Where will the search for truth lead us in the years to come?” and, “Will truth verification be accepted in courts throughout our land?” Continued on Next Page V I D O C Q S O C I E T Y Lie Detection: The Past – The Present – The Future Continued from Previous Page Larson’s initial premise in the 1920’s that the more physiological data he could monitor the greater his accuracy of detecting deception would be appears to be correct. If we look at the present “gold standard” of lie detection, the polygraph, we have an instrument that monitors respiration, skin resistance or conductivity, cardiovascular activity and deliberate attempts at physical distortions. It is the synergy of these physiological parameters that make the polygraph the most accurate method of detecting deception available today. None of these parameters independently attains the accuracy obtained when they work together. The U.S. Government has looked at every voice stress device available and sadly has found none to be much better than chance. The use of Dr, Farwell’s “Brain Fingerprinting” can only detect deception if a person has memory of an event they are denying to have engaged in. It therefore has limited application. The accuracy of thermal imaging is reported to be in the mid 80%. In Pentagon tests with basic trainees and civilians, the PCASS device was correct in 62, 63 and 79 percent of the cases. The Pentagon touts a higher number; setting aside cases where the machine couldn't make a decision. In initial experiments the author was involved in performed by Truth Test Technologies, twelve volunteers were tested on whether or not they had fired a gun in a hospital environment. Half of the group had actually fired a gun and were instructed to deny it. Half the group had been told a gun had been fired and they were a suspect. All were told they would be interviewed and then given polygraph and fMRI examinations to determine their truthfulness. They were also told that if they were determined to be truthful they would receive an additional monetary reward. Thus, all volunteers were motivated to come out truthful, which mimics real life testing where both the innocent and guilty suspects desire to be determined truthful. The polygraph resulted in one “Inconclusive” determination and all determinations made of truth or deception were correct. With the “Inconclusive” result viewed as error, the polygraph had 90% accuracy. The fMRI results showed areas of frontal lobe (medial, inferior and superior frontal gyrus), temporal lobe , and limbic lobe (anterior cingulate) to be significantly active during the deception process. However during truth telling, no significant activation regions were seen in the brain at high thresholds. The fMRI studies done to date claim to show accuracy rates approaching the polygraph. There are three major groups involved in these studies (Truth Test Technologies, CEPHOS and No Lie fMRI) and who have begun offering fMRI detection of deception examinations in the United States. Only one of these groups, Truth Test Technologies (T3) has used a synergetic approach, combining the data obtained from the fMRI with the data from the polygraph. I believe that this will create a new procedure that could become the future “gold standard” for truth verification. These results strongly suggest that there may be unique area(s) in the brain involved in the truth-telling or deception process that can be measured using fMRI. These preliminary results were encouraging and clearly indicated the need for further investigation. Continued on Next Page V I D O C Q S O C I E T Y Lie Detection: The Past – The Present – The Future Continued from Previous Page Even more interesting, when the data from the fMRI was merged with that from the polygraph the “Inconclusive” result was eliminated and there was 100% accuracy in determining truth or deception. A second replica study using a greater number of subjects is now underway. With the advent of a new truth test showing accuracy rates for both innocent and guilty suspects in the mid to upper 90% range, supported by scientific research it is hard to question how it would not receive greater admissibility in the courts of our land. Currently the State of New Mexico allows polygraph evidence to be admitted by either side, 19 states allow polygraph testimony only by stipulation, and the remaining states do not permit polygraph evidence citing the 1923 Frye v. United States decision. Alphonso Frye was arrested in the homicidal shooting of a Washngton D.C. physician. He gave the police a confession which he later recanted. The defense hired William Marston to perform his “Discontinuous Blood Pressure Test.” This test consisted of Marston placing a standard blood pressure cuff on a suspect and periodically during an interview inflating it and taking systolic blood pressure measurements. Bear in mind, that by 1923, Larson had already introduced an instrument that recorded continuous changes in blood pressure as well as continuous changes in respiration. It is not surprising that the Supreme Court ruled the “Discontinuous Blood Pressure Cuff” inadmissible because it had not met “general acceptance” of the field from which it came. In the case Daubert v. Merrell Dow Pharmaceuticals Inc. US, CA, 1993, the Supreme Court ruled that the “Rigid ‘general acceptance’ requirement for admission of scientific evidence would be at odds with ‘liberal thrust’ of Federal Rules of Evidence and their general approach of relaxing traditional barriers to ‘opinion’ testimony,” referring to the Federal Rules of Evidence 702. This rule states that the judge must decide if the scientific evidence or testimony is both relevant and reliable. This allows for polygraph evidence to be admitted in Federal Court based on the judge’s decision. The future of truth verification seems to clearly be directed toward adding other psychophysiological data to that which is currently being collected by the polygraph. This was recently demonstrated by the U.S. Governments Department of Defense Polygraph Institute (DoDPI), which trains all Federal examiners, changing its name to the Defense Academy for Credibility Assessment (DACA). What additional psychophysiological data the truth test of the future will monitor is still a work in progress. However. it appears that Larson’s initial instinct, that more data produces higher rates of accuracy was correct. References: Lombrosso C. (1895). L’Homme Criminel (2nd French Edition). Trovillo, Paul Y. (1939). A History of Lie Detection. J. Criminal Law, Crim Pol Science, 29, 848–81; 30, 104-109. Matte JA. (1996). Forensic Psychophysiology; Using the Polygraph. JAM Publications, Williamsville, NY. Gordon, NJ & Fleisher WL. (2002). Effective Interviewing and Interrogation Techniques. Second Edition. Elsevier Academic Press, San Diego, CA. Mohamed F, Faro S, Gordon N, Platek S, Ahmad H, & Williams J. (2006). Brain Mapping of Deception and Truth Telling about an Ecologically Valid Situation; An fMRI and Polygraph Investigation. Radiology, 238:2. Gordon, Mohamed, Faro, Platek, Ahmed, & Williams. (2006). The Integrated Zone Comparison Polygraph Technique Accuracy with Scoring Algorithms. Physiology and Behavior, 87, 251- 254. Nathan J. Gordon, VSM, is on the Board of Directors of the Vidocq Society, and is head of the Academy for Scientific Investigative Training - An American Polygraph Association accredited polygraph examiner training school. V I D O C Q S O C I E T Y Bookspan's Bullets by Jolie Bookspan, MEd, PhD, FAWM, VSM Bookspan’s Bullets is dedicated to Frank Bender, VSM, who inspired and requested the column beginning in 1997. Each issue brings you summarized forensic news and education. Bent Forward Seated Restraint Increases Death Risk Prisoners have died following restraint in a bent forward position. Studies of the restraint technique of holding detainees bent forward while seated show greatly reduced lung capacity. In an initial study, researchers from Coventry University led by Dr. John Parkes, compared lung function during four restraint positions with a control position of standing. They found that participants restrained prone (face down) with the restraining person pressing their upper torso and/or in a flexed (bent forward) seated position had reduction in lung function. Following up on their work, in another study they placed 40 volunteers in chairs bringing their face close to the lap, with no additional pressure applied to their back. Significant reduction in lung function still occurred, greater in participants with higher body mass index (BMI). In the worst case, lungs capacity was almost halved. Researchers concluded, "Seated restraint positions with the person leant forward may increase the risk of harm or death during prolonged restraint. The risk will be further increased where the person exhibits higher BMI." All study volunteers reported they felt they could not breathe, and many felt alarmed. Volunteers with a larger waist found it hardest to breathe. Dr. Parkes stated that the research found that the position, rather than the restraint by itself, caused the restriction in the lungs. Dr. Parkes stated the danger lay in security staff misinterpreting response from a detainee who is struggling to breathe. "Imagine that from the perspective of the staff. They feel you struggle and they will feel that you are getting angry. They will apply more force to manage your resistance. It becomes a vicious circle. The people who would die are those who resist for a prolonged period of time. It is entirely possible that people will die where someone is using a level of force that a lay person may not consider to be excessive." - Sources: BBC News Parkes J, Thake D, & Price M. Effect of seated restraint and body size on lung function Med Sci Law July 2011 51:177— 181; doi:10.1258/msl.2011.010148 © British Academy of Forensic Sciences Medicine, Science and the Law, a Royal Society of Medicine Journal. Abstract - (full article by subscription). Parkes J, Carson R. Sudden death during restraint: do some positions affect lung function? Med Sci Law April 2008 48:137—141; doi:10.1258/rsmmsl.48.2.137 abstract - (full article by subscription). Correspondence: John Parkes BA (Hons) M.Med Sci RMN. Email: [email protected] New US Military Weapon – The Slime Ball Lieutenant Commander Daniel Whitehurst, a student at the US Air Force Air Command and Staff College, prepared a report on combining existing technologies to produce a non-lethal armament he calls “The Slimeball.” The Slimeball is a combination of a floating sticky foam barrier that is difficult to remove, plus a submerged gel barrier that impedes movement through a ship channel. The two parts can also be used separately. Lt Cmdr Whitehurst gave three examples of targets: Pirates in Boossaaso, Somalia; against the Iranian navy near the city of Bandar Abbas in the Strait of Hormuz; and against China's underground submarine base at Sanya on Hainan Island. The Slimeball contains foam similar to, but denser than, shaving cream, combined with a material called sticky foam. Sticky foam was originally designed for antipersonnel use, but posed a suffocation hazard and was difficult to transport. Innovative US Air Force weaponry proposals to impede naval forces in the past have included floating smoke pots, entanglement devices, and "floating purple mountains of shaving cream." - Source: The Guardian Continued on Next Page V I D O C Q S O C I E T Y Bookspan's Bullets By Dr. Jolie Bookspan, VSM Continued from Previous Page Supercavitating Bullets Bullets, even full metal jacketed high-powered rifle bullets, come apart upon hitting water. Supercavitating bullets get through the air-water interface that stops regular ammunition, and retain velocity underwater. Cavitation is the effect of creating a bubble of gas in a liquid. Propellers churning water create bubbles through cavitation. Supercavitation uses enough cavitation to make a bubble large enough to encompass an object traveling through the liquid. Supercavitation reduces drag allowing very high speeds, for example to create high-speed torpedoes and supercavitating ammunition. Blunt-tipped projectiles moving at high velocity create a low-pressure bubble promoting passage through the air-water interface. The Russian APS (Avtomat Podvodnyj Spetsialnyj, or Special Underwater Assault rifle) is an example. Initial underwater weapons were less effective above water. DSG Technology has introduced supercavitating rifle ammo for tactical underwater shooting, from air to water, and from water to air, with low angle of attack (no bullet deflection), allowing firing at an underwater target from above water, an above-water target from below the surface, and at an underwater target from underwater. The operator must still compensate for optical refraction between water and air layers to accurately aim. Applications include diver protection, enemy diver neutralization, VBSS/MIO (Visit, Board, Search, and Seizure/Maritime Interception Operations), GOPLATS (Gasoline and Oil Platforms) boarding operations, speedboat interdiction and neutralization, anti-submarine warfare, anti-torpedo operations, and anti-piracy ops. - Source: DefenseReview.com How Long Do Mafia Victims Take to Dissolve In Acid? Some Sicilian Mafia victims are said to vanish without a trace, called "lupara bianca" or "white shotgun" murders, where they are known to be dead but a body is never found. Informants explain the method to destroy evidence is to dissolve the bodies in sulfuric acid, with claims that time to complete elimination is 20 minutes or less. Massimo Grillo of the University of Palermo in Italy and colleagues tested the claim. They placed pig carcass pieces in sulfuric acid, which took several days to dissolve. Adding water into the mix reduced dissolving time to 12 hours for muscle and cartilage, and two days for bones. They found that the technique could render a corpse completely unrecognizable, “But it is impossible that they completely destroyed a corpse with acid,” said study coauthor Grillo. They presented their results at a Feb. 23 meeting of the American Academy of Forensic Sciences. -Sources: Life's Little Mysteries http://www.lifeslittlemysteries.com/1149-mafia-victims-diss olve-sulfuric-acid.html Science News http://www.sciencenews.org/view/generic/id/70234/title/Maf ia_informants_fail_acid_test Facebook page of American Academy of Forensic Sciences http://www.facebook.com/AAFS.Forensic Dr. Bookspan loves good science. Send forensic jokes, quotations, websites and stories for possible inclusion in “Bookspan’s Bullets.” Email: Bookspan’s Bullets V I D O C Q S O C I E T Y Vidocq Members in the News Stacy A. Irving, VSM, Awarded FBI Philadelphia 2011 Director’s Community Leadership Award Adapted from article by Special Agent J.J. Klaver (215) 418-4043 Stacy A. Irving, senior director of Crime Prevention Services for the Center City District and chairperson of the Philadelphia Crime Prevention Council, is the 2011 recipient of the FBI Director’s Community Leadership Award for the Philadelphia Division. Since 1990, the FBI has publicly recognized and honored the achievements of individuals and organizations for their continued efforts in combating crime, terrorism, drugs and violence in America with the FBI Director’s Community Leadership Award. Each year, one individual or organization in each of the FBI’s 56 field offices is selected whose achievements in the terrorism, crime, drug, gang, and/or violence prevention and education field have had exemplary impact on the community. With more than 30 years of experience working with neighborhood and downtown business communities, Ms. Irving is internationally recognized for her unique crime prevention models, which combine crime reduction strategies, economic development, emergency preparedness and police, business and community partnerships. Ms. Irving has been an active supporter of the FBI, working closely with both the Philadelphia Division and the FBI’s Community Relations Unit at FBI Headquarters for many years. She is a 1997 graduate of the FBI Philadelphia’s Citizens Academy Program, a co-founder and the current President of the FBI Philadelphia Citizens Academy Alumni Association, and a member of the Board of Directors and past Vice President of the FBI National Citizens Academy Alumni Association. To further support the FBI and local law enforcement, Ms. Irving works closely with the FBI’s Violent Crimes Task Force and Counter Terrorism Squads on a variety of crime issues in the central business district. Over several years, she has helped coordinate the Annual Bank Robbery Prevention Summit with the Delaware Valley Financial Security Officers Group which is designed to assist law enforcement and financial institutions from throughout the region. - Link for full story: http://www.fbi.gov/philadelphia/press-releases/2011/fbi-phi ladelphia-presents-the-2011-directors-community-leadershi p-award?utm_campaign=email-Immediate&utm_medium= email&utm_source=philadelphia-press-releases&utm_cont ent=50303 New Child Abduction Murder Paper by Katherine M Brown, Ph.D., VSM By Fred Bornhofen, VSM, COB The latest issue (March 2012) of the Journal Of Forensic Science has a very interesting professional paper by Katherine M Brown, Ph.D., VSM, and Robert D Keppel, Ph.D., both of the University of New Haven. The full title is Child Abduction Murders, The Impact of Forensic Evidence on Solvability. It points out that the relationship between the victim and the offended was more important in solving Child abduction murders than the forensic evidence collected. So much for the CSI effect. Dr. Keppel is also co author of the landmark article about motivation of killers along with Vidocq cofounder, Richard Walter. - Abstract: Child abduction murder: the impact of forensic evidence on solvability. Brown KM, Keppel RD. J Forensic Sci. 2012 Mar;57(2):353-63. doi: 10.1111/ j.1556-4029.2011.01970.x. Epub 2011 Nov 21. PMID: 22103801. © 2011 American Academy of Forensic Sciences. - Another paper on this topic by Brown and Keppel: Child abduction murder: an analysis of the effect of time and distance separation between murder incident sites on solvability. Brown KM, Keppel RD. J Forensic Sci. Jan;52(1):137-45. 2007. PMID: 17209926. Continued on Next Page V I D O C Q S O C I E T Y Member News Continued from Previous Page Vidocqian Gets Justice for Murdered Ensign By Wayne Hill, VSM Back in late 1997 to early 1998, I went to Manila, Philippines and became the 1st American invited and/or allowed give expert testimony to the Philippine Senate regarding the 1995 "anomalous death of Navy Ensign Philip Pestano" (A Philippine Navy Ensign shot while aboard ship) Ensign Pestano's sister Marissa had e-mailed me several questions about how it would look if someone had shot themselves with a 1911A1 Pistol. They then e-mailed me the "suicide" scene photos and photos taken by another Ensign with his private camera. I sent a sworn report to the Senate detailing why the evidence completely refuted any claim of self infliction. Senate Chairman faxed me an invitation to appear and testify regarding my findings. The family bought my airline tickets and in September 1997 I testified before the Senate and then 6 Philippine University of Cebu Forensic Sciences Professors added their convergent findings and tests to my findings. The Philippine Navy and Philippine National Police maintained it was a self inflicted Suicide. The Senate ruled in December 1997 that Ensign Pestano had been murdered and his body staged to look like a suicide and it was a "Naval Coverup." No one was charged, however. In 2005, a Philippine Senator wrote an editorial, decrying the lack of charges for anyone, citing my Testimony by name: 2005 Editorial complaining about no action: http://hatawtabloid.com/index.php?option=com_content& view=article&id=37998:-pestano-case-a-quest-for-an-elusi ve-thuth-and-justice-privilege-speech-sen-alfredo-s-lim-au gust-15-2005-&catid=39:catopinion&Itemid=68 On Feb 11th of this year, I received a note from Marissa (Pestano) Basilad with a link to a Philippine News Article regarding the 6 Command level Naval Officers and four Senior Enlisted Naval Personnel who had been charged with Ensign Pestano's Murder on Jan. 11th, 2012. Justice has finally raised her scales. The Vidocq Society helped this family finally break a real government conspiracy and get Justice. – 2012 article about the arrests and charging of Naval personnel: http://newsinfo.inquirer.net/126393/ombudsman-files-murde r-raps-vs-10-navy-officials-for-pestano-murder Vidocq Society as Resource In New Book Cold Case Research By Silvia Pettem, VSM Silvia Pettem, who wrote of the work of several members of the Vidocq Society in Someone's Daughter: In Search of Justice for Jane Doe, announces that her latest book, Cold Case Research: Resources for Unidentified, Missing, and Cold Homicide Cases, will be released in July, 2012, by CRC Press (a division of Taylor & Francis). The Vidocq Society is included in Chapter 15, "Cold Case Review Teams & Information-Sharing Resources." Cold Case Research is a collaborative effort by several members of the Vidocq Society. Dr. Rich Walton developed the concept of a book on research methodology, and Jim Trainum became chief advisor and writer of the Foreword. For a brief overview, see: http://www.silviapettem.com/CC%20Research.html Dawn Perlmutter on Investigation Discovery Episode By Dawn Permutter, PhD, VSM Dawn Permutter, PhD, VSM, was interviewed for an episode of On the Case with Paula Zahn (Investigation Discovery Channel) which aired Sunday, 8 January 2012 at 10:00 p.m. and 9 January, at 1:00 a.m. She consulted on a 24 year old cold case homicide involving the ritualistic murder of Sister Margaret Ann Pahl in the sacristy of a chapel on Easter Saturday, 1980, in Toledo, Ohio. This case involved unusual symbolic and forensic evidence. Dr. Perlmutter also presented a new training at MAGLOCLEN headquarters on January 25, 2012, on Mexican Narco Cult Beliefs, Symbols & Rituals. - Short video from Investigation Discovery Channel: http://investigation.discovery.com/videos/on-the-case-behind -the-scenes-priest-murders-nun-during-satanic-ritual.html V I D O C Q S O C I E T Y Skeletons in the Closet By Harry F. Glemser Jr., VSM, Camden County Prosecutor's Office, Homicide Division Supervisor/Cmmdr. Crime Scene Investigation Division Ret. On July 2, 1990, I received a call in the Homicide division while working as a Camden County Prosecutor’s Office Homicide Investigator. I was advised that Lt. Terrence Conley of the Washington Township Police Department had been cleaning out his deceased father’s closet at his father’s home, when he came across this gun case. Upon opening it, he discovered that it was a German Luger in pristine condition and had associated documentation that it was, in fact, the very weapon used by Howard B. Unruh during his “Walk of Death” some 40 years prior in the streets of Camden, New Jersey. On September 6th, 1949, Unruh massacred 13 people, including a young boy seated on a hobby horse inside a barber shop. Mr. Unruh was a tank gunner in the US Army and an Honorably Discharged World War II Veteran. He kept a journal on several of his intended victims, whom he believed were speaking badly of him behind his back. Some of his victims were those intended targets; others were the unfortunate souls who were in the wrong place at the wrong time. He murdered five men, five women, and three children on 32nd Street and River Road in Camden NJ. People that witnessed the carnage were said to be seen running away screaming “A CRAZY MAN” as they scrambled for cover. I learned from my interview with Lt. Conley that his father Vincent P. Conley Sr., who was a Camden City Police Officer, was on the scene of the Unruh crime in 1949 and part of the Unruh investigation. Back in 1949 there were no real standards of keeping and maintaining evidence such as the state of the art evidence procedures which are in place today. Officer Conley Sr. merely kept the murder weapon in his police locker where it awaited further proceedings, such as Unruh going to trial. Mr. Unruh confessed to the crimes and was found to be mentally incompetent to stand trial and never tried for his crimes. He was sent to a mental facility for the criminally insane where he spent the rest of his life. Unruh appealed his sentence on a yearly basis and were attended by my Section Chief, James Conley of the Camden County Prosecutor’s Office (no relation to Vincent Conley). Unruh was a recluse who read the Bible and loved guns. It is documented that after planning his killing spree for a year, the thing that set him into action was the fact that someone stole the gate to his fence. When Camden Policeman Vincent P. Conley retired, and Unruh had not been to trial, Mr. Conley simply cleared out his police locker and brought the evidence of the weapon home with him and placed it in his bedroom closet were it remained untouched for years until it was discovered by his son on July 2, 1990. Luckily, he was an officer of the law who turned it over to me and I turned it into evidence at the Camden County Prosecutor’s Office on July 2, 1990. Howard B. Unruh was 28 years old when he committed the crimes and was the nation’s worst mass murder of that time. He died at the age of 88 in a nursing home in Trenton NJ. It is my hope that the weapon would someday end up in a museum, putting to rest an instrument of death, which will never be forgotten. - Related article for further reading: Howard Unruh: America's First Modern Mass Murderer. - Video: Inquirer staff writer Joseph Gambardello narrates a short video about the “Walk of Death” gun: http://www.philly.com/philly/videøBC1471886868001.html V I D O C Q S O C I E T Y Digital Forensics with Peter Stephenson, PhD “The Porn Guy” - The History of Computing and Cold Cases This is an actual case that, although not one involving a violent crime, shows some of the ways that cybercrime assessment techniques can benefit the investigator. In fact, this was not even a crime but the principles that we will cover apply to just about any kind of crime that has a cyber element. You’ve heard me say – at meetings and in these columns – that just about every crime today has a digital – or “cyber” if you prefer – element to it. Interestingly, many of our cold cases do – or, at least, may - as well. This is a good time to digress just a bit. I’ll bring us back on point with our case shortly, but the notion that older crimes may have computer elements is not surprising. In many cold cases – certainly those that occurred since about 1995 – there is some element of computing involved. Just for fun (actually, to help us understand what computing and Internet technologies were available when) let’s take a quick look at computing history as it might affect our cold case investigations. • • • • • • • • • • • • • • • 1971 – First email sent 1981 – First IBM personal computer 1990 – Sydex introduces SafeBack, the first serious, commercial computer forensic tool. 1991 – America Online launches AOL - Geocities launches as a community where users can create their own web sites 1992 – First use of the term “computer forensics” in academic literature 1995 – Microsoft launches Windows 95. This was the beginning of the era of computing for the masses. Classmates.com is launched. 1996 – eBay is founded 1998 – Microsoft launches Windows 98 and Google is founded 1999 – Napster is born 2000 – Microsoft launches Windows 2000 2001 – Microsoft launches Windows XP, iPod introduced 2002 – Friendster.com launches and grows to 3 million users in its first three months 2003 – MySpace launches 2004 – Facebook launches 2005 – Google now indexes over 8 billion pages. YouTube launches • • • 2006 – Twitter launches 2007 – iPhone is introduced 2011 – Google+ launches So, we can see that from about 1991 – and certainly after 1995 – there is a significant possibility that a computer or, even, social networking or email, may be involved in one of our cold cases. What does that have to do with “The Porn Guy”? Stay close and I’ll get to that shortly. What is important to point out now, is how the evolution of digital forensic tools and techniques fits into our timeline above. Let’s look at mobile phones. • • • 1972 – 1989 -- First generation of mobile phones started with the Motorola Dyna Tac 1990 – 2000 -- Second generation of mobile phones and the first generation of Internet service on mobile phones 2000 – 2011 -- Third generation of mobile phones including smart phones, video calling, mobile broadband/Internet and today’s 3G networks. That means that all mobile phones since 1990 could have useful forensic data on them. However, there were no forensic tools designed specifically to examine mobile devices until well into the third generation of phones. Computer forensics tools have evolved since the mid 1990s so cases before the mid 2000s would have suffered from poor digital forensic analysis. That means that if the cold case investigator can lay hands on the computers or mobile phones from the time of the case, it may be possible to add a significant dimension to the investigation. That brings us back to “The Porn Guy”. TPG is not a cold case. In fact, it occurred within the past four years. However, the technologies involved shine a light on where criminals can hide information. What does that have to do with the history of computing and digital forensics? Simply, that as techniques have evolved, so have forensic tools. When we apply today’s sophisticated tools to cold cases with a digital compo- Continued on Next Page V I D O C Q S O C I E T Y “The Porn Guy” - The History of Computing and Cold Cases By Peter Stephenson, PhD Continued from Previous Page nent, there is a far better than even chance that we can turn up useful evidence. TPG was an employee of an organization that had a strict policy of not allowing employees to view pornography on organization-owned computers. TPG was the subject of a complaint from a co-worker and I was called to analyze his computers for evidence to support or refute the accusation. TPG had been issued three computers: a Mac, a laptop PC and a tower PC. He also was issued a cell phone with a camera. I imaged all three computers and the cell phone. When we image a computing device – and cell phones are computing devices – we actually make an exact bit-for-bit copy of it. That includes all blank space, used space and deleted file space. I started with an exhaustive visual search of all of the graphics objects on all four devices. That yielded nothing. I was about to conclude that the accusation was unfounded when I got a call from the investigator on the case telling me that the subject had given them the name of a site that he visited. He claimed that he visited it just once to test the organization’s porn filters and that he only went to the one single site. I did a simple keyword search on the name of the site and discovered that the subject had used a technique known as virtualization – actually, sort of like a computer inside of a computer – to hide his pornographic images. I extracted the virtual machine – a geek term for the computer inside the computer – and opened it up. There were over 100 pornographic images from seven sites covering an extended period of time. Now, we cut to the application of cybercrime assessment. TPG was power assertive (PA) so he had a need to control the investigative process. He had been successful at maintaining control over the investigators through application of supposed arcane computer knowledge to interviews by the investigators who were not as technically sophisticated. The investigators asked me to interview the subject, which I agreed to do. In a phone conversation with Richard Walter the night before the interview we crafted a strategy for extracting an admission from TPG. Given the PA nature of the crime scene – the computers – and the subject we decided to treat him as PA and that I needed to be more PA than him. I prepared by having a thumb drive with the full directory structure of his virtual machine and all of his pornographic images. I also had printouts of the landing screens of each of the sites he visited. I had printouts of selected images from his collection including two of a young looking girl. I’ll get to her shortly. I began the interview slowly, drawing him out and gaining his confidence. I complimented his photography – none of it pornographic – and then asked him if he knew why he was being interviewed. He reiterated his claim that he had visited one adult site just once to test the porn filters of his organization. I let that go for the moment and asked him if he knew anything about virtualization. When he denied that he did – maintaining his air of superiority – I turned up the heat a bit and told him that he was not being truthful. I showed that he had created two virtual machines: one to learn how to do it and one to hide his adult files. I then asked him if he knew what I was talking about. He admitted that he did but he reiterated that he had visited only one…. Etc. At that point I opened my folder and took out the seven landing screen shots showing seven separate sites. I also showed him what I had on my thumb drive from his computer. He demurred and though we were making progress I was ready to wind the interview up. I asked him if he had visited adult sites regularly and again he firmly denied that he had. I got him on the record with a very positive statement that he did not visit adult sites and he had no idea how those images got on his computer. Knowing that this was extremely unlikely, I played my ace. I took out a picture of a very young-looking girl fully clothed. As I expected, he erupted in anger and yelled that I was trying to get him to admit to child pornography – the picture was neither a child nor was it pornographic – and he ranted for a couple of minutes and wound up his tirade by insisting that he had visited adult sites regularly but never a child pornography site. As a PA he would not have readily admitted to perversion. In this case his reaction was as expected when he was faced with the implication – never a direct accusation – that he was viewing child pornography. He told us that he had a young daughter and he would never do something as “perverted” (his word) as child pornography. Continued on Next Page V I D O C Q S O C I E T Y “The Porn Guy” - The History of Computing and Cold Cases Continued from Previous Page I had my admission. I closed my folder, thanked him for his time and left him to the investigators. How does TPG tie the history of computing, cold cases and cybercrime assessment together? More obviously than you might think. TPG used a very sophisticated technique to hide his pornographic images. The tools that we have today are well capable of tackling that level of sophistication and a lot more. If we apply the tools to the computing elements of yesterday’s cases we may have a distinct advantage over the investigators of the time. That likely is true even if digital forensic experts examined the digital evidence contemporaneously with the crime. More important, perhaps, is what you can do with the evidence. As with TPG, knowledge of crime assessment as it works in the cyber world informed me as an interviewer and enabled me to get the admission that I needed to close the case. Just because I had the evidence didn’t mean that the subject would admit to his behavior. In a cold case, having the additional evidence from computing or cellular devices can give you the same edge if you use it to inform the rest of your investigation. I am seeing increasingly the benefits of applying cybercrime assessment, considering the computing devices as part of the overall crime scene and using crime assessment techniques to complicated investigations. TPG was a simple one but it demonstrates the synergy of evidence, crime assessment, computer forensics and the behavior of the subject. The next time you have a cold case with a possible digital element, ask the investigators. If it is present, application of today’s digital forensic techniques and cybercrime assessment can get you to the solution, perhaps faster and with more certainty than without that extra boost or two. That history of computing bit earlier? That is there to help you place your cold case in the continuum of computing history. That can help you decide if there might be a digital element to your case. Happy hunting! Peter Stephenson, PhD, CISSP, CISM, FICAF, VSM, is director of the Norwich University Center for Advanced Computing and Digital Forensics, and chief information security officer for the university. 2012 Member Dues DUE NOW Members who have not paid their dues will be – regretfully – dropped from the rolls. Send your check for $100 to Vidocq Society 1704 Locust Street 2nd Floor Philadelphia, PA 19102 Attention: Treasurer If you have reached the grand age of 70 years old, and have been a member in good standing for two years, you no longer have to pay dues. Healthy Wishes Our thoughts to Vidocq members Bill Kelly, Bob Phillips, Donna Fontana, Joe McGillen, Col. (ret.) Armando Stavole, and others who wish to keep their names private during their recovery ~ Your Friends and Colleagues at Vidocq Society V I D O C Q S O C I E T Y Vidocq Society in Print: Books By and About Members - www.Vidocq.org/books Effective Interviewing and Interrogation Techniques, Third Edition, by Nathan J. Gordon and William L. Fleisher. A practical manual providing the forensic practitioner/investigator critical insight into human behavior, enabling one to become a better interviewer, interrogator and, most importantly, an expert detector of truthful and deceptive behavior. Gordon and Fleisher have created a one-stop guide to mastering the art of credibility assessment during an interview, with successfully tested techniques for obtaining a confession from guilty suspects. Forensic practitioners, law enforcement, the intelligence community, the private security sector, attorneys, and forensic and criminal justice students will all find this volume a valuable resource. • The only book to address FAINT, IIT, and MITT in one source • Enables the interviewer to obtain a confession that can stand up in court • Includes an online workbook with practical exercises to assist the reader The third edition expands chapters on torture, assessing the interview, statement analysis, MITT, and interrogation. It contains new chapters on passenger screening, and report writing, along with new case studies. Also covered are ways to maximize the collection of information from a prospective employee, and legal considerations. The Forensic Assessment Interview Technique (FAINT) and the Integrated Interrogation Technique (IIT) were developed at the Academy for Scientific Investigative Training and are used by forensic practitioners and investigators to detect truthful or deceptive behavior. FAINT is applicable to all forensic type interviews and incorporates the assessment of nonverbal behavior, projective analysis of unwitting verbal cues, statement analysis and the Morgan Interview Thematic Technique (MITT). This volume teaches how to combine, apply and quantify these techniques to reach a numerical conclusion to the truthfulness of the interviewee. Order here in hardcover and Kindle. Cold Case Homicides: Practical Investigative Techniques by Richard H. Walton, EdD, VSM, provides effective and accessible information to those responsible for investigating and resolving previously examined, but still unsolved, cold case homicides. The book merges theory with practice through use of case histories, photographs, illustrations, and checklists that convey essential, fundamental concepts, while providing a strong, practical basis for the investigative process. It combines proven techniques from forensics, psychology, and criminal investigation, and focuses on technologies that may not have been available at the time of the crime. This guide defines the characteristics of a cold case homicide; details various investigative methods used by law enforcement agencies; explores the actual experiences of detectives in reopening case files; and presents current technologies such as ViCAP, HITS, and TracKRS used in the identification of cases related to the reopened case, or its perpetrator. It also highlights technological changes that contribute to law enforcement's abilities to solve cold case homicides, such as computerized print technology, the specificity of DNA, and the expanding data banks that enable the linkage of previously unknown suspects to the crimes they committed. Available for order in hardcover and Kindle. Submit Books By and About Members for Listing in the Vidocq Journal Include: ➡Graphic of Cover ➡Synopsis ➡Author Bio and Member Status Email Dr.Bookspan, Science Editor Continued on Next Page V I D O C Q S O C I E T Y Vidocq Society in Print: Books By and About Members Continued from Previous Page The Murder Room. Michael Capuzzo introduces the founders of the Vidocq Society, talented courageous sculptor Frank Bender, Commissioner William Fleisher, and criminal profiler Richard Walter. Learn what inspired them to help solve cold case murders. Click to order in Print, Kindle Edition and Audio Versions. The Girl With The Crooked Nose by Ted Botha. Tells of Frank Bender’s work as a forensic artist and founding member of the Vidocq Society, to bring attention and resolution to hundreds of neglected murders of women near Ciudad Juarez, Mexico. From this work, Frank and his daughter Vanessa have donated time and talents to assist the Ni Una Mas project (Not One More). Click to order The Girl With The Crooked Nose. In Trail of Blood, The Vidocq Society helps solve the murder of 24 year old Scott Dunn. Scott's parents never gave up when his killers left no body, no weapon, only blood, so much blood. “When Jim Dunn got the heart stopping call every parent dreads: "Your son has disappeared" on a Sunday night, it set into motion a six year nightmarish odyssey of desperate searches. Dunn turned to Richard Walter of the Vidocq Society, forensic pathologist and criminal profiler, who consulted Scotland Yard, studied DNA evidence and blood spatter patterns, and then pointed out who he deduced killed Scott Dunn, and why.” Click to order Trail of Blood. Deadly Betrayal: The CBS Murders is based on an actual major, high-profile investigation, told from the inside by FBI man Don Richards, VSM. “An undercover agent is killed in a Chinese Tong gangwar and FBI Supervisor Dan Robertson can't prove the operation was authorized. He is set up as the scapegoat, and told to involve himself in a safe white collar fraud case until things get sorted out. But that case is far more sinister, and soon Robertson finds himself partnered with NYPD Detective Richie LeBeau in a complex multiple murder investigation which might connect to the Tong. Overcoming personal clashes, inherent distrust, agency rivalry, and leaks to the media, they use every crimesolving and forensic technique to identify the killer, and build their case. When sharp legal maneuvering threatens to dismantle their work and free the killer, they must find a way to resurrect the case and bring justice to a terrible crime.” Click to order Deadly Betrayal. In Someone’s Daughter, historian Silvia Pettem tells of a young woman, known only as "Jane Doe," found murdered in 1954 in Colorado. Pettem spurred the Vidocq Society and Boulder County Sheriff’s Detective Steve Ainsworth to find the woman's name and killer. Several Vidocq members selflessly volunteered resources and time: Dr. Richard Froede and Frank Bender did skull and facial reconstructions. Dr. Walter Birkby, Dr. Robert Goldberg, and Dr. Terry Melton worked on DNA. Fred Bornhofen coordinated. Many others contributed. In October 2009, DNA comparison with a surviving sister confirmed Jane Doe's identity as Dorothy Gay Howard, an 18-year-old missing from Phoenix, Arizona. Click to order Someone’s Daughter. Continued on Next Page V I D O C Q S O C I E T Y Vidocq Society in Print: Books By and About Members Continued from Previous Page Investigating Religious Terrorism and Ritualistic Crimes by Dawn Perlmutter, VSM, director of Symbol & Ritual Intelligence, is the first complete resource to assist in crime scene identification, criminal investigation, and prosecution of religious terrorism and occult crime. It analyzes occult and religious terrorist practices from each group’s theological perspective to help you understand traditional and contemporary occult groups and domestic and international terrorist religions, demarcate legal religious practice from criminal activity, and acquire techniques specific to occult and terrorist religion crime scene investigation. Click here to order in hardcover and Kindle. Investigating Computer-Related Crime, Second Edition (2004) by Peter Stephenson with NEW Third edition coming soon. Written by an information security specialist, this second edition of Investigating Computer-Related Crime discusses cybercrime, its investigation, and the difficulties encountered by both public law enforcement officials and private corporate investigators. The book offers insights into collecting evidence, interrogating suspects and witnesses, handling crime in progress, as well as issues involving the authorities, and helpful case studies. Updated chapters incorporate new kinds of attacks, current work of the Digital Forensic Research Workshop and their investigative model, new operating systems, the impact of the Patriot Act, and new ways of analyzing computer media. 448 pages. Order here in hardcover edition and here for Kindle electronic version. I Have Lived in the Monster: Inside the Minds of the World’s Most Notorious Serial Killers by Robert K. Ressler and Tom Shachtman. Agent Ressler, who coined the term “serial killer” in the 1970s, recounts his years since leaving the FBI, working as an independent criminal profiler on some of the most famous serial murder cases of our day. Piecing clues from crime scenes, along with killing patterns and methods, Ressler explains his role assisting investigations of such perplexing international cases as England’s Wimbledon Common killing, the ABC Murders in South Africa, and the deadly gassing of Japan’s subway. We’re also witness to Ressler’s fascinating, in-depth interviews with John Wayne Gacy, plus a shockingly candid discussion with “cannibal killer” Jeffrey Dahmer. Click here to order. Sexual Homicide: Patterns and Motives by John E. Douglas, Ann W. Burgess, & Robert K. Ressler. This authoritative book represents the data, findings, and implications of a long-term F.B.I.-sponsored study of serial sex killers. Specially trained F.B.I. agents examined thirty-six convicted, incarcerated sexual murderers to build a valuable new bank of information which reveals the world of the serial sexual killer. Data was obtained from official psychiatric and criminal records, court transcripts, and prison reports, and from extensive interviews with the offenders. Detailed information is included on the FBI’s Violent Criminal Apprehension Program (VICAP) along with a sample VICAP Crime Analysis Report Form. Attention is given to child/adolescent formative events, societal perceptions & pressures which may be motivational to sexual killers who exhibit aberrant thought patterns, deviant behavior, and aggression linked to sexual expressivity. 234 pages. Click to order in Kindle, paperback and hardcover. Continued on Next Page V I D O C Q S O C I E T Y Vidocq Society in Print: Books By and About Members Continued from Previous Page The Unknown Darkness: Profiling the Predators Among Us by Gregg McCrary. McCrary’s 25 years in the Bureau have yielded over 1000 cases to draw upon. The 10 he describes in the book reveal the strengths and pitfalls of modern criminal investigation, including the siege of the Branch Davidian compound in Waco, the Buddhist Temple Massacre in Phoenix, Arizona, the search for the Scarborough Rapist (who eventually became a serial murderer), the prosecution of Jack Unterweger (an international serial killer who committed murders in Czechoslovakia, Austria and Los Angeles), the Sam Sheppard murder case and others. McCrary answers what happens at the crime scene, what kind of person does it take to grapple with the serial killers among us, and exactly how do we disarm the enemy. 400 pages. Click here to order in hardcover or paperback. Cold Cases: An Evaluation Model with Follow-up Strategies for Investigators (Advances in Police Theory and Practice) by James M. Adcock and Sarah L. Stein, begins with a historical perspective on how cases get to the point where it appears all investigative leads have been exhausted, and includes a chapter on understanding the process of homicide and those who kill. Next, the authors explain the evaluation model, theories of the crime, evidentiary issues and concerns, informational and behavioral aspects relative to the crime and the participants in the crime, and documents investigative strategies for future efforts on the case. The third section discusses the investigation, questions investigators must ask, choice of interview/interrogation techniques based on the behavioral aspects involved, and how the growth in technology since the date of the incident might provide new opportunities to uncover clues. Finally, the authors suggest how investigators can maximize their efforts and obtain not just an arrest, but a conviction. Appendices include sample standard operating procedures from three different agencies to use as a guide for setting up a cold case unit and a list of additional resources a department may look to for assistance. 264 pages. Click to order. Healthy Martial Arts by Jolie Bookspan, Med, PhD, FAWM is for all in law enforcement, military, athletes, and those who need to be in top shape and prevent injuries for work and life. Covers training techniques for all athletes, strength, abdominal training that transfers to Spec Ops (train like you fight), nutrition, flexibility, performance enhancement drugs and foods, soreness, injuries, breathing, spirit, speed, balance, joint stability, back, neck, and knee pain prevention, handling stress, making training and daily life healthy, brain power & mental exercise, wheelchair athletes, more. Dr. Bookspan is a sports medicine specialist, military scientist, 4th degree Black Belt, 2009 Master Instructor of the Year, and former full contact fighter inducted into the International Black Belt Hall of Fame. Healthy Martial Arts won Reader’s Choice Award of the International EUSA Martial Arts Association. Approx 200 photos. 228 pages. Click for secure ebook download with color photographs, and 8”x11” print edition with black & white photos. Diving Physiology in Plain English by Dr. Jolie Bookspan, former research physiologist for the U.S. Navy, inducted into the NAUI SCUBA instructor Hall of Honor. For divers, search and rescue teams, training departments. Clear information to understand (not memorize) physiology and medicine, and apply all to safer decompression, thermal, equipment, gas mixing, fitness to dive, rescue, and other protocols. Order from the Hyperbaric Society publisher, retail stores, or the author through website: www.DrBookspan.com/books. V I D O C Q S O C I E T Y 2012 Meetings at Union League Meeting Reservations Only Vidocq Society Members (VSMs) and guests they pre-register and accompany may attend Vidocq Society meetings. You must reserve your place with Gloria at Vidocq, 215545-1450, by close of business on the Monday before each scheduled meeting. There is a tight head count. Meetings are the third Thursday of each month at the historic Union League at 140 S. Broad Street, Philadelphia, PA, http://www.unionleague.org/ The Union League has a dress code; Business attire is required for both men and women—jackets and no jeans. Cost for the luncheon meeting is $35.00 per member and $40.00 for non-member guests. Both members and guests with reserved places will be asked to pay if they do not honor the reservation made for them. Parking is available at reduced rate, courtesy of Ryan Shapiro, VSM. The garage is on Sansom Street opposite the Union League entrance, between Broad and 15th Street. Get your parking validation at the meeting. Next Meeting Dates Please Mark Your Calendars March 15, 2012 April 19, 2012 May 17, 2012 June 21, 2012 July and August 2012 (No Meeting) September 20, 2012 October 18, 2012 Awards Banquet date to be announced November 15, 2012 December 2012 (No Meeting) V I D O C Q The Vidocq Society The Vidocq Society is a Nonprofit, 501c(3) corporation, which, by the terms of its charter, is a fraternal organization comprising professionals and nonprofessionals who meet in a social setting to discuss unsolved crimes. Our work is pro not consider sented to us. Our to act as a catalyst ance to law ento assist them in solving bono and we do every case presole purpose is and provide guidforcement agencies these crimes. Opinions offered by our members are personal opinions offered in the spirit of cooperation and goodwill, based only upon the facts presented, and should not be considered formal or legally binding opinions of the Vidocq Society. Solve The Mystery A new mystery each issue Q. What does the term "forensic" mean in Latin? Super-sleuths, send your verdicts to Dr. Bookspan, science editor Solution to Last Solve the Mystery: Q. What was Al Capone's stated occupation on his business card? A. Used Furniture Dealer Correct answers in order of receipt by: Marnye Summers and Regina (no response to our request for last name) S O C I E T Y Get In Shape - Self Defense Shotokan Karate Novice to Black Belt Small class, Personal attention. Fitness, injury prevention, katas, confidence, self defense. Mondays: 8:00 p.m. - 9:30 p.m. Thursdays: 7:30 p.m. - 9:00 p.m. 2nd Floor 2100 Chestnut Street Philadelphia, PA 19103 Entrance on 21st Street Taught by: Paul Plevakas, Karate Sensei 3rd Degree Black Belt Black Belt Hall of Fame Telephone: (215) 778-2634 Email: [email protected] Website: www.PaulPlevakas.com K a r a t e Vidocq Society Journal The Vidocq Journal © Copyright 2012 Published by The Vidocq Society, a 501 (c) (3) nonprofit organization Second Floor 1704 Locust Street Philadelphia, PA 19103 Voice: 215-545-1450 — Fax: 215-545-1773 — www.vidocq.org Subscription $100 per year Commissioner William L. Fleisher - [email protected] Deputy Commissioners Fred A. Bornhofen - [email protected] Benjamin J. Redmond - [email protected] Communications Ed Tenuto - [email protected] Journal Paul D. and Jolie Bookspan Plevakas, Editors Submissions for Journal consideration to: Vidocq Editors
Similar documents
Vidocq Journal 2011 Quarter 2
Vidocq Society. We all have heard communicators referred to as “PR people.” Many titles are used synonymously to describe the communications practitioner such as: media relations person; press offi...
More informationVidocq Journal 2012 Quarter 2
The Vidocq Society helped solve the 1991 murder of 24 year old Scott Dunn when no weapon and no body could be found. The book, Trail of Blood, by Wanda Evans and Scott’s father James Dunn came out ...
More informationVidocq Journal 2014 Quarter 3-4
unfamiliar areas of violent crime. Our goal is to advance knowledge, information, methodologies and interpretations of all expressions of symbolic evidence and ritual violence. Our subject matter e...
More informationVidocq Journal 2011 Quarter 3-4
A training team of Vidocq Society Members (VSMs) contributed their expertise to the Cold Case Conference hosted in conjunction with the Vidocq Society and the Unified Police Department of Greater S...
More informationVidocq Journal 2013 Quarter 1
Wikipedia is an online collection of articles, allowed to be written and edited by anyone, at home over the Internet using their own web browser, on nearly any topic. Articles have no bylines; auth...
More information