Vidocq Journal 2014 Quarter 1-2
Transcription
V I D O C Q S Vidocq O C I E T Y Journal The Vidocq Society – Solving Unsolved Murders and Cold Cases Quarterly Journal Volume Twenty Five Numbers 1 & 2 2014 Digital Forensics Peter Stephenson, PhD William Kelly Will Be Missed Bookspan's Bullets Fast Forensics With Dr. Bookspan Vidocq Members In the News Ideas on NonVerbal Behavior Solve The Mystery Pages 1, 11 - 14 Page 2 Pages 3, 4 Pages 5, 6, 7 Pages 8, 9, 10 Page 23 The Internet is an Ugly Place For Vidocq to Work By Peter Stephenson, PhD, CCFP, CISSP, CISM, FICAF, LPI, VSM This column is about the Wild, Wild West – only today the Wild West is everywhere, not just in the West. I’ll begin with a bit of a cautionary tale and then we’ll get down to nuts and bolts. Over the past couple of months I have been standing up what will become one of the most extensive cyber threat assessment centers in the US outside of government. I really thought that I had a pretty good idea of what goes on in cyberspace but even I was surprised as I started to dig into actual real-time attacks going on around the world. Let’s begin with the overall network attacks. I use a tool that lets me see attacks in cyber space as they happen. It’s pretty cool and I thought that you might find it interesting to see a bit about what is going on all around us as we browse the “Net” on our PCs. Just to give you an idea, I have captured about 3 minutes worth of “activity” – Cyber Attacks Against US Targets, see Figure 1 on page 11. Figure 1 tells a serious story. Most of these attacks result in some compromise that affects some web site that we are likely to visit. If we, for professional purposes, visit risky sites – pornography, child pornography, hacking, sado-masochism, etc. we have a pretty good chance of running afoul of one of these compromised sites. If we download software from the Internet we are subject to watering hole attacks: downloading malicious software dis- 1 Continued on Page 11 V I D O C Q S O C I E T Y William Kelly, VSM. By William L. Fleisher, VSM, Vidocq Society Commissioner Dear Friends, I am sad to report the passing of our friend and colleague, Bill Kelly, VSM. A finer gentleman never lived. Bill was our Chaplain Emeritus, and a driving force in the “Boy in the Box” investigation for more than fifty years. I was honored and proud to be his friend. My sincere condolences to Ruth Ann and Bill’s family. Bill’s name will be sadly entered onto the rolls of the Vidocq Society’s Honored Dead. Interment was private, but I know his many friends were there in spirit. A link to his obituary is below, which includes a link to sign the guestbook for Bill. http://www.legacy.com/obituaries/philly/obituary.aspx?n=william-h-kelly&pid=1702473 94&fhid=28386#sthash.0vj1i7lf.dpuf Guestbook: http://www.legacy.com/guestbooks/philly/william-h-kelly-condolences/170247394?cid= full By Judge Lynne Abraham, VSM Bill was a most delightful, sweet, and dear friend. Of course, those of us who have followed the infamous “Boy in the Box” case know of his devotion to finding who killed that boy and left him in that box off what is now a major street, Veree Road. Every time I go to that neighborhood, I think of that little boy. I had spoken to Hal Fillinger a hundred times about that child, and he was always heartsick when any child was brutally abused, mistreated, or killed-and he saw it all. Bill, was a very close friend of mine, and I will miss him, as will all who knew him. From The Editors Our dear friend Bill Kelly was one of the original investigators of the “Boy in the Box” case, and continued the hard work of the investigation for decades. He wrote the book, “Susquehanna Road: How Rem Bristow, Bill Kelly, and a Myriad Group of Philadelphia Investigators Solved the Cold Case of the Boy in the Box.” 2 V I D O C Q S O C I E T Y Bookspan's Bullets by Jolie Bookspan, MEd, PhD, FAWM, VSM Forensic news and education by Dr. Bookspan, Science Officer. Bookspan's Bullets is dedicated to Frank Bender, VSM, who inspired and requested the column beginning in 1997. Shoot Once Hit Target Three Times road, making it less dense than air above it. Light from the sky is bent upward by the hot air. Viewers see some of this light from the sky and interpret it as puddles of water on the road. The new Multiple Impact Bullet splits in midair shot to increase chances of hitting your target. The new bullets are made by splitting one conventional bullet into three parts, then repacking the parts into the cartridge. When fired, the three fragments exit spinning and spreading out, giving a higher hit probability. According to Todd Kuchman, co-founder of Advanced Ballistics Concepts, it increases ability to save your own life "in a panicking situation" over a conventional round. The bullet expands as quickly as possible giving the highest hit probability, closest distance. Unlike buckshot or scattershot, this partitioning round has finite expansion giving it "the best hit profile of any configuration you can do out of a pistol." They are not designed as "through and through" bullets, meaning they make a complete path all the way through the target and continue to reach another target. These rounds are designed to turn "heavy end" and make a crescent entry to maximize internal disruption to stop a threat as quickly as possible. According to ATF firearms tech branch chief EarlGriffith, it is legal as long as it is not using armor piercing technology. - Source: Carbon nanotubes are one-molecule-thick sheets of carbon, looped into tubes. They have the strength of steel with the density of air and can be heated quickly. When immersed carbon nanotubes are heated, they heat the water around it, and can bend light the same way as a temperature gradient in air, enough to completely disguise the intended target. Nanotubes can heat so quickly that the "invisibility cloak" can be turned on and off quickly - Sources: Overview: http://io9.com/5846158/how-an-underwater-invisibility-cloa k-makes-solid-objects-disappear Watch the Video: http://www.youtube.com/watch?v=3YO4TTpYg7g Research article: http://iopscience.iop.org/0957-4484/22/43/435704 Facebook Status Updates Reveals Negative Personality Traits Watch the Video: http://money.cnn.com/video/technology/2014/01/29/t-multip le-impact-bullet.cnnmoney/index.html?iid=S_Taboola Researchers at Lund University and the Sahlgrenska Academy Centre for Ethics Law and Mental Health, investigated if Facebook status updates can reveal the same negative personality traits as can standard psychological personality tests. A "Facebook update" is a short notice where the Facebook account user announces their thoughts, whereabouts, or whatever is on their mind at the moment. Nanotube Device Makes Solid Objects Invisible Underwater Scientists at the University of Dallas have designed a carbon nanotube device that bends light rays to make an underwater object seem to disappear. The device produces the same effect as of a mirage on land, which occurs when light changes direction as it passes through media with different densities. A common land mirage is seeing shimmering "puddles" on a dry road on a hot day. Air near the ground is warmed by heat radiating from the Personality tests and Facebook status updates were compared and analyzed for approximately 300 Americans. Facebook users answered a questionnaire that tests for 3 Continued on Next Page V I D O C Q S O C I E T Y Bookspan's Bullets By Dr. Jolie Bookspan, VSM Continued from Previous Page extrovert, neurotic, psychopathic, narcissistic, and Machiavellian personality traits. Subjects also submitted their 15 most recent status update for study with algorithms for latent semantic analysis, a method to measure word significance. was made. Deterioration of the print varies with surrounding temperature and other factors. Fingerprint date can so-far be approximated from, within "one or two days," up to 15 days. The new technique needs to be extensively tested on actual crime scenes, leading to creation of a database, before it can be used in prosecutions, hopefully "within a year," according to researcher De Puit. The researchers concluded, "Given that Facebook allows individuals to have major control in how they present themselves and draw benefits from these interactions, we conclude that the Dark Triad, involving socially malevolent behavior such as self-promotion, emotional coldness, duplicity, and aggressiveness, is manifested in Facebook status updates." - Source: Scientists Discover How to Date Fingerprints http://bestcurrentaffairs.com/w/scientists-discover-date-finge rprints/ - Sources: Dark personality traits revealed on Facebook: http://www.sahlgrenska.gu.se/english/news_and_events/new s/News_Detail/dark-personality-traits-revealed-on-facebook. cid1194899 Fingerprint Scanner Hacked With Glue Mold The fingerprint sensor on Samsung's Galaxy S5 phone was hacked using a mold made of glue less than a week after the device went on sale. Researchers at Berlin-based Security Research Labs (SRL), who designed the "spoof," lifted a real fingerprint from a smartphone screen, then used a process to make a mold of glue and graphite spray which was successfully swiped across the sensor in the phone's home button. Project manager Ben Schlabs stated, "If you think into the future, once ATMs have fingerprint scanners, and once heads of state start using fingerprint authentication. it's going to become a lot more attractive. " The study: Garcia, D. & Sikströmd, S. The dark side of Facebook: Semantic representations of status updates predict the Dark Triad of personality. J Pers. 2014, Vol 67, Sept. 92–96 http://www.sciencedirect.com/science/article/pii/S01918869 13012890 Contacts: Danilo Garcia, Doctor of Psychology, Centre for Ethics, Law and Mental Health, Sahlgrenska Academy. +46 733-10 51 53 danilo.garcia@euromail.se Sverker Sikström, Professor in Cognitive Psychology, Lund University. +46 70-3614333 sverker.sikstrom@psy.lu.se - Source: Galaxy S5 fingerprint scanner hacked with glue mold http://www.bbc.com/news/technology-27050779 Dr. Bookspan loves good science. Send forensic jokes, quotations, websites and stories for possible inclusion in “Bookspan’s Bullets.” Telling the Date from a Fingerprint Scientist at the Dutch Forensic Institute (NFI) are researching a way to date fingerprints. Some chemicals left by a person in their fingerprints disappear over time. The relative proportions of what is left tell approximate date it Email: Bookspan’s Bullets 4 V I D O C Q S O C I E T Y Vidocq Member News Donna Fontana Receives 2014 Meritorious Service Award Book Review “Good Hunting” By Dawn Perlmutter, PhD, VSM "Good Hunting: An American Spymaster's Story" by former Deputy Director Operations, CIA, Jack Devine, VSM, is an outstanding read, and Jack Devine is the "real deal." Over his 32 years of active duty with the CIA, he was a part of, or has, witnessed some that agency's most famous operations and cases. By William L. Fleisher, VSM, Vidocq Society Commissioner Donna Fontana, VSM received the 2014 Ajit R. Tungare Meritorious Service Award on Tuesday June 17 at the NJSP in Hamilton, N.J. It is awarded to one forensic scientist each year who has been nominated by their peers and selected by a committee consisting of the Laboratory Directors and the Chief Forensic Scientist within the Office of Forensic Sciences, New Jersey State Police. The award embodies the principles of selfless dedication, integrity, and professional excellence in their field. Donna exemplifies all of these principles. For those Vidocq members who are unaware of Donna's many talents and public service: For Devine's first posting, he was stationed in Chile during the Allende presidency and subsequent assassination, which according to popular belief was orchestrated by the CIA. Devine deftly puts that myth to rest. However, the agency in my opinion was severely hamstrung because of the misguided restrictions placed on the "Company" by the naive Senator Frank Church and his Senate Intelligence Committee. The ramification of good intentioned liberals in Congress had, again in my opinion, created the lack of interagency communication, which set off the conditions which led to the horror of “9/11.” That is my opinion. Throughout the book, Devine shares his informed opinions about that and other related matters involving the Country's intelligence efforts. Donna Fontana is the Forensic Anthropologist for the New Jersey State Police. Since 1981, she has been providing assistance to New Jersey law enforcement agencies and county medical examiners in the forensic anthropological analysis of human skeletal remains. She provides on-scene assistance in the search for and identification of buried, hidden, or scattered human remains. She is also responsible for the controlled excavation and recovery of human remains. She is skilled in threedimensional clay facial reconstruction and also assists in reconstruction composite drawings of the face based upon analysis of the skull. Donna is a tact officer with the New Jersey State Police for National Crime Information Center (N.C.I.C.) Database for Missing (MP) and Unidentified Persons (UP) entries and modifications in New Jersey. Donna is also a Case Manager for the National Missing and Unidentified Persons System (NamUs). Donna Fontana is a Fellow in the Physical Anthropology section of the American Academy of Forensic Sciences. She also is a member of the Disaster Mortuary Operational Response Team (DMORT) Region 2, and has worked in the identification process of victims of the World Trade Center on September 11, 2001 in New York City, American Airlines Flight 587 on November 12, 2001 in Queens, New York as well as EgyptAir 990 plane crash on October 31, 1999 off Rhode Island. Donna can be reached at fontana.donna@gw.njsp.org Probably Devine's most famous assignment was coordinating the CIA's covert action in Afghanistan during the Soviet occupation of that country. Devine was responsible for arming the Afghan tribesmen with, among other ordinance, the Stinger Missiles which took the Soviet helicopter gunships out of the equation. That was the most critical thing that led to the Soviet's eventual withdrawal from the country, the ability to knock out their formidable helicopter gunships. This CIA operation was later written about in "Charlie Wilson's War," which became a movie. In the book, Devine walks us through his long and distinguished career with the CIA with a well written and easy to read work that will became a must read for all of us interested in this genre. More importantly, he provides firsthand insight to the Company's internal workings, culture, and tradition. The title "Good Hunting" refers to the CIA tag-line on all cables sent to the field. The term re- 5 Member News Continued on Next Page V Continued from Previous Page I D O C Q S O C I E T Y Vidocq Member News Book Review of “Good Hunting” New Articles by Dawn Perlmutter, VSM cont’d By Dr. Dawn Perlmutter, VSM minds field officers of their primary job is to seek out and gain human assets. I particularly loved Devine's descriptions of "Tradecraft." Tradecraft is the bread and butter of covert intelligence operations. Benghazi – The Signs of Al Qaeda. A review of the jihadist hand signs and graffiti that were used during the Benghazi attack. http://www.frontpagemag.com/2014/dawn-perlmutter/ben ghazi-the-signs-of-al-qaeda/ Devine tells his story with humor, passion and from a perspective few have. He reports on some of the heretofore-unknown aspects of catching the Soviet moles, Aldrich Ames and Robert Hanson. Devine started out training with, and working alongside, Ames. He was also at onetime was Ames' Station Chief. Devine analyzes for the reader what make someone like Ames become a traitor. Jihadist Gang Graffiti. How Jihadists use graffiti in the same manner and for the same reasons as criminal street gangs. http://www.frontpagemag.com/2014/dawn-perlmutter/jiha dist-gang-graffiti/ The Boston Black Widow - Where is Heda Umarova — Dzhokhar Tsarnaev’s longtime friend? http://www.frontpagemag.com/2014/dawn-perlmutter/theboston-black-widow/ Finally, Devine offers the reader an outstanding game plan for the future of the Intelligence game for this country. His risk assessment and game plan for the future is brilliant and should be a beacon for this country's leaders. In fact, this is one book that should be required reading for every member of Congress (for those who can read) and all the President's men. Do not walk: run out and get Good Hunting. I myself will never look again at the Intelligence business in the same way again. Great job Mr. Devine, and thank your for your distinguished career protecting us. ‘Jinn’ – Supernatural Thriller versus Real Life Horror. A movie review comparing the film’s portrayal of Jinn with symbolism and ritual practices that occur in real life belief in Jinn, including ritual killings and violent atrocities committed during Jinn exorcisms. http://www.frontpagemag.com/2014/dawn-perlmutter/jinn -supernatural-thriller-versus-real-life-horror/ Jihadist Trophies of War. Interprets the abduction of three hundred schoolgirls for the purpose of selling them into sexual slavery, and the beheading of enemies by al Qaeda linked jihadists as a modern expression of the ancient and widespread practice of human trophy taking. http://www.frontpagemag.com/2014/dawn-perlmutter/jiha dist-trophies-of-war/ Ryan N. Shapiro, New Director of Safety & Security at Visitor Center By Ryan N. Shapiro, VSM Here is my new contact information. If you have the chance to be a tourist in Philly, please come see me at the Independence Visitor Center: Ryan N. Shapiro Director of Safety & Security One North Independence Mall West 6th & Market Streets Philadelphia, PA 19106 P 215-925-6101 ext. 6116 F 215-925-6106 Cell 267-320-5084 Bowe Bergdahl Dances With Wolves. The nature of Bergdahl’s disillusionment, Taliban sexual practices, and Pashtunwali and American concepts of honor. http://www.frontpagemag.com/2014/dawn-perlmutter/bow e-bergdahl-dances-with-wolves/ Contact: Dawn Perlmutter, Ph.D. 215-493-5778 dperlmutter@symbolintelligence.com 6 Member News Continued on Next Page V I Continued from Previous Page D O C Q S O C I E T Y Vidocq Member News Jack Devine Speaks on "Civility in the Spy Business" Ben Redmond Leaves AIG By Ben Redmond, VSM, Deputy Commissioner Vidocq Society By Bruce Hulme, ISPLA Director of Government Affairs Ben Redmond,VSM, has recently resigned his position as Chairman of the training committee of the National Association of Inspectors General, AIG. The AIG is an organization of approximately 600 members to include investigators, audit and support personnel from the Federal, State and local levels of government. These offices are located throughout the United States and overseas and are charged with investigations of corruption and fraud within these governmental entities. Intellenet member Jack Devine, retired CIA Acting Director and Associate Director, as part of the Speakers Series "Civility in America" gave the talk, "Civility in the Spy Business" at the Ferguson Library in Stamford, CT on June 24. The AIG also conducts intensive five day training courses for investigative personnel throughout the United States at least twice annually. Completion of this institute results in AIG certification for successful attendees. Nate Gordon, VSM, continues as sole instructor for the sensitive and important six hour course in “Interviewing and Interrogation Techniques.” Nate also continues to receive the highest evaluations of any of the instructor cadre who present at this well recognized forum. Jack Devine, a 32-year veteran of the Central Intelligence Agency, is one of the legendary spymasters of our time. He was in Chile when Allende fell; he ran Charlie Wilson’s war in Afghanistan; he had too much to do with Iran-Contra for his own taste, though he tried to stop it; he caught Pablo Escobar in Colombia; he tried to warn George Tenet that there was a bullet coming from Iraq "with his name on it." Devine served America’s interests for more than thirty years in a wide range of covert operations, ultimately overseeing the Directorate of Operations, a CIA division that watches over American covert operatives worldwide. He is a founding partner and president of the The Arkin Group, LLC in Manhattan. Congrats to the Philadelphia PD SVU By William L. Fleisher, VSM, Vidocq Society Commissioner On behalf of our membership, I want to congratulate our fellow Vidocqian, Capt. John Darby, VSM, and his great team of detectives of the Special Victims Unit (SVU) for quickly identifying and arresting a criminal now facing charges that include rape, robbery, burglary, kidnapping, and other offenses. Great job John! The first 100 guests to the lecture received a free copy of Devine's book, Good Hunting: An American Spymaster's Story. For more event details, call 203-351-8231, or online: http://www.fergusonlibrary.org/ The following linked article tells how the detectives used "good investigative work" to find and take the perpetrator into custody: http://www.philly.com/philly/news/Man_charged_in_Ritt enhouse_Square_rape.html 7 V I D O C Q S O C I E T Y UNDERSTANDING NONVERBAL BEHAVIOR: BACKGROUND by Nathan J. Gordon, VSM to their own instinctual devices, will take whatever they can while protecting their own territories and families (clan) from aggressors. All others, and all other property, are fair game if instinct is our sole guide. Any time two or more people meet, a complex communication takes place, whether words are exchanged or not. Most experts in the scientific communities that do research into verbal and nonverbal communication believe that the verbal content (words) of a communication accounts for only about seven percent (7%) of how the message will actually be received. The tone used in delivering the message accounts for thirty-eight percent (38%), and the nonverbal behavior delivered with the verbal message accounts for fifty-five percent (55%) of the communication. When we enter society, however unwillingly, we learn to set aside using our instincts to behave in such a socially unacceptable manner. Society cannot survive if this instinctual, essentially selfish, behavior exists. Participation in society requires cooperation. Our social institutions, religions, governments, laws, politics, taboos, arts, and sports have evolved to help maintain order in society by redirecting our natural, aggressive instincts towards positive and socially approved objectives. This article should give you a better understanding of the vast importance that nonverbal behavior plays in every communication, whether public or private, that you must operate in. As a result of this, you must be aware of how nonverbal behavior will affect your communication with others and their perception of yours. Whenever social institutions and/or controls break down, humans tend to revert back to their primitive instincts of aggression, territoriality and tribalism. Current history leaves little doubt that this is the way humans behave. If you question this, look at the trouble spots around the world today. Whether it is Iraq, Afghanistan, Egypt, or areas in major cities in the United States, whenever social controls and institutions break down, there is conflict and aggression based upon territoriality and tribalism. Nonverbal behavior is not something new. It is far from a twenty-first century phenomena. From the beginning of our species’ existence, nonverbal behavior was present and played a major role in our communication with others. The Bible is full of similar examples recognizing nonverbal and verbal nuances from the beginning of humankind. In fact, nonverbal behavior probably played an even more important role in primitive times, since our ability to articulate was far less. Every mammalian group has found its place in the world where the environment is suitable for their species to survive and continue their existence. When this place is found, each species then defines the boundaries of its territory, and sets up rules and guidelines to keep its “own” within that territory, and to keep non-members out of it. As a group we look down upon members that go outside of the established boundaries, and we become defensive and aggressive when outsiders attempt to come in. It is interesting that it was not until the latter half of the 20th Century that scientists began to pay attention to the role of nonverbal behavior in the communication process of humans. We were so involved with our special abilities and interests in language that we hardly noticed nonverbal or kinesthetic behavior until the 1950's, and we virtually denied the evolutionary territorial and dominance behaviors of our species until the late 1960's. In my own life, I remember vividly the problems I incurred when I married outside of my religion. There was enormous pressure on me from the Jewish side of my family not to marry someone of the Catholic faith. There was just as much pressure on my wife from her family not to marry outside of the Catholic faith. It became very clear that we had violated social and religious boundaries As we attempt to understand the origin and nature of nonverbal behavior we must first come to understand that at the core of every human there are three basic evolutionary instincts: we are aggressive, we are territorial and we are tribal. What this means is that humans, when left 8 Continued on Next Page V I D O C Q S O C I E T Y NONVERBAL BEHAVIOR - Ideas From Nate Gordon, VSM Continued from Previous Page Those scientists arguing in favor of “Nurture” point out the differences between cultures around the world. Those arguing “Nature” point out the vast amount of similarities between people around the world. Perhaps the truth actually lies somewhere in between. Desmond Morris, a famous anthropologist, attempted to bridge this argument writing, “Man’s greatest genetic gift is his vast capacity for learning from his environment.” Thus, he recognized that how we behave has a genetic heritage that can be molded or altered by the environment in which we are raised. which threatened the comfort and safety zone of those in both of our families that were living within them. The system of territories is very complex, and involves an elaborate group of sub-territories that we establish. From our homes, to our neighborhoods, to our nations, to our religious and social groups, we establish explicit or implicit boundaries around the areas in which we live, work and play. We use names, walls, fences, and various other methods to “stake out” the boundaries of our territory. In many species, especially primates such as humans, adults pair off into even smaller subgroups, or families. It is within these subgroups that breeding and child rearing takes place. In addition to the “Nature vs. Nurture argument,” there is an ongoing debate between the fields of Psychology and Anthropology as to the role that nonverbal behavior actually plays within society. Numerous studies have shown the extreme negative effects that occur in development and subsequent behavior when primates are separated from their parents at birth. Separation from the group or shunning was, and is, a common punishment for a group member who goes against the rules of the “pack." Researchers in the field of anthropology believe that the role of nonverbal behavior is to help to maintain and regulate relationships between humans. These researchers do not make references to movements and the process of communication, or conscious mental processes. Instead, they maintain that there are numerous nonverbal behaviors that occur within all primates which allow for group cohesiveness and help establish the power structure within the group through dominant nonverbal behavior. Over the past sixty years a great deal of research has been done by the scientific community into nonverbal behavior. Various fields of scientific discipline have studied this phenomenon. These fields include: psychology, physiology, and anthropology. Since nonverbal behavior falls under the umbrella of so many disciplines, it is not surprising to find disagreements within these scientific communities about the origin of nonverbal behavior and the purpose it serves. For example, in apes, the specific nonverbal behaviors which establish the hierarchical position of each member in the group involves eye contact and grooming. A lower ranking ape, classified as a beta ape, will not make eye contact with a higher ranking alpha male ape. The beta ape will perform subservient functions, such as: perform cleaning and grooming gestures, like picking bugs off of the alpha ape. One major argument in the psychological domain is whether nonverbal behavior is due to “Nature” or “Nurture.” The “Naturists” argue that our behaviors are genetically passed on to us directly from our ancestors. Those scientists that hold to the “Nurture” argument maintain that the way we behave is solely dependent on the lessons we have learned from the environment in which we were raised. Alpha apes used the bow to show the beta apes they were not going to be aggressive. This nonverbally signaled to the beta apes that it was okay for them to approach the more dominant alpha apes to perform their subservient grooming rituals. 9 Continued on Next Page V I D O C Q S O C I E T Y NONVERBAL BEHAVIOR - Ideas From Nate Gordon, VSM Continued from Previous Page ancestors made hundreds of thousands of years ago when they were being carried in their mother’s arms and wanted to suckle at her breasts. It is interesting that this form of nonverbal subservient grooming behaviors can also be used by humans to diffuse a hostile situation by communicating submissiveness and nonverbally giving recognition to the other person that they are more powerful. For example, if someone is yelling at you, you can use this nonverbal gesticulation as a way to neutralize the situation by simply say, “Excuse me,” as you act as if you are picking lint or a thread from the individual’s clothes (like the beta ape recognizing the power of the alpha ape by picking bugs off him), “I’m sorry, please go on.” More often than not, this simple nonverbal gesture will cause the other person to discontinue their verbal barrage on you, or to continue in a much less aggressive manner and tone since you have nonverbally given recognition to their dominant position. Our hand up, palm out gesture, which we use to signal “Hello,” is actually an early nonverbal gesture indicating to another person that we come in peace; as we show them we hold no weapon in our dominant hand. The hand shake commonly used in modern times was an extension of this gesture. Grasping another’s hand guaranteed that neither of you had a weapon in your hand. The firmness of the grip also gave an indication of your strength. It is apparent that almost all nonverbal behaviors can be explained by evolutionary, genetic, or environmental factors. It appears that nonverbal behavior may be the result of a multitude of sources; however, regardless of their origin, they are observable and their end result can be scientifically explained as a reliable indication of psychophysiological changes occurring in us as our brain prepares us to cope with various stressful and nonstressful situations. At the same time, many of these gestures help us to maintain homeostasis, which is harmony between our internal and external environments. Unlike the anthropologists who view nonverbal behavior solely as a method of maintaining the social structure of a group; psychologists view nonverbal behavior as a communication which expresses both thoughts and emotions. They argue that many of the basic nonverbal behaviors we use today appear to have originated from primitive times to communicate messages other than those that deal solely for regulating the social order. In the next article, I will classify nonverbal behavior into three distinct categories and explain their importance. For example, our side to side head nod, which almost universally means “No,” probably originated from a primitive person moving their head from side to side in that manner as they signaled to another person they did not want something being offered to them to eat. Imagine trying to give a baby medicine orally that it does not want to consume. The baby will move its head vigorously from side to side to avoid consumption. Is this nonverbal gesture inherent or extrinsic? There are some researchers that argue that perhaps this specific behavior’s commonality is actually due to the very limited motion of the head itself. Conversely, it is believed that our up and down head nod, which in most cultures means “Yes,” probably originated from the up and down head movements our early infant 10 V I D O C Q S O C I E T Y Digital Forensics with Peter Stephenson, PhD Protecting Vidocq on the Net By Peter Stephenson, PhD, CCFP, CISSP, CISM, FICAF, LPI, VSM Continued from First Page the email, you are a party in a lawsuit. The “documents” really are malware-infected files and if you click on them you are infected. What the malware does depends upon the phisher’s intent. In one case I examined it was a thing called a “downloader.” Downloaders go out to the Internet and download lots more malware on to your computer. That malware might steal your banking information, for example. Did anyone at my client bite on this when it came to several whales in the organization? Yep…. The corporate attorney. Nobody is immune. guised as something we need. If we belong to mail lists, use social media or respond to on-line ads, we expose ourselves to infection, phishing scams, or worse. Figure 1 - Cyber Attacks Against US Targets over a 3 Minute Period on 4 July 2014 at 2:30PM EST Cautionary tale out of the way, let’s dig into what can hurt you as investigative and forensic experts and what you can do about it. Two weeks ago I did a training session for a financial services organization. The topic was whaling. Whaling is a special kind of phishing scam that targets people high up in an organization – “whales.” These folks are not targeted because they are big-wigs, have the keys to the network castle or are dripping with wealth. They are targeted because they are the least well-trained people in the organization. They are, from the perspective of network compromise, low-hanging fruit. I thought that in an organization such as the one I was working with I would find no workers who would succumb to a whaling scam. I was wrong. First, let’s be plain: the depths of malicious computing are not your province. They are mine. Your job probably is to be an investigator, medical examiner, lawyer or other forensic/legal/investigative professional. Unless you spend your days as I do getting your hands dirty in the sludge of the Internet’s back streets and gutters you probably don’t know what a nasty, ugly place cyberspace really is. That’s not the problem. The problem – your problem – is that the Internet knows who you are and that’s a bad thing. It is especially bad because you may need to venture into some of those dark virtual alley-ways from time to time to do your job and, candidly, you may not be prepared for what you find. There is a particular phishing scam that purports to send you documents that you will need because, according to 11 Continued on Next Page V I D O C Q S O C I E T Y Vidocq on the Internet - Digital Forensics with Peter Stephenson, PhD Continued from Previous Page connection. This is an Internet connection that does not go onto the organization’s network. You are connected “barefoot” to the Internet. That way if something goes wrong, you don’t endanger the network. You can ask that the connection not be in the DNS – domain name system. That way you will have an IP address but you won’t trace back to your organization. That has a few other benefits that we won’t go into this time – it’s a topic in itself. That’s the real purpose of this column: I want you to know what you really are up against and I want to help make it safer for you to do your job when that job takes you on-line. First, make no mistake: the Internet is the best reference source that ever was. Some of us simply could not do our jobs without it. Being 70 years old, I have both feet in research as many of you do. We recall when research meant a trip to the appropriate library. Then we got some primitive on-line resources. Now if it exists at all, information about something we need probably is at our fingertips after a little creative searching. So opting out of the ‘Net” just isn’t in the cards for most of us. Fortunately, there are a few tricks that we can use. I am going to spend the rest of this column talking about them and giving you some really neat ways – sometimes a little geeky – to get the job done without taking unnecessary risks. The minute you do this, of course, you take risks. You no longer are protected by the organization’s firewall so you need one of your own. On my barefoot connections I use two. One is the hardware router that I use to connect to the Internet. You can get one of these for under $50 at Best Buy. It is a simple Internet router. Your system administrator can set you up or you can do the same thing for yourself at home. I’ll dig into that in a moment. In addition to the hardware firewall I set up the Windows firewall. You can do the same thing with a Mac. If you don’t know how to do this, get some help. I am not going to spend a lot of time with the same old stuff about using strong passwords, not reusing passwords on multiple sites/systems, not clicking on unexpected file attachments in emails and keeping your antimalware up to date. You have heard that until it’s like the safety presentation on an airplane: most of us have heard it so often that we unintentionally or otherwise, tune it out. Keep all of this in mind, of course, just as you do on that airplane, but let’s get a little more exotic. I’ll start with some simple stuff that is good for most of us and then I’ll address the really high risk users. Next: BACK UP EVERYTHING! This computer is what we refer to as “sacrificial”. That means that we go bad places with it but we don’t really care. If it gets infected we blow it away and start over. It takes a while to do but if we back up regularly we lose nothing. I really like to back up using images because then I never need to re-install any software. There are some great tools from Laplink Software for doing this. I won’t take the space to dig deeper into this but your system administrator or the Best Buy sales person can help educate you on what to do and how to do it. Here are some simple rules and techniques for the average moderate risk user. I am not talking about the average home or business user… this is for those of you who do things as part of your day-to-day work that are moderately risky such as searching porn sites for child pornography, prowling the social media for child predators or running predator stings. Now, you need something to back up to. I like the external USB drives. These are external hard drives that are up to three terabytes in size. That should do the job for most of you. If you travel a lot take a look at Western Digital MyCloud. It’s a very cool way to have remote file access with the security of controlling your own storage space. Backup daily or every time you change something, create new documents, etc. First, if you work in an office of an organization, ask your system administrator if you can have a “barefoot” 12 Continued on Next Page V I D O C Q S O C I E T Y Vidocq on the Internet - Digital Forensics with Peter Stephenson, PhD Continued from Previous Page machine – banking information (shudder) for example – is not accessible from the virtual. So, for the rest of the column I will use this terminology: the host – your physical computer – we’ll call “the physical” and the guest – the virtual computer that you install – we will call “the virtual.” Pretty simple. Next is the issue of malware. I run two anti-malware programs on my systems: McAfee and Avast. That is not a recommendation, by the way… it’s just an example. The two work together well. My university requires McAfee and Avast is free. What one doesn’t get the other probably will. So I have yet to be infected – unless I did it to myself, of course… I do move malware around from time to time and I turn off the anti-malware to do it. I have been known to be careless about that and cause myself a bit of heartburn. You won’t likely have the same issue. Keep the anti-malware up-to-date. There are about 2,000 new pieces of malware per day hitting cyberspace – not all “in the wild”, of course, so you will never see that many, but there is a lot of bad code out there to be sure. The first step is to set up your physical machine the way you want it. Don’t put all of your working tools – the ones that you use for risky business – on the physical. We are going to put them in the virtual. The virtual really is just a very special file. But as far as you are concerned it looks, feels and acts just like a physical machine. Now, on to the stuff for very high risk users. If you routinely visit the seamy side of the ‘Net, in addition to the thoughts above, here is another: move up to a virtual environment. Before you turn off completely, let me try to make this really simple (easy to do because it is). Your physical machine needs a bit more muscle than you may be used to. You probably are running Windows 7 or 8. But you need more memory. I recommend between 6 and 8 GB of RAM. Also, you should have a TB of disk if you can but 750GB is OK too. If all of this seems way beyond you, get some help from someone who knows what to do. What we are going to do is put a computer inside your computer. If you are a Mac user who also runs Windows from inside your Mac you know all about virtualization already. That is how you put the two operating systems on the same computer. I am not talking about what Windows users call “dual boot” here. That is when two different operating systems are on the same PC and you can choose which one to boot into. Virtualization actually runs both computers – called the host and the guest – at the same time. It takes a bit of special software but that is free. The virtual software is free. I like Virtual Box. It is easy to use and it is reliable. Installing it is simple – just follow the instructions after you download it, and you’ll be fine. Now you need a second copy of Windows. This is the only thing that is going to cost you money. You will install Virtual Box, then the second copy of Windows and finally, you’ll do some configuration. This is all welldocumented at the Virtual Box site but if it is beyond you get some help. There is one more really big benefit to working in the virtual. You can, as part of your setup, create what is called a snapshot. This is an exact copy of the virtual and if you blow the virtual away with a virus or some such you can do a couple of mouse clicks and revert to the original clean version. Your physical machine will remain unharmed. What that means in practical terms is that you can install all of your work tool on the virtual, Before we get to the how-to, let’s talk about why. When you run in a virtual environment nothing that you do in the virtual computer can hurt your physical computer (usually – but that is a hard topic to include for this discussion). That means that you can be infected with malware, or whatever and your safe – I’ll explain how shortly. Also, anything that you keep on your physical 13 V I D O C Q S O C I E T Y Vidocq on the Internet - Digital Forensics with Peter Stephenson, PhD Continued from Previous Page Dr. Peter Stephenson, VSM, CISSP, CISM, FICAF, holds a PhD in digital investigation and a Master’s Degree in diplomacy with a concentration in terrorism. He is the director of the Norwich University Center for Advanced Computing and Digital Forensics as well as being the chief information security officer for the university. He conducts all university investigations that have any connection to computers or the Internet, and teaches various courses in digital forensics and cyber investigation. His PhD, from Oxford Brookes University in the UK, was one of the first in the world to be awarded based upon research in digital forensic investigation. He has written or contributed to 16 books and hundreds of articles. snapshot it and then all you need to do is make sure that you have backed up your data. If you have an accident, revert the virtual machine and restore your data from backup… voila! All is well again. We’ve covered an awful lot of territory. For next time allow me to suggest that you send me your questions about this and I will expand in the next column (pstephen@norwich.edu). Perhaps it might be worth considering a brief tutorial on high risk computer use at one of our meetings. So all of that said…. See you all in the fall. Until next issue…… Request for Printed Journals For Shut-In Members Please save your printed copies of Vidocq Journals for HQ to provide to retired members without Internet. Mail or drop off to: Vidocq Society. 1704 Locust Street, Second Floor, Philadelphia PA 19103. Attention Dr. Bookspan, Science Officer, Journals. Books and eBooks By and About Vidocq Members Susquehanna Road: How Rem Bristow, Bill Kelly, and a Myriad Group of Philadelphia Investigators Solved the Cold Case of the Boy in the Box. Good Hunting: An American Spymaster's Story by former Deputy Director Operations, CIA, Jack Devine, VSM, and and Vernon Loeb. Click to order Susquehanna Road. Click to order Good Hunting: An American Spymaster's Story 14 Books Continued on Next Page V I D O C Q S O C I E T Y Books and eBooks By and About Vidocq Members The Murder At Asbury Park CD-ROM by Peter Lucia (Author, Editor), with original art piece by Frank Bender, VSM, is an illustrated ebook that visually incorporates recently unearthed reports of one of the 20th Century’s most remarkable murder cases and sting operations. Since 1911, the story has been told only as series of anecdotes, in brief “amazing detective” articles in pulp magazines, Sunday supplements and publications like The Reader’s Digest. What was once a little parlor story is now a 400-page ebook that uses scans of stirringly written case materials, an archive revealed for the first time in nearly 100 years. In addition to hundreds of case materials, THE MURDER AT ASBURY PARK contains 250 photographs and illustrations, many quite rare. Click to order The Murder at Asbury Park. The Girl With The Crooked Nose by Ted Botha. Tells of Frank Bender’s work as a forensic artist and founding member of the Vidocq Society, to bring attention and resolution to hundreds of neglected murders of women near Ciudad Juarez, Mexico. From this work, Frank and his daughter Vanessa have donated time and talents to assist the Ni Una Mas project (Not One More). Click to order The Girl With The Crooked Nose. A Manual of Private Investigation Techniques: Developing Sophisticated Investigative and Business Skills to Meet Modern Challenges by William F. Blake. David L. Ziegler, VSM, CFE, and Lt Col Jim Carino were contributors to Intellenet's third book on investigations. Ziegler, along with his son Chris, wrote the chapter How to Identify and Solve Arson, based on his years of experience as a Supervisory Federal ATF agent and working as a PI with in surance companies. Jim Carino's chapter is The Making of a Security Expert Witness. Jim is a retired Air Force OSI Lt Colonel Special Agent with over 50 years in the public and private sector. Ziegler is a retired ATF Special Agent with a combined 43 years in the public and private sector. He specializes in fire, arson and bombing cases. Jim now specializes in providing expert witness testimony in civil litigation cases involving premises liability and security negligence. Click here to order Manual of Private Investigation Techniques. Asesinos En Serie. Edición en Español (Spanish Edition) by Robert K. Ressler (Aug 2005). 384 pages. Click here to order Asesinos En Serie Spanish edition and here for more books by Robert Ressler. Click links provided with each book to get your copies, Or the Vidocq web site: http://vidocq.org/books.html 15 Books Continued on Next Page V I D O C Q S O C I E T Y Books and eBooks By and About Vidocq Members - www.Vidocq.org/books Effective Interviewing and Interrogation Techniques, Third Edition, by Nathan J. Gordon and William L. Fleisher. A practical manual providing the forensic practitioner/investigator critical insight into human behavior, enabling one to become a better interviewer, interrogator and, most importantly, an expert detector of truthful and deceptive behavior. Gordon and Fleisher have created a one-stop guide to mastering the art of credibility assessment during an interview, with successfully tested techniques for obtaining a confession from guilty suspects. Forensic practitioners, law enforcement, the intelligence community, the private security sector, attorneys, and forensic and criminal justice students will all find this volume a valuable resource. • The only book to address FAINT, IIT, and MITT in one source • Enables the interviewer to obtain a confession that can stand up in court • Includes an online workbook with practical exercises to assist the reader The third edition expands chapters on torture, assessing the interview, statement analysis, MITT, and interrogation. It contains new chapters on passenger screening, and report writing, along with new case studies. Also covered are ways to maximize the collection of information from a prospective employee, and legal considerations. The Forensic Assessment Interview Technique (FAINT) and the Integrated Interrogation Technique (IIT) were developed at the Academy for Scientific Investigative Training and are used by forensic practitioners and investigators to detect truthful or deceptive behavior. FAINT is applicable to all forensic type interviews and incorporates the assessment of nonverbal behavior, projective analysis of unwitting verbal cues, statement analysis and the Morgan Interview Thematic Technique (MITT). This volume teaches how to combine, apply and quantify these techniques to reach a numerical conclusion to the truthfulness of the interviewee. Order here in hardcover and Kindle. Cold Case Homicides: Practical Investigative Techniques by Richard H. Walton, EdD, VSM, provides effective and accessible information to those responsible for investigating and resolving previously examined, but still unsolved, cold case homicides. The book merges theory with practice through use of case histories, photographs, illustrations, and checklists that convey essential, fundamental concepts, while providing a strong, practical basis for the investigative process. It combines proven techniques from forensics, psychology, and criminal investigation, and focuses on technologies that may not have been available at the time of the crime. This guide defines the characteristics of a cold case homicide; details various investigative methods used by law enforcement agencies; explores the actual experiences of detectives in reopening case files; and presents current technologies such as ViCAP, HITS, and TracKRS used in the identification of cases related to the reopened case, or its perpetrator. It also highlights technological changes that contribute to law enforcement's abilities to solve cold case homicides, such as computerized print technology, the specificity of DNA, and the expanding data banks that enable the linkage of previously unknown suspects to the crimes they committed. Available for order in hardcover and Kindle. Submit Books By and About Members for Listing in the Vidocq Journal Include: ➡Graphic of Cover ➡Synopsis ➡Author Bio and Member Status Email Dr. Bookspan, Science Editor 16 Books Continued on Next Page V I D O C Q S O C I E T Y Vidocq Society in Print: Books By and About Members - www.Vidocq.org/books Continued from Previous Page In Trail of Blood, The Vidocq Society helps solve the murder of 24 year old Scott Dunn. Scott's parents never gave up when his killers left no body, no weapon, only blood, so much blood. “When Jim Dunn got the heart stopping call every parent dreads: "Your son has disappeared" on a Sunday night, it set into motion a six year nightmarish odyssey of desperate searches. Dunn turned to Richard Walter of the Vidocq Society, forensic pathologist and criminal profiler, who consulted Scotland Yard, studied DNA evidence and blood spatter patterns, and then pointed out who he deduced killed Scott Dunn, and why.” Click to order Trail of Blood. The Murder Room. Michael Capuzzo introduces the founders of the Vidocq Society, talented courageous sculptor Frank Bender, Commissioner William Fleisher, and criminal profiler Richard Walter. Learn what inspired them to help solve cold case murders. Click to order in Print, Kindle Edition and Audio Versions. Deadly Betrayal: The CBS Murders is based on an actual major, high-profile investigation, told from the inside by FBI man Don Richards, VSM. “An undercover agent is killed in a Chinese Tong gang-war and FBI Supervisor Dan Robertson can't prove the operation was authorized. He is set up as the scapegoat, and told to involve himself in a safe white collar fraud case until things get sorted out. But that case is far more sinister, and soon Robertson finds himself partnered with NYPD Detective Richie LeBeau in a complex multiple murder investigation which might connect to the Tong. Overcoming personal clashes, inherent distrust, agency rivalry, and leaks to the media, they use every crime-solving and forensic technique to identify the killer, and build their case. When sharp legal maneuvering threatens to dismantle their work and free the killer, they must find a way to resurrect the case and bring justice to a terrible crime.” Click to order Deadly Betrayal. In Someone’s Daughter, Silvia Pettem tells of a young woman, known only as "Jane Doe," found murdered in 1954 in Colorado. Pettem spurred the Vidocq Society and Boulder County Sheriff’s Detective Steve Ainsworth to find the woman's name and killer. Several Vidocq members selflessly volunteered resources and time: Dr. Richard Froede and Frank Bender did skull and facial reconstructions. Dr. Walter Birkby, Dr. Robert Goldberg, and Dr. Terry Melton worked on DNA. Fred Bornhofen coordinated. Many others contributed. In October 2009, DNA comparison with a surviving sister confirmed Jane Doe's identity as Dorothy Gay Howard, an 18-yearold missing from Phoenix, Arizona. Click to order Someone’s Daughter. 17 Books Continued on Next Page V I D O C Q S O C I E T Y Vidocq Society in Print: Books By and About Members - www.Vidocq.org/books Continued from Previous Page Investigating Religious Terrorism and Ritualistic Crimes by Dawn Perlmutter, VSM, director of Symbol & Ritual Intelligence, is the first complete resource to assist in crime scene identification, criminal investigation, and prosecution of religious terrorism and occult crime. It analyzes occult and religious terrorist practices from each group’s theological perspective to help you understand traditional and contemporary occult groups and domestic and international terrorist religions, demarcate legal religious practice from criminal activity, and acquire techniques specific to occult and terrorist religion crime scene investigation. Click here to order in hardcover and Kindle. I Have Lived in the Monster: Inside the Minds of the World’s Most Notorious Serial Killers by Robert K. Ressler and Tom Shachtman. Agent Ressler, who coined the term “serial killer” in the 1970s, recounts his years since leaving the FBI, working as an independent criminal profiler on some of the most famous serial murder cases of our day. Piecing clues from crime scenes, along with killing patterns and methods, Ressler explains his role assisting investigations of such perplexing international cases as England’s Wimbledon Common killing, the ABC Murders in South Africa, and the deadly gassing of Japan’s subway. We’re also witness to Ressler’s fascinating, in-depth interviews with John Wayne Gacy, plus a shockingly candid discussion with “cannibal killer” Jeffrey Dahmer. Click here to order. Sexual Homicide: Patterns and Motives by John E. Douglas, Ann W. Burgess, & Robert K. Ressler. This authoritative book represents the data, findings, and implications of a long-term F.B.I.-sponsored study of serial sex killers. Specially trained F.B.I. agents examined thirty-six convicted, incarcerated sexual murderers to build a valuable new bank of information which reveals the world of the serial sexual killer. Data was obtained from official psychiatric and criminal records, court transcripts, and prison reports, and from extensive interviews with the offenders. Detailed information is included on the FBI’s Violent Criminal Apprehension Program (VICAP) along with a sample VICAP Crime Analysis Report Form. Attention is given to child/adolescent formative events, societal perceptions & pressures which may be motivational to sexual killers who exhibit aberrant thought patterns, deviant behavior, and aggression linked to sexual expressivity. 234 pages. Click to order in Kindle, paperback and hardcover. Diving and Hyperbaric Medicine Review for Physicians by US Navy diving and hyperbaric research physiologist Jolie Bookspan, MEd, PhD, FAWM, NAUI SCUBA Instructor Hall of Honor inductee. Extensive information in quick, clear bulleted format for personnel involved in hyperbaric chamber operations, scuba medical support, wound healing, and autopsy. Include all 13 approved indications for clinical hyperbaric oxygen treatment complete with protocols, equipment, codes, fire safety, and regulations. Sample test questions and answers to prepare for the Board exams in Primary or Secondary Board Certification. A complete reference of the entire field for anyone interested in hyperbarics and chamber medicine. From the Undersea and Hyperbaric Society publisher through author website: www.DrBookspan.com/books. 18 Books Continued on Next Page V I D O C Q S O C I E T Y Vidocq Society in Print: Books By and About Members Continued from Previous Page not just an arrest, but a conviction. Appendices include sample standard operating procedures from three different agencies to use as a guide for setting up a cold case unit and a list of additional resources a department may look to for assistance. 264 pages. Click to order in hardcover, Kindle, and rental. The Unknown Darkness: Profiling the Predators Among Us by Gregg McCrary. McCrary’s 25 years in the Bureau have yielded over 1000 cases to draw upon. The 10 he describes in the book reveal the strengths and pitfalls of modern criminal investigation, including the siege of the Branch Davidian compound in Waco, the Buddhist Temple Massacre in Phoenix, Arizona, the search for the Scarborough Rapist (who eventually became a serial murderer), the prosecution of Jack Unterweger (an international serial killer who committed murders in Czechoslovakia, Austria and Los Angeles), the Sam Sheppard murder case and others. McCrary answers what happens at the crime scene, what kind of person does it take to grapple with the serial killers among us, and exactly how do we disarm the enemy. 400 pages. Click here to order in hardcover or paperback. Cold Case Research: Resources for Unidentified, Missing, and Cold Homicide Cases by Silvia Pettem presents profiles and actual case histories to illustrate how investigators can successfully apply resources that will enable them to reopen and solve cases gathering dust in the file room. Today’s investigators have found that, to solve cold cases, they need to be internet savvy and make the best use of the rapidly changing methodologies of the twenty-first century, but they also have to be time travelers and open the door to the past. This volume weaves together the nearly forgotten skill sets of traditional historical researchers with the latest online tools, including TLO, a premier investigative system; and NamUs, the revolutionary dual databases for missing persons and unidentified remains. Along with practical applications, Cold Case Research gives investigators the tools they need to save time and money and to jump-start their cold cases, while keeping others from going cold in the future. Topics discussed include: · Implementing cold case units · People searches and working with databases · Overlooked DNA in PKU cards · The plight of the missing and unknown · Applying historical and geographical context · Online and off-line newspaper research · Public and published records · The use of volunteers · Contact with co-victims · Cold-case review teams and information-sharing resources · Taking advantage of the media Click here to order in hardcover and Kindle. Cold Cases: An Evaluation Model with Follow-up Strategies for Investigators (Advances in Police Theory and Practice) by James M. Adcock and Sarah L. Stein, begins with a historical perspective on how cases get to the point where it appears all investigative leads have been exhausted, and includes a chapter on understanding the process of homicide and those who kill. Next, the authors explain the evaluation model, theories of the crime, evidentiary issues and concerns, informational and behavioral aspects relative to the crime and the participants in the crime, and documents investigative strategies for future efforts on the case. The third section discusses the investigation, questions investigators must ask, choice of interview/interrogation techniques based on the behavioral aspects involved, and how the growth in technology since the date of the incident might provide new opportunities to uncover clues. Finally, the authors suggest how investigators can maximize their efforts and obtain 19 Books Continued on Next Page V I D O C Q S O C I E T Y Vidocq Society in Print: Books By and About Members Continued from Previous Page Healthy Martial Arts by Jolie Bookspan, Med, PhD, FAWM is for all in law enforcement, military, athletes, and those who need to be in top shape and prevent injuries for work and life. Training techniques for all athletes, strength, abdominal training that transfers to Spec Ops (train like you fight), nutrition, flexibility, performance enhancement drugs and foods, soreness, injuries, breathing, spirit, speed, balance, joint stability, back, neck, and knee pain prevention, stress handling, making training and daily life healthy, brain power & mental exercise, wheelchair athletes, more. Dr. Bookspan is a sports medicine specialist, military scientist, 4th degree Black Belt, 2009 Master Instructor of the Year, and former full contact fighter inducted into the International Black Belt Hall of Fame. Healthy Martial Arts won Reader’s Choice Award of the International EUSA Martial Arts Association. Approximately 200 photos. 228 pages. Click here to order from Amazon, or here (www.drbookspan.com/books) for print and eBook. Stretching Smarter Stretching Healthier by military scientist Jolie Bookspan, MEd, PhD, FAWM. Not the same old stretches. Immediately helpful innovative techniques to make range of motion, mobility, and injury prevention built-in to daily movement habits for home and work safety. Stop injuries and poor posture from bad stretching. Learn how to understand for yourself what constitutes healthful muscle length and stretching. Nearly 200 illustrations guide you step-by-step. Click here to order print or Kindle edition from Amazon, or here (www.drbookspan.com/books) for print and eBooks. Investigating Computer-Related Crime, new Second Edition (2004) by Peter Stephenson. Written by an information security specialist, this second edition of Investigating Computer-Related Crime discusses cybercrime, its investigation, and the difficulties encountered by both public law enforcement officials and private corporate investigators. The book offers insights into collecting evidence, interrogating suspects and witnesses, handling crime in progress, as well as issues involving the authorities, and helpful case studies. Updated chapters incorporate new kinds of attacks, current work of the Digital Forensic Research Workshop and their investigative model, new operating systems, the impact of the Patriot Act, and new ways of analyzing computer media. 448 pages. Order here in hardcover edition and here for Kindle. Diving Physiology in Plain English by Dr. Jolie Bookspan, former research physiologist for the U.S. Navy, inducted into the NAUI SCUBA instructor Hall of Honor. For divers from novice to instructor, medical personnel, search and rescue teams, training departments. Clear information to understand (not memorize) physiology and medicine, and apply to safer decompression, heat and cold exposure. injuries, equipment, gas mixing, fitness to dive, rescue, and other protocols. Published by the Undersea and Hyperbaric Medical Society (UHMS). Click to order: www.DrBookspan.com/books. 20 Books Continued on Next Page V I D O C Q S O C I E T Y Vidocq Society in Print: Books By and About Members Continued from Previous Page The Ab Revolution by award winning research scientist Jolie Bookspan, MEd, PhD, FAWM, teaches a key sports medicine method now used by athletes, military, law enforcement personnel, and top spine docs and rehab centers around the world. It trains lower spine and pelvic angle to neutral, quickly stopping a major source of lower back pain, and functionally strengthening abdominal and core during actual operations. Part I teaches neutral spine to stop one major cause of back pain in everyday life (no exercises needed). Part II teaches functional strengthening for entire body, from simple to the toughest you can get. No flexion that stresses discs or reinforces bent-forward posture. New Third Edition Expanded Print edition- 114 photos and drawings in 124 pages, gym-bag 6x9” size, and now in 4th Edition Kindle and eBook. Click here for Amazon or here (www.drbookspan.com/books) for print and eBook from the Author’s website. Death Investigations (Jones & Bartlett Learning Guides to Law Enforcement Investigation) by James M Adcock, PhD, and Steve Chancellor. Each crime type requires a unique approach with distinct steps. This book presents the specific functions and processes necessary to accurately assess and document cases (Homicides, Suicide, Accident, Natural, and Undetermined). Click here to purchase. Fix Your Own Pain Without Drugs or Surgery by Jolie Bookspan, MEd, PhD, FAWM. Prevent pain common to enforcement work: Upper and lower back pain, neck, shoulder, rotator cuff, hip, knee pain, and foot pain. Ankle sprains, Achilles tendonitis, fasciitis, pronation, supination, and flat feet. Herniated/ bulging/ slipping/ degenerated discs, sciatica, swayback, lordosis, spondylolisthesis, SI joint, pinched nerve and impingement. Plus stories from real patients in each chapter illustrate what works, what doesn’t, and when. Drawings and photos illustrate concepts. Each page, of 330 total, has specific things to do, things to avoid, things to check for, and/or a story of people who did and didn’t fix pain and why. Click here to order from Amazon, and here (www.drbookspan.com/books) from author website. Health & Fitness - How to Be Healthy Happy and Fit for The Rest of Your Life, 3rd ed, by Dr. Jolie Bookspan. Helpful if you have a desk job to improve health and duty readiness. 31 chapters of what works & what doesn’t for healthier body and brain. Includes heart, cholesterol, diabetes, digestion, osteoporosis, body fat tests, weight loss, supplements and performance enhancing products, mental and emotional health. Full chapters on fixing discs, neck pain, upper and lower back pain, leg cramps, and headaches. Sections on knee and shoulder pain, ankle sprains. Funny Facts about the body, and an A to Z glossary. 379 pages all-in-one-source. Click here to order from Amazon or www.drbookspan.com/books from author website. 21 V I D O C Q S O C I E T Y 2014 Meetings at the Union League Meeting Reservations 2014 Meeting Dates Only Vidocq Society Members (VSMs) who pre-register, and their guests who are pre-registered and accompanied by members, may attend Vidocq Society meetings. You must reserve your place with Ms. Alvarado at Vidocq, 215-545-1450, by close of business, the Monday before each meeting. Reserve By Close of Business -- Meetings are customarily the third Thursday of each month at the historic Union League at 140 S. Broad Street, Philadelphia, PA, www.unionleague.org. The Union League’s dress code: Business attire required for both men and women—jackets, no jeans. Cost for the luncheon meeting has increased to $40 per member and $50 for non-member guests. Both members and guests with reserved places will be asked to pay if they do not honor the reservation made for them. Parking is available at reduced rate, courtesy of Ryan Shapiro, VSM. The garage is on Sansom Street opposite the Union League entrance, between Broad and 15th Street. Ask for parking validation at the meeting. 22 For Meeting Date No July / Aug Meeting 15 September 18 September End August Black Tie Awards Sunday, 21 September 6 p.m. to 11:00 p.m. Pen Ryn Mansion on the Delaware 13 October 16 October 17 November 20 November -- No Dec Meeting V I D O C Q S C I E T Y Solve The Mystery The Vidocq Society The Vidocq Society is a Nonprofit, 501c(3) corporation, which, by the terms of its charter, is a fraternal organization comprising professionals and nonprofessionals who meet in a social setting to discuss unsolved crimes. Our work is pro not consider sented to us. Our to act as a catalyst ance to law ento assist them in solving O Q. What were the Bulgarian Cold War castor bean murders? bono and we do every case presole purpose is and provide guidforcement agencies these crimes. Super-sleuths, send your verdicts on this to Dr. Bookspan, science editor Previous Mystery: A. Congratulations to Dr. Stephenson, answering the mystery on privacy in his column this issue. Opinions offered by our members are personal opinions offered in the spirit of cooperation and goodwill, based only upon the facts presented, and should not be considered formal or legally binding opinions of the Vidocq Society. www.Vidocq.org Get In Shape For Duty Stronger Safer Vidocq Vidocq Society Journal The Vidocq Journal © Copyright 2014 Published by The Vidocq Society, Self-Defense Training and Practice a 501 (c) (3) nonprofit organization Second Floor 1704 Locust Street Philadelphia, PA 19103 Novice to Black Belt Voice: 215-545-1450 — Fax: 215-545-1773 — www.vidocq.org Shotokan Karate, Self Defense, and Physical Training for Health and Duty Requirements Subscription $150 per year K a Small class, Personal attention. Fitness, injury prevention, confidence, self defense. Special consideration for Vidocq r Members. a For a place in the next class, contact: t Paul Plevakas, Karate Sensei 3rd Degree Black Belt e Black Belt Hall of Fame Commissioner William L. Fleisher - truthfinder@netcarrier.com Deputy Commissioners Benjamin J. Redmond - benredmondredmond1247@comcast.net Fred A. Bornhofen - pipedriller@verizon.net Secretary Stanley C. P. Olkowski III - uoparrows@hotmail.com Director of Communications Edward Tenuto - ed@edwardtenuto.com Journal Paul D. Plevakas and Dr. Jolie Bookspan Plevakas, Editors Submissions to: Vidocq Editors (215) 778-2634 Paul@PaulPlevakas.com www.PaulPlevakas.com 23
Similar documents
Vidocq Journal 2014 Quarter 3-4
Movie review, ‘Jinn – Supernatural Thriller versus Real Life Horror.’ Compares the film’s portrayal of Jinn with symbolism and ritual practices that occur in real life belief in Jinn, including rit...
More informationVidocq Journal 2012 Quarter 2
To My Fellow Vidocqians: It is with mixed emotions that I report that the Lubbock Texas authorities have been able to positively identified the remains of Roger Scott Dunn, which were found last we...
More informationVidocq Journal 2011 Quarter 2
Richard Walter, VSM is an international expert on Crime Assessment, Profiling, and Risk Evaluation; retired forensic psychologist for the State of Michigan prison system; and crime scene analyst/pr...
More informationVidocq Journal 2013 Quarter 1
Psychiatrist Mark Schroeder, VSM, had an article accepted in the Forensic Examiner. The article is entitled “Improving Reasoning in Medicolegal Evaluations.” The article discusses ways to improve t...
More informationVidocq Journal 2011 Quarter 3-4
A training team of Vidocq Society Members (VSMs) contributed their expertise to the Cold Case Conference hosted in conjunction with the Vidocq Society and the Unified Police Department of Greater S...
More informationVidocq Journal 2015 Quarter 3-4
encouraged to contact Ed Gaughan, Vidocq Society training coordinator for further information at (215) 5451450.
More information