Sunteți pe pagina 1din 88

Power

Pen
of
the
Handwriting Study Gives
Powerful Insight Into the
Minds of Killers, Celebrities

Fateful
Decisions
Officers Often Must Make
Life-and-Death Decisions
in a Fraction of a Second

DVD
Destruction
Critical Evidence
Stored on DVDs
Could be in Danger

$7.50 U.S./$9.50 CAN

KIMON IANNETTA (pictured here)


AUTHOR OF THE BEHAVIORAL PROFILING
& RISK ASSESSMENT USING WRITTEN COMMUNICATION
Attention Experts! Give back to your
profession by
Teach worldwide, 24/7 helping others learn.
Be a part of our organization’s efforts to raise Increase your
standards and education for thousands of forensic
profile as an
academic leader.
science professionals. The American College of
Forensic Examiners Institute will provide you with Become an Online
a platform to reach students throughout the world. Instructor for the
This is your chance to become a leading educator,
American College of
Forensic Examiners
to influence countless students to become better
Institute.
professionals, and to earn extra income while doing it.
Teach an entire course or just a module—it’s up to you.
Call Toll Free
For more information: Send an (800) 592-1399
e-mail to courses@acfei.com

The ACFEI is accepting


course submissions in
all areas, including:
• Forensic Nursing • Forensic Photography
• Forensic Accounting • Chain of Evidence
• Forensic Investigation • Handwriting Analysis
• Computer Forensics • Criminal Behav-
• Forensic Psychology ioral Profiling
• Crime Scene In- • General Forensic Science
vestigation • All Forensic Specialties!

Above, Dr. Marc


Rabinoff instructs the on-
line Certified Forensic
Consultant (CFC) course.
The American College of Forensic Examiners Institute (ACFEI) is
an independent, scientific, and professional society that serves
as the national center for the continued advancement of forensic
examination and consultation across the many professional fields of
forensic science. There are five levels of membership and 13 different
specialty boards designed to benefit you in your forensic specialty.

Earn Continuing Education credits, receive The Forensic Examiner® in the


mail, network with other members across disciplines, and take advantage
of the membership credit card service and insurance benefits available to
members today. Members can also market their services, works, or products
on the ACFEI Web site or in The Forensic Examiner® at a reduced rate.

Don’t wait to become a valued member of this growing and nationally


recognized professional organization committed to benefiting you.

JOIN TODAY!
(800) 592-1399
www.acfei.com
Letter to the Editor

Erlichiosis Confirmed in Victim of Probable Hobo Spider Bite


Dear Editor, At the bite site, he had observed: two bleeding gums, and easy bruising, began to re-
In my article “Necrotic Spider Bite or puncture wounds (from the spider’s fangs, verse. Although his platelet count (and WBC
Tick Bite? Hobo Spider Venom or Ehrlichial ca. 5 mm apart); a red area, which had grown count), by March of 2008, had remained as low
Bacteria?” (The Forensic Examiner, 16, No. 4 to about 3 cm in diameter; formation of a as before, improved platelet function—reduced
[2007], 42-55), I had shown a symptomatic vesicle, enlarging to a boil, which he lanced, bleeding and bruising—was apparent.
similarity between necrotic spider bite and tick draining a clear fluid. The dead skin was The laboratory results confirmed infection
bite. The spider bites in question were, prob- sloughed off, revealing grayish-brown numb with Anaplasma phagocytophilum, the agent of
ably, though confirmed in one case, inflicted skin underneath, which formed a numb scar. granulocytic ehrlichiosis. The attending lab-
by the hobo spider of the Pacific Northwest Systemically, for two weeks following the oratory (National Microbiology Laboratory,
(Tegenaria agrestis). Particularly during winter bite, he suffered severe fatigue. In October of Winnipeg, Manitoba, Canada) suggested the
and spring, serious systemic symptoms, in ad- 2006, he injured his knee and noticed unusu- results (single serum end point titers >64) to
dition to local symptoms, had developed in ally severe bruising. He also was aware that, indicate a past, not current, infection. (A reg-
some victims and were shown in the article as since the spider bite, he had experienced di- ular laboratory had failed to yield results but
being similar to those of ehrlichiosis, a tick- minished well-being. had confirmed the absence of Lyme disease.)
transmitted hematological illness. The article In the fall of 2007, in preparation for The patient’s physician prescribed long-term
suggested that T. agrestis, which does not cause joint surgery, a very low platelet count was treatment with tetracycline. The patient has
serious symptoms in Europe, may be contami- discovered. From November 2007 to March also accepted homeopathic treatment under
nated with or be a vector of ehrlichial bacteria; 2008, platelet values fluctuated between my care, which includes the homeopathic use
or, alternately, that the victims had suffered 49x103/mm3 and 69x103/mm3. (Normal of his own blood (isode) (Richardson-Boedler,
unidentified exposure to infected ticks. values in humans range from 250x103/mm3 1994), akin to a vaccination.
A case of probable T. agrestis bite, occur- to 400x103/mm3.) Cancer was suspected as Victims with unexplained chronic symptoms,
ring in August of 2006 in Okotoks, Alberta, possible cause. During the same period, the who recall a spider bite occurring in the Pacific
Canada (100 miles north of the United States, white blood cell (WBC) count fluctuated Northwest or neighboring regions during any
near Calgary), has since come to my attention between 2.6x103/mm3 and 3.2x103/mm3, season, should receive careful testing for signs of
and confirmed the possibility that ehrlichial contrasting with the normal human range a past infection with ehrlichial bacteria.
bacteria are transmitted by the spider. of 5x103/mm3 to 9x103/mm3.
The adult male victim, a medical pro- Platelet and WBC counts similar to those References
fessional, 60 years old at the time of the seen in the bite victim have been noted in Fishbein, D. B., Sawyer, L. A., Holland, C. J., Hayes,
bite, had read my article on the subject in acutely ill ehrlichiosis patients, though the pa- E. B., Okoroanyanwu, W., Williams, D., et al. (1987).
The Forensic Examiner and contacted me in tients’ values recovered during the second week Unexplained febrile illnesses after exposure to ticks. In-
January of 2008. After working in his yard, of illness; among four patients, the lowest val- fection with an Ehrlichia? Journal of the American Medi-
in a rocky area (where previously an ant nest ues were 49 x103/mm3 (platelets) and 1.1x103/ cal Association, 257, 3100-3104.
had been discovered), he had noted, the fol- mm3 (WBC) (Fishbein et al., 1987). Richardson-Boedler, C. (1994). The use of patient-
lowing day, local symptoms on the front of After the bite victim had contacted me in made blood isodes (nosodes) in infectious diseases in-
his thigh indicative of a spider bite. He sus- January of 2008, testing of his blood for ehrli- cluding HIV-infection. Homoeopathy International, 8(1),
pected that the offending species had been chial bacteria was initiated, and he was immedi- 21-23. n
T. agrestis, as his symptoms matched those ately prescribed the pertaining antibiotic (tetra-
described in the article. He knew from re- cycline) by his attending physician. The patient Cornelia Richardson-Boedler NMD,
liable sources that T. agrestis was present at noted that after the first dose of tetracycline, his MA, MFT, DABFE, DABFM, CCP, DACe,
least 100 miles east of his town. symptoms of declining health, such as fatigue, FACFEI

The Forensic Examiner Issues Call for Articles


The Forensic Examiner® is issuing a call for • Forensic nursing The Examiner would like to start a new
articles dealing with forensic science. For in- • Forensic consulting regular feature on cold cases. Anyone may
formation on how to submit an article, go • Forensic medicine submit an article on a cold case or recom-
to: www.theforensicexaminer.com/guidelines. • Forensic accounting mend a case to be featured.
html. • Computer forensics Finally, The Examiner proposes that short
Articles dealing with any forensic science • Sensitive information protection fictional articles, of between 600 and 1,000
subject will be accepted for consideration. Articles dealing with new technology or new words, be submitted. The story should pres-
All articles must be approved through The techniques are also strongly encouraged. ent a mystery containing clues that involve
Examiner’s peer-review process before being The Examiner always welcomes case studies real-life forensic science. The conclusion of
published. that give insight into forensic science. Case the story should reveal the solution to the
The Examiner especially encourages articles studies can focus on one or more interesting mystery. n
in the following subjects: cases.

(800) 592-1399 Winter 2008 THE FORENSIC EXAMINER 5


THE

FORENSIC
The Official Peer-Reviewed Journal of The American College of Forensic Examiners
EXAMINER
VOLUME 17 • NUMBER 4 • Winter 2008

The American College of Forensic Examiners International (ACFEI) does not endorse, guarantee, or warrant the credentials, work, or opin-
®

ions of any individual member. Membership in ACFEI does not constitute the grant of a license or other licensing authority by or on behalf
of the organization as to a member’s qualifications, abilities, or expertise. The publications and activities of ACFEI are solely for informative
and educational purposes with respect to its members. The opinions and views expressed by the authors, publishers, or presenters are their
sole and separate views and opinions and do not necessarily reflect those of ACFEI, nor does ACFEI adopt such opinions or views as its own.
The American College of Forensic Examiners International disclaims and does not assume any responsibility or liability with respect to the
opinions, views, and factual statements of such authors, publishers, or presenters, nor with respect to any actions, qualifications, or represen-
tations of its members or subscriber’s efforts in connection with the application or use of any information, suggestions, or recommendations
made by ACFEI or any of its boards, committees, publications, resources, or activities thereof.

Feature Articles

13 Technology and Terrorism: How the Internet


Facilitates Radicalism
By Marie Wright, PhD, CHS-IV

40 Behavioral Profiling and Risk Assessment Using


Written Communication
13 By Kimon Iannetta and Reed Hayes
53
53 To Shoot or Not to Shoot: Response
and Interpretation of Response
to Armed Assailants
By Matthew J. Sharps, PhD and Adam B. Hess

65 Eyewitness Memory: Can Suggestion Be


Minimized in the Investigative Interview?
By Wayne G. Whitehouse, PhD; Emily Carota Orne, BA;
and David F. Dinges, PhD

65 77 77 DVDs: An Emerging Forensic Problem That May


Constitute Untrustworthy Evidence
By Steve Cain, MFS, MFSQD, DABFE, FACFEI, DABLEE,
DABRE

Write about a fascinating forensic case.


Case studies exploring forensic investigations on any topic, case, or crime—including deception,
theft, murder, historical cases, and any others—are welcome. These case studies could discuss serial
killers, famous fraudsters, cold cases, or any other type of case. Case studies should focus on how
forensic techniques, tools, and investigations were used to break the case or solve a mystery. These
could be cases you’ve worked on or simply cases that fascinate you.

Submit an article for peer review.


The Forensic Examiner® is always looking for articles on research, new techniques, and findings
in the various fields of forensics. To submit an article for peer review, or for complete submission
guidelines, please visit www.acfei.com or write to editor@acfei.com.

How to Submit:
Whether you wish to submit an article for peer review, a fascinating case or forensic case profile, or
an article on a current issue in the field of forensics, send your writing electronically (either in the
40 body of an email or as an attachment) to editor@acfei.com. Or, send in your writing on a disc or
CD to Editor, Association Headquarters, 2750 E. Sunshine, Springfield, MO 65804.

6 THE FORENSIC EXAMINER Winter 2008 www.acfei.com


The Forensic Examiner Creed
I do affirm that:
I shall investigate for the truth.
I shall report only the truth.
I shall avoid conflicts of advocacies.
I shall conduct myself ethically.
I shall seek to preserve the highest standard of my profession.
As a Forensic Examiner, I shall not have a monetary interest in any out-
come of a matter in which I am retained.
I shall share my knowledge and experience with other examiners in a
professional manner. 21 29
I shall avoid conflicts of interest and will continue my professional
development throughout my career through continuing education, semi-
nars, and other studies.
As a Forensic Examiner, I will express my expert opinion based only
upon my knowledge, skill, education, training, and experience.
The light of knowledge shall guide me to the truth and with justice the
truth shall prevail.
To all these things, I affirm to uphold.

Case Studies/Current Issues


32 86
21 Prison Violence: Does Brutality Come With the
Badge?
By Bruce Gross, PhD, JD, MBA

29 George Lawlor: An Early Visionary


By Katherine Ramsland, PhD, CMI-V

32 For Most People, College Is a Waste of Time


By Charles Murray

86 Falsely Accused: Innocent Texas Man Does


Time, But Real Rapist Avoids Conviction
38
By Kara Goeke

Also in this Issue

11 Interview with Nanette Philibert, PhD

12 ACFEI News

38 Book Reviews

34

(800) 592-1399 Winter 2008 THE FORENSIC EXAMINER 7


THE

FORENSIC EXAMINER ®
2008 Editorial Advisory Board

Publisher:
Louay Al-Alousi, MB, ChB, PhD, FRCPath, Philip Kaushall, PhD, DABFE, DABPS, FACFEI
Robert L. O’Block, MDiv, PhD, PsyD, DMin,
FRCP(Glasg), FACFEI, DMJPath, DABFM, Eric Kreuter, PhD, CPA, CMA, CFM, DABFA,
DD (Hon) (rloblock@aol.com) FACFEI
FFFFLM
Editor in Chief: Nicholas G. Apostolou, DBA, DABFA, CPA, Ronald G. Lanfranchi, DC, PhD, DABFE,
John Lechliter (editor@acfei.com) Cr.FA DABFM, DABLEE, CMI-IV, FACFEI
Larry Barksdale, BS, MA Richard Levenson, Jr., PsyD, DABFE, DABPS,
Executive Art Director: E. Robert Bertolli, OD, FACFEI, CHS-V, CMI-V FACFEI
Brandon Alms (brandon@acfei.com) Kenneth E. Blackstone, BA, MS, CFC, DABFE Monique Levermore, PhD, FACFEI, DABPS
David T. Boyd, DBA, CPA, CMA, CFM, Cr.FA Jonathon Lipman, PhD, FACFEI, DABFE,
Associate Editor: Jules Brayman, CPA, CVA, CFD, DABFA, DABPS, DABFM
Amber Ennis (amber@acfei.com) FACFEI Judith Logue, PhD, FACFEI, DABFSW, DABPS,
John Brick, PhD, MA, DABFE, DABFM, DABFE, DABFM
Assistant Editor: FACFEI Jennie Martin-Gall, CMI-I
Logan Forester (logan@acfei.com) Richard C. Brooks, PhD, CGFM, DABFE Mike Meacham, PhD, LCSW, DABFSW, FACFEI
Steve Cain, MFS, DABFE, DABRE, FACFEI , David Miller, DDS, FACFEI, DABFE, DABFM,
Advertising: MF-SQD, DABLEE DABFD
John Lechliter (john@acfei.com) Dennis L. Caputo, MS, DABFET, REM, CEP, John V. Nyfeler, CHS-III
(800) 592-1399, ext. 174 CHMM, QEP, FACFEI Jacques Ama Okonji, PhD, FACFEI, DABFE,
Donald Geoffrey Carter, PE, DABFET DABPS
David F. Ciampi, PhD, FACFEI, DABPS Norva Elaine Osborne, OD, CMI-III
Leanne Courtney, BSN, DABFN, DABFE Terrence O’Shaughnessy, DDS, FACFEI,
ACFEI Executive Advisory Board Larry Crumbley, PhD, CPA, DABFE, Cr.FA DABFD, DABFE, DABFM
Jean L. Curtit, BS, DC George Palermo, MD, FACFEI, DABFE,
Andrew Neal Dentino, MD, FACFEI, DABFE, DABFM
Chair: DABFM Ronald J. Panunto, PE, CFC
David E. Rosengard, RPh, MD, PhD, MPH, Francisco J. Diaz, MD Larry H. Pastor, MD, FACFEI, DABFE, DABFM
FACFEI, CMI-V, CHS-V, DABFE, DABFM, James A. DiGabriele, DPS, CPA, CFSA, DABFA, Theodore G. Phelps, CPA, DABFA
DABECI, FACA, FAPA, MTAPA, FAAIM Cr.FA, CVA, FACFEI Marc Rabinoff, EdD, FACFEI, DABFE, CFC
John Shelby DuPont Jr., DDS, DABFD Harold F. Risk, PhD, DABPS, FACFEI
Vice Chair: Scott Fairgrieve, Hons. BSc, MPhil, PhD, FAAFS Susan P. Robbins, PhD, LCSW, DABFSW
Edmund D. Fenton, DBA, CPA, CMA, Cr.FA Jane R. Rosen-Grandon, PhD, DABFC, FACFEI
Michael Fitting Karagiozis, DO, MBA, CMI-V Per Freitag, PhD, MD, FACFEI, DABFE, Douglas Ruben, PhD, FACFEI, DABFE,
DABFM DABFM, DABPS
John H. Bridges III, DSc (Hon), CHS-V, Nicholas Giardino, ScD, FACFEI, DABFE J. Bradley Sargent, CPA, CFS, Cr.FA, DABFA,
CHMM, CSHM, DABCHS, FACFEI David H. Glusman, CPA, DABFA, CFS, Cr.FA, FACFEI
Jamie J. Ferrell, BSN, RN, CFN, CMI-III FACFEI William Sawyer, PhD, FACFEI, DABFE,
Douglas E. Fountain, PhD, LCSW, DABFE, Karen L. Gold, PysD, FACFEI, DABPS DABFM
Ron Grassi, DC, MS, FACFEI, DABFM, DABFE Victoria Schiffler, RN, DABFN, FACFEI
DABFSW James Greenstone, EdD, JD, FACFEI, DABFE, John V. Scialli, MD, DABFE, DABFM
Raymond F. Hanbury, PhD, FACFEI, DABPS, DABFM, DABECI, CMI-I, CHS-III Howard A. Shaw, MD, DABFM, FACFEI
DABFE, CHS-III, ABPP Roy C. Grzesiak, PhD, PC Henry A. Spiller, MS, DABFE, FACFEI
Lee Heath, DABLEE, CHS-V Richard C. W. Hall, FACFEI, DABFM, DABFE, Marilyn Stagno, PsyD, DABFE, DABFM, DABPS
Brian L. Karasic, DMD, MScFin, FACFEI, MD, FAPA, FAPM, FACPsych Richard I. Sternberg, PhD, DABPS
DABFD, DABFM, DABFE Raymond F. Hanbury, PhD, ABPP, FACFEI, James R. Stone, MD, MBA, CHS-III, DABFE,
DABFE, DABPS, CHS-III DABFM, FACFEI
Michael G. Kessler, Cr.FA, CICA, FACFEI, James Hanley III, MD, DABFM, FACFEI Johann F. Szautner, PE, PLS, FACFEI, DABFET
DABFA, DABFE Nelson Hendler, MD, DABFM William A. Tobin, MA, DABFET, DABLEE,
Marilyn J. Nolan, MS, FACFEI, DABFC, David L. Holmes, EdD, FACFEI, DABFE, FACFEI
DABCIP DABPS Robert Tovar, BS, MA, DABFE, DABPS, CHS-III
Thomas J. Owen, BA, FACFEI, DABRE, Leo L. Holzenthal Jr., PE, DABFET, FACFEI Brett C. Trowbirdge, PhD, JD, DABPS, FACFEI
DABFE, CHS-V Linda Hopkins, PhD, CFC, DABPS, DABRE Jeff Victoroff, MD, DABFE, DABFM
Edward J. Hyman, PhD, FACFEI, DABFE, Patricia Ann Wallace, PhD, FACFEI, DABFE,
Vincent B. Van Hasselt, PhD, DABCIP, DABFM, DABPS DABFM, CFC
DABLEE, CFC Zafar M. Iqbal, PhD, FACFEI, DABFE, DABFM Raymond Webster, PhD, FACFEI, DABFE,
Ben Venktash, DABFET, DABFE, CHSP, REA, Nursine S. Jackson, MSN, RN, DABFN DABFM
FRSH(UK), FIET(UK) Paul Jerry, MA, DAPA, DABFC Dean A. Wideman, MSc, MBA, CFC, CMI-III,
Scott A. Johnson, MA, DABPS, DAACCE DABFE

The Forensic Examiner® (ISSN 1084-5569) is published quarterly by The American College of Forensic Examiners International, Inc. (ACFEI). Annual membership for a year in the
American College of Forensic Examiners International is $165. Abstracts of articles published in The Forensic Examiner® appear in National Criminal Justice Reference Service,
Cambridge Scientific Abstracts, Criminal Justice Abstracts, Gale Group Publishing’s InfoTrac Database, e-psyche database, and psycINFO database. Periodicals Postage Paid at
Springfield, Missouri, and additional mailing offices. © Copyright 2008 by the American College of Forensic Examiners International. All rights reserved. No part of this work can
be distributed or otherwise used without the express permission of the American College of Forensic Examiners International. The views expressed in The Forensic Examiner® are
those of the authors and may not reflect the official policies of the American College of Forensic Examiners International.

CONTACT US:
Publication, editorial, and advertising offices of ACFEI, 2750 East Sunshine Street, Springfield, MO 65804. Phone: (800) 592- 1399, Fax: (417) 881- 4702,
E-mail: editor@acfei.com. Subscription changes should be sent to ACFEI, 2750 East Sunshine, Springfield, MO 65804.

POSTMASTER:
Send address changes to American College of Forensic Examiners International, 2750 East Sunshine Street, Springfield, MO 65804.

8 THE FORENSIC EXAMINER Winter 2008 www.acfei.com


ACFEI Executive Advisory Boards
American Board for Certification in Homeland Security John P. LeMaster, DMD, FACFEI, DABFD, CMI-V, CHS-III, DABFM Rose Eva Bana Constantino, PhD, JD, RN, FACFEI, DABFN, DABFE,
Executive Committee: Jeannine L. Weiss, DDS CFN, FAAN
Chairman of the Executive Board for Certification in Homeland Renae M. Diegel, RN, SANE-A, CEN, CFN, CFC, CMI-III
Security: John H. Bridges III, DSc (Hon), CHS-V, CHMM, CSHM, American Board of Forensic Examiners Lo M. Lumsden, ANP, GNP, EdD, DABFN, CFN, CHS-III, DABFE
DABCHS, FACFEI Chair of the Executive Board of Forensic Examiners: Yvonne D. McKoy, PhD, RN, FACFEI, DABFN
Lt. Colonel Herman Statum, US Army (Ret), MS, PI, CHS-V, DABCHS, Michael Fitting Karagiozis, DO, MBA, CMI-V Diane L. Reboy, MS, RN, CFN, LNCC, FACFEI, DABFN, CNLCP
CPP Chair Emeritus: Zug G. Standing Bear, PhD, FACFEI, DABFE, DABFM Suzette Rush-Drake, RN, PsyD, BSN, FACFEI, DABFN, DABFE
Robert R. Silver, PhD, MS, BS, CHS-V, DABCHS Members of the Executive Board of Forensic Examiners: Elizabeth N. Russell, RN, BSN, CCM, BC, DABFN, FACFEI
Members of the Executive Board for Certification in Homeland Security: Jess P. Armine, DC, FACFEI, DABFE, DABFM LeAnn Schlamb, MSN, RN-BC, CFN, DABFN
Nick Bacon, CHS-V, DABCHS Phillip F. Asencio-Lane, FACFEI, DABFE Sharon L. Walker, MPH, PhD, RN, CFN
E. Robert Bertolli, OD, BS, FACFEI, DABCHS, CHS-V, CMI-V John H. Bridges III, CHS-V, CHMM, CSHM, FACFEI, DABCHS,
Brig. Gen. (Ret) J. Ronald Carey, PhD, CHS-V, DABCHS DABCIP American Board of Forensic Social Workers
Paul P. Donahue, CHS-V, DABCHS, MBA, Cr.FA, CMA, CPP, CBM Ronna F. Dillon, PhD, DABFE, DABPS, CMI-V, CHS-III Chair of the Executive Board of Social Work Advisors:
Billy Ray Jackson, ATS, CSC, CHS-V, DABCHS Nicholas J. Giardino, ScD, FACFEI, DABFE, RPIH, MAC, CIH Douglas E. Fountain, PhD, LCSW, DABFE, DABFSW
Rev. LZ Johnson, Col. U.S. Army (Ret.), BS, BA, CHS-V, DABCHS Bruce H. Gross, PhD, JD, MBA, FACFEI, DABFE, DABFM, DABPS, Chair Emeritus: Karen M. Zimmerman, MSW, DABFSW, DABFE
Andrew J. Jurchenko Sr., Col US Army (Ret), CHS-V, DABCHS DAPA Susan L. Burton, MA, MSW, LMSW, DABFSW, DABLEE
Robert L. McAlister, BS, CHS-V, DABCHS, CUSA, ARM Kenneth M. Gross, DC, FACFEI, DABFE, CMI-I Judith V. Caprez, MSW, ACS, LCSW, DABFSW
Janet M. Schwartz, PhD, FACFEI, DABCHS, DABFE, DABFM, DABPS, Darrell C. Hawkins, MS, JD, FACFEI, DABFE, DABLEE, CMI-V, CHS- Peter W. Choate, BA, MSW, DABFSW, DABFE
CHS-V III, F-ABMDII, IAI-SCSA, IAAI-CFI Judith Felton Logue, PhD, FACFEI, DABFE, DABFSW, DABPS, DABFM
Edward W. Wallace, CHS-V, Detective 1st Grade (ret.), MA, DABCHS, Michael W. Homick, PhD, DABCHS, CHS-V Michael G. Meacham, PhD, LCSW, DCSW, FACFEI, DABFSW
CHS-V, SCSA, LPI, BS, CFI I & II, CLEI, CTO, CDHSI John L. Laseter, PhD, FACFEI, DABFE, DABFM, CMI-IV, CHS-III Kathleen Monahan, DSW, MSW, CFC, DABFE
Eric White, BS, CHS-V, DABCHS Jonathan J. Lipman, PhD, FACFEI, DABFE, DABFM, DABPS Susan P. Robbins, PhD, LCSW, DCSW, BCD, LDC, DABFSW
Leonard K. Lucenko, PhD, FACFEI, DABFE, CPSI Steven J. Sprengelmeyer, MSW, MA, LISW, FACFEI, DABFSW, DABFE
American Board of Critical Incident Professionals Edward M. Perreault, PhD, FACFEI, DABFE
Chair of the Executive Board of Critical Incident Professionals: Marc A. Rabinoff, EdD, FACFEI, DABFE, CFC American Board of Law Enforcement Experts
Gregory Mark Vecchi, PhD, CFC, CHS-V, DABLEE, DABCIP David E. Rosengard, RPh, MD, PhD, MPH, FACFEI, CMI-V, CHS-V, Chair of the Executive Board of Law Enforcement Experts:
Vice Chair: Kent A. Rensin, PhD, DABCIP DABFE, DABFM, DABECI, FACA, FAPA, MTAPA, FAAIM Lee Heath, DABLEE, CHS-V
Monica J. Beer, PhD Janet M. Schwartz, PhD, CHS-V, FACFEI, DABFE, DABFM, DABPS Vice Chair: Darrell C. Hawkins, JD, CHS-III, DABLEE, DABFE, CMI-V
Sam D. Bernard, PhD, DABCIP, CHS-III Richard Sgaglio, PhD, CMI-IV Chair Emeritus: Michael W. Homick, PhD, CHS-V,DABCHS
Marie Leeds Geron, PhD, CHS-V, DABCIP Alan Bock, CHS-III, DABLEE
Raymond H. Hamden, PhD, FACFEI, DABPS, DABCIP, DABCHS, American Board of Forensic Engineering and Tom Brady, CHS-V, DABLEE
DAPA, CFC, CMI-V, CHS-V Technology Gregory M. Cooper, MPA, DABLEE
Marshall A. Jones, MS, DABCIP Chair of the Executive Board of Engineering and Technology Advisors: Dickson S. Diamond, MD, CHS-III, DABLEE, DABFM
Marilyn J. Nolan, MS, FACFEI, DABFC, DABCIP Ben Venktash, MS, DABFET, DABFE, CHSP, REA, FRSH(UK), John E. Douglas, EdD, FACFEI, DABFE, DABLEE
Rev. Roger Rickman, ACC, CFC, CHS-V, CMI-I, SSI, CRS, DABCHS, FIET(UK) Les M. Landau, DO,CHS-III, FACFEI, DABLEE, DABFE, DABFM
DABCIP, DAPA, FABI, PI, SCS Chair Emeritus: David Albert Hoeltzel, PhD, DABFET, DABFE Ronald G. Lanfranchi, PhD, DC, CMI-IV, FACFEI, DABLEE, DABFE,
Debra Russell, PhD, CMI-V, CHS-III, CRC, CISM, DABCIP Vice Chair: Cam Cope, BS, DABFET, DABFE DABFM
Dorriss “Ed” Smith, Col. US Army, CHS-V, DABCIP 2nd Vice Chair: Ronald G. Schenk, MSc, MInstP, Peng (UK), CHS-III, Leonard Morgenbesser, PhD, FACFEI, DABFE
Vincent B. Van Hasselt, PhD, DABCIP CMI-I Hank Paine III, PhD, FACFEI, DABLEE, DABFC, CHS-IV
Alan E. Williams, MS, CHS-V, DABCIP Members of the Exective Board of Engineering and Technology Advisors: John T. Pompi, BA, DABLEE, DABFE, CHS-III
Nicholas Albergo, FACFEI, DABFET Stephen Russell, BS, DABLEE, CMI-II, CHS-III
American Board of Forensic Accountants Kyle J. Clark, DABFET Oscar Villanueva, CHS-V, DABLEE
Chair of the Executive Board of Accounting Advisors: George C. Frank, CFC, DABFE David E. Zeldin, MA, CHS-III, FACFEI, DABFE, DABLEE
Michael G. Kessler, Cr.FA, CICA, FACFEI, DABFA, DABFE Robert K. Kochan, BS, FACFEI, DABFET, DABFE
Stewart L. Appelrouth, CPA, CFLM, CVA, DABFA, Cr.FA, ABV, FACFEI J.W. “Bill” Petrelli Jr., AIA, NCABB, TAID, FACFEI, DABFET, CFC American Board of Psychological Specialties
Gary Bloome, CPA, Cr.FA Max L. Porter, PhD, FACFEI, DABFET, DABFE, CFC, PE, HonMASCE, Chair of the Executive Board of Psychological Advisors:
Jules J. Brayman, CPA, ABV, CVA, CFFA, FACFEI, DABFA Parl, Dipl ASFE, FTMS, FACI Raymond F. Hanbury, PhD, FACFEI, DABPS, DABFE, CHS-III, ABPP
Stephen E. Cohen, CPA, ABV, FACFEI, DABFA, Cr.FA, CVA Peter H. Rast, PhD, BS, MSFS, MBA, FACFEI, DABFET, DABFE, Vice Chair: Raymond H. Hamden, PhD, FACFEI, DABPS, DABCIP,
D. Larry Crumbley, PhD, CPA, DABFA, Cr.FA, CFFA, FCPA DABLEE DABCHS, DAPA, CFC, CMI-V, CHS-V
James A. DiGabriele, CPA, FACFEI, DABFA, Cr.FA, ABV, CFSA, CVA Oliver W. Siebert, PE, FACFEI, DABFET Chair Emeritus: Carl N. Edwards, PhD, JD, FAAFS, FICPP, FACFEI,
June M. Dively, CPA, DABFA, Cr.FA Kandiah Sivakumaran, MS, PE, DABFET DABPS, DABFE
David Firestone, CPA, Cr.FA Malcolm H. Skolnick, PhD, JD, FACFEI, DABFET, DABFE Carol J. Armstrong, PhD, LPC, DABPS
David H. Glusman, CPA, FACFEI, DABFA, Cr.FA James A. St. Ville, MD, MS, FACFEI, DABFET, DABFM Robert J. Barth, PhD, DABPS
Eric A. Kreuter, PhD, CPA, CMA, CFM, FACFEI, DABFA, SPHR, CFD, Monica J. Beer, PhD
CFFA, BCFT American Board of Forensic Medicine John Brick III, PhD, MA, FAPA, FACFEI, DABFE, DABPS
Raimundo Lopez Lima Levi, CPA, DABFA Chair of the Executive Board of Medical Advisors: Alan E. Brooker, PhD, FACFEI, DABPS, DABFM, DABFE, CMI-III,
Dennis S. Neier, CPA, DABFA David E. Rosengard, RPh, MD, PhD, MPH, FACFEI, CMI-V, CHS-V, ABPP-Cn
Sandi Peters, CPA, Cr.FA DABFE, DABFM, DABECI, FACA, FAPA, MTAPA, FAAIM Brian R. Costello, PhD, FACFEI, DABPS, DABFE
Jay J. Shapiro, CPA, DABFA Vice Chair: Michael Fitting Karagiozis, DO, MBA, CMI-V Ronna F. Dillon, PhD, DABPS, DABFE, CMI-V, CHS-III
Joseph F. Wheeler, CPA, Cr.FA, CHS-III Members of the Executive Board of Medical Advisors: Douglas P. Gibson, PsyD, MPH, DABPS, CMI-V, CHS-III
Terrance L. Baker, MD, MS, FACFEI, DABFM, CMI-V Mark Goldstein, PhD, FACFEI, DABFE, DABPS
American Board of Forensic Counselors John Steve Bohannon, MD, CMI-IV Thomas L. Hustak, PhD, FACFEI, DABPS, DABFE
Chair of the Executive Board of Forensic Counselors Edgar L. Cortes, MD, FACFEI, DABFM, DABFE, CMI-V, FAAP Richard Lewis Levenson Jr., PsyD, FACFEI, DABPS, DABFE, CTS,
Marilyn J. Nolan, MS, FACFEI, DABFC, DABCIP Albert Basil DeFranco, MD, FACFEI, DABFM, DABPS, CMI-V, CHS-III FAAETS
Vice Chair: Steven M. Crimando, MA, CHS-III James B. Falterman Sr., MD, FACFEI, DABFM, DABFE, DABPS, Stephen P. McCary, PhD, JD, FACFEI, DABFE, DABFM, DABPS,
Chair Emeritus: Dow R. Pursley, EdD, DABFC CMI-IV FAACP, DAPA
George Bishop, LPC, LAT, LAC, FACFEI, DABFE Malcolm N. Goodwin Jr., MD, MS, FACFEI, DABFM, DABFE, FCAP, Helen D. Pratt, PhD, FACFEI, DABPS
Laura W. Kelley, PhD, LPC, DABFC, FACFEI Col USAF MCFS (Ret) Douglas H. Ruben, PhD, FACFEI, DABPS, DABFE, DABFM
Robert E. Longo, FACFEI, DABFC Vijay P. Gupta, PhD, DABFM Richard M. Skaff, PsyD, DABPS
Kathleen Joy Walsh Moore, FACFEI, DABFC, CHS-III Richard C.W. Hall, MD, FACFEI, DABFM, DABFE Zug G. Standing Bear, PhD, FACFEI, DABFE, DABFM
DeeAnna Merz Nagel, Med, LPC, CRC, DCC, CFC Louis W. Irmisch III, MD, FACFEI, DABFM, DABFE, CMI-V Charles R. Stern, PhD, FACFEI, DABPS, DABFE, DABFM, CMI-V
Irene Abrego Nicolet, PhD, MA, DABFC E. Rackley Ivey, MD, FACFEI, DABFM, DABFE, CMI-V, DABMCM, Brent Van Dorsten, PhD, FACFEI, DABFE, DABFM, DABPS
Hirsch L. Silverman, PhD, FACFEI, DABFC, DABFE, DABFM, DABPS DAAPM Joseph C. Yeager, PhD, FACFEI, DABFE, DABLEE, DABPS
William M. Sloane, JD, LLM, PhD, FACFEI, DABFC, CHS-III, CMI-I, Kenneth A. Levin, MD, FACFEI, DABFM, DABFE Donna M. Zook, PhD, DABPS, CFC
DACC, FACC, FAAIM, DCPC, MTAPA E. Franklin Livingstone, MD, FACFEI, DABFM, DABFE, DAAPM,
Gary Smith, MEd, FACFEI, DABFE FAAPM&R American Board of Recorded Evidence
Ava Gay Taylor, MS, LPC, FACFEI, DABFC John C. Lyons, MD, FACS, MSME, BSE, FACFEI, DABFM, DABFET, Chair of the Executive Board of Recorded Evidence Advisors:
DABFE, CMI-IV Thomas J. Owen, BA, FACFEI, DABRE, DABFE, CHS-V
American Board of Forensic Dentistry Manijeh K. Nikakhtar, MD, MPH, DABFE, DABPS, CMI-V, CHS-V Ernst F. W. (Rick) Alexanderson, BA, MBA, FACFEI, DABRE, DABFE
Chair of the Executive Board of Forensic Dentistry: John R. Parker, MD, FACFEI, DABFM, FCAP Eddy B. Brixen, DABFET
Brian L. Karasic, DMD, MBA, MScFin, FACFEI, DABFD, DABFM, Anna Vertkin, MD, CMI-V, DABFM Charles K. Deak, BS, CPC, FACFEI, DABFE
DABFE Maryann M. Walthier, MD, FACFEI, DABFM, DABFE Ryan O. Johnson, BA, DABFE, DABRE
Members of the Executive Board of Dental Advisors: Cyril Wecht, MD, JD, FACFEI, CMI-V Michael C. McDermott, JD, FACFEI, DABRE, DABFE
Ira J. Adler, DDS, DABFD Jennifer E. Owen, BA, DABRE, DABFE
Bill B. Akpinar, DDS, CMI-V, FACFEI, DABFD, DABFE, DABFM American Board of Forensic Nursing Lonnie L. Smrkovski, BS, FACFEI, DABRE, DABFE
Stephanie L. Anton-Bettey, DDS, CMI-V Chair of the Executive Board of Nursing Advisors:
Jeff D. Aronsohn, DDS, FACFEI, DABFD, CMI-V Jamie J. Ferrell, BSN, RN, FACFEI, DABFN, DABFE, CFN, CMI-III,
Susan Bollinger, DDS, CMI-IV, CHS-III SANE-A,
Michael H. Chema, DDS, FACFEI, DABFD, DABFE Vice Chair: Dianne T. Ditmer, PhD, MS, RN, DABFN, CMI-III, CFN,
James H. Hutson, DDS, CMI-V, FACFEI, DABFD FACFEI, CHS-III
John P. Irey, DDS, LLC, CMI-V Chair Emeritus: Russell R. Rooms, MSN, RN, CFN, CMI-III, APRN,
Chester B. Kulak, DMD, CMI-V, CHS-III, CFC, DABFE, DABFD DABFN
Morley M. Lem, DDS, FACFEI, DABFD, DABFM, DABFE, DABPS Marilyn A. Bello, RNC, MS, CMI-IV, CFC, CFN, SAFE, DABFN, DABFE

(800) 592-1399 Winter 2008 THE FORENSIC EXAMINER 9


Introducing a more scientific way
to find scientific experts.
ChemInsight’s Expert Matching Service creates ä Expert matching for legal, consulting
and accounting cases
matches by methodology, not word of mouth.
ä Proprietary search tools with
As a service of the American Chemical Society — the world’s largest access to cutting-edge scientific
scientific society — ChemInsight’s Expert Matching resource has research worldwide
proprietary insight into scientific expertise. Using our objective, ä Objective matching based on
proven methodologies, we can help you find the right expert(s) for your specific scientific needs
your case. Or, if you prefer, you can browse through hundreds of
ä Independent evaluation of tech-
experts on your own at our free online database. Either way, nologies, science-based defense
ChemInsight is an authoritative source of scientific expertise. strategies, and related services

Visit www.ChemInsight.org/fe
or call ACS at 800-227-5558 and ask for
ChemInsight for more information today!
Online Education Expert Offers Advice

The Forensic Examiner® recently interviewed course needs to impart or develop in the stu- loadable pod-cast lectures to simulated, online
Nanette Philibert, PhD, who has served as an dent; the learning styles of the audience; and classroom environments with avatar professors
online education consultant for the American available technology. and students will become the norm.
College of Forensic Examiners Institute. What makes a good online training Who benefits the most from online
Dr. Philibert, a faculty member of the Robert course? training courses?
W. Plaster School of Business Administration A good course is one that facilitates the ac- The time-challenged professional, the orga-
at Missouri Southern State University, is an quisition of the desired outcomes. Simply nization trying to minimize travel expenses,
expert on online education. put, a good course is one that helps students and the individual seeking development for
learn what they need to learn. Additionally, professional growth and promotion all benefit
What issues have you addressed in your a good course is one that maintains currency from online educational opportunities.
consulting work with the ACFEI? in the field of knowledge, which is constantly What should students look for in online
I met with the ACFEI staff to discuss pro- updated to include new trends and issues in training programs?
cess improvements for their training devel- its particular field of knowledge. Both students and organizations should seek af-
opment efforts. What are the/ advantages/disadvantages fordable learning opportunities with proven out-
What have been the trends for online of online courses compared to live class- comes. They should invest their time and money
training courses? room settings? in courses that provide the learning opportunities
The trend in online education is to offer multi- Individuals differ in their learning styles. and results needed for their specific, needed pro-
media-based courses designed to address the Online courses aren’t for everyone—some fessional growth and development. They should
learning needs of time-challenged professionals. individuals learn better in a classroom set- look for well-developed, up-to-date, cutting-edge
Online training has taken the old correspon- ting. Also, not everyone is computer literate programs that utilize technology that assist the stu-
dence school approach and replaced it with rich, or has access to technology. dents in the learning process but don’t dominate
interactive, responsive learning forums, which What will the future hold for online it. They should review the course goals and objec-
are comparable to brick-and-mortar venues. education? tives to ensure that the course is designed to meet
What is important to consider when cre- The future is wide open for online education. their needs. They should seek recommendations
ating online training courses? Technology is cheaper and more accessible than from colleagues in their field who have found suc-
The knowledge, skills, and abilities that the it was 10 years ago. Everything from down- cessful experiences via online training. n

THEY SAVE LIVES, END ABUSE


The Certified Forensic
Nurse, CFN Program ®

NOW
AVAILA Forensic nurses are often the
BL
ONLIN E: bridge that spans medicine and
VERSIOE
N justice. They tend to needs of
victims and help gather and protect
the evidence that can lead to a
conviction and ultimate justice.

The Certified Forensic Nurse, CFN®


program helps forensic nurses get
the respect they deserve and unites
them in a supportive community
of fellow professionals who are
dedicated to their field.
“Forensic Nursing is a newly recognized specialty in the fields of Nursing and Forensic
Sciences. The ACFEI Forensic Nursing Certification is an important credential that indi-
cates advanced expertise and distinguishes those nurses who possess the special skills and
Go to www.acfei.com/cfn
knowledge base required in Forensic Nursing” or call (800) 592-1399.
–Mary K. Sullivan, RN, BSN, DABFE, DABFN, Phoenix, AZ

(800) 592-1399 Winter 2008 THE FORENSIC EXAMINER 11


ACFEI NEWS

Certification Recognizes Disaster Preparedness


The American Board for Certification in emergencies. It covers everything from ter-
Homeland Security has launched a new pro- rorist attacks to tornadoes, and it guides the
gram: Certified in Disaster Preparedness. participant through every aspect of knowl-
The new program recognizes that emer- edge, training, and equipment. Though the
gencies and disasters appear in the news every worst-case scenario is a large-scale terrorist
day, and sometimes they appear very close to attack, the truth of the matter is that indi-
home. Disaster strikes from one direction or viduals are more likely to experience a natural
another, whether by intentional terrorist at- disaster. Either way, those who are prepared
tack, uncontrollable natural occurrence, or for one are prepared for the other.
through negligence or accident. This course is for everyone, from the in-
Progress has been made to improve the dividual to the large group of volunteers. It
safety of the general public. Early warning is for the young homemakers, the elderly re-
systems for weather have been greatly en- tired couple, the single parent, the wealthy
hanced, technology has improved the reac- s Water-rescue personnel prepare to load boats into the professional, and the financially overextended
water that’s moving up SH 124 in High Island, Texas,
tions and capabilities of our first responders, September 12, 2008, as Hurricane Ike moved toward family. It is for the members of our country’s
and government has increased the funding Texas. Guy Reynolds/Dallas Morning News/MCT armed forces. Security directors, emergency
for agencies involved in counter-terrorism in managers, and first responders will especially
both disaster management and post-disaster alone will not provide the kind of education benefit. It is for everyone who wants to be
relief and rebuilding. needed to improve individual abilities or safe in an increasingly dangerous world. It is
Now is the time for awareness and pre- make the subtle lifestyle alterations necessary for everyone who understands that security
paredness to become part of daily life. It is for adapting to the changes already thrust on begins at home. n
the time to become educated and certified. the world.
Simple checklists and how-to pamphlets This course prepares people for the worst Call (800) 592-1399 for more information

The American Board for Certification in Homeland Security presents

Certified in Disaster Preparedness


Disaster Prep Disaster Prep 101 will equip you to:
• Set your business and family up for financial
stability in the wake of a disaster
• Effectively choose an evacuation destination
• Protect yourself against a surprise chemical attack
• And much, much more!

By becoming Certified in Disaster Preparedness, you will gain knowledge


of the worst emergencies you may encounter. Though the worst case
scenario is a large-scale terrorist attack, the truth of the matter is that
individuals are more likely to experience a natural disaster or an attack at
the local level, such as a bomb scare in a nearby school. The coursework
will guide the participant through every aspect of knowledge, training,
and equipment needed to prepare for such events.

Become Certified in Disaster Preparedness Today!

Call Toll-Free (800) 592-0960 or (800) 592-1399 | http://chs.acfei.com/dp101


Law
CEEnforcement
ARTICLE 1: Technology and Terrorism: How the Internet Facilitates Radicalism (Pages 14-20)

ATTENTION ACFEI MEMBERS: Journal-Learning CEs are now FREE when taken online. Visit www.acfei.com.

TO RECEIVE CE CREDIT FOR THIS ARTICLE CE ACCREDITATIONS FOR THIS ARTICLE


In order to receive one CE credit, each participant is required to This article is approved by the following for continuing education credit:
1. Read the continuing education article.
2. Complete the exam by circling the chosen answer for each question. Complete the evaluation form. (ACFEI) The American College of Forensic Examiners International provides this continuing education credit for
3. Mail or fax the completed form, along with the $15 payment for each CE exam taken to: Diplomates.
ACFEI, 2750 East Sunshine, Springfield, MO 65804. Or Fax to: 417-881-4702. Or go online to
www.acfei.com and take the test for FREE.

For each exam passed with a grade of 70% or above, a certificate of completion for 1.0 continuing educa-
tion credit will be mailed. Please allow at least 2 weeks to receive your certificate. The participants who do
not pass the exam are notified and will have a second opportunity to complete the exam. Any questions,
grievances or comments can be directed to the CE Department at (800) 592-1399, fax (417) 881-4702, or
e-mail: cedept@acfei.com. Continuing education credits for participation in this activity may not apply toward
license renewal in all states. It is the responsibility of each participant to verify the requirements of his/her state
licensing board(s). Continuing education activities printed in the journals will not be issued any refund.

LEARNING OBJECTIVES KEYWORDS: Terrorism, radicalization, foreign terrorist organizations


After studying this article, participants should be better able to do the following:
1. Specifically describe how the positive features of the Internet can be used by terrorists to support radical- TARGET AUDIENCE: security professionals, general public
ization.
2. List ways in which terrorists use the Internet.
3. Identify options for countering terrorist information operations on the Internet. PROGRAM LEVEL: update

DISCLOSURE: The authors have nothing to disclose.

PREREQUISITES: none

ABSTRACT
Extremist groups use the Internet for many reasons: to disseminate propaganda and spread disinformation; to recruit and train volunteers; to solicit funds from sympathizers; to gather data from open
sources; to plan and coordinate attacks; to maintain communications—many of them encrypted—between members of a single terrorist group as well as with members of other terrorist groups; to pro-
vide tutorials on building and planting explosive devices; and to publicize their acts of violence and ultimately enhance the perceived image of their great strength. This article uses examples gathered from
public sources to examine how the Internet is used to facilitate the radicalization of extremist groups, and it offers options for implementing an effective response.

POST CE TEST QUESTIONS (Answer the following questions after reading the article)
1 Many of the benefits provided by the Internet can be used by terrorists to support their agendas and expand 4 Which of the following statements is not true?
radicalization. Which of the following is not one of those benefits? a. Over the past decade, the number of terrorist Web sites has increased significantly
a. Fast transmission of multimedia information b. Pentagon analysts monitor terrorist Web sites, including those of more than 40 designated foreign terrorist
b. Lack of censorship or regulation organizations
c. Expensive development and maintenance of a Web presence c. Radicalizing messages and operational instructions can be communicated through e-mail as well as via Web
d. Ease of access sites
e. Large number of widely dispersed users d. To date, most Islamic hacking operations have been aimed at Web sites maintained by the U.S. government
and Web sites associated with U.S. defense and financial systems
2 Terrorists use the Internet to: e. The cyber attacks launched so far have been well-organized, but ineffective
a. Disseminate training manuals and tutorials and distribute video and audio broadcasts produced by terrorist-
run media production companies 5 Citizen Dialogues, the Digital Outreach Team, and the Counterterrorism Communications Center are part of
b. Recruit volunteers to participate in electronic attacks and coordinate cyber attacks the:
c. Distribute encryption software and solicit funds from sympathizers a. U.S. Department of State
d. Publicize beheadings and other atrocities b. U.S. Department of Justice
e. All of the above c. U.S. Department of the Treasury
d. U.S. Department of Homeland Security
3 Extremist messages promoted in video games are targeted to youths as young as: e. U.S. Department of Defense
a. 2 years of age
b. 7 years of age 5 Which of the following would not be an effective way to counter terrorist information operations?
c. 12 years of age a. Implement online multimedia information campaigns to combat extremist propaganda
d. 15 years of age b. Help allied governments launch their online multimedia counter-narratives to combat violent extremism
e. 25 years of age c. Actively encourage cross-cultural dialog
d. Launch Denial of Service attacks to shut down all terrorist Web sites and demand that terrorists stop encrypt-
ing their communications
e. Promote interagency initiatives that are designed to undermine ideological support for terrorism

EVALUATION: Circle one (1=Poor 2=Below Average 3=Average 4=Above Average 5=Excellent) PAYMENT INFORMATION: $15 per test (FREE ONLINE)
If you require special accommodations to participate in accordance with the Name: State License #:
Americans with Disabilities Act, please contact the CE Department at (800)
Phone Number: Member ID #:
592-1399.
Address: City:
1. Information was relevant and applicable. 12345
2. Learning objective 1 was met. 12345 State: Zip: E-mail:
3. Learning objective 2 was met. 12345 Credit Card #
4. Learning objective 3 was met. 12345
5. You were satisfied with the article. 12345 Circle one: check enclosed MasterCard Visa American Express
6. ADA instructions were adequate. 12345
7. The author’s knowledge, expertise, and clarity were appropriate. 12345 Name on card: Exp. Date:
8. Article was fair, balanced, and free of commercial bias. 12345 Signature Date
9. The article was appropriate to your education, experience, and 12345
licensure level. Statement of completion: I attest to having completed the CE activity. Please send the completed form, along with your
10. Instructional materials were useful. 12345 payment of $15 for each test taken. Fax: (417) 881-4702, or mail the forms to ACFEI Continuing Education, 2750 E.
Sunshine, Springfield, MO 65804. If you have questions, please call (417) 881-3818 or toll free at (800) 592-1399.

(800) 592-1399 Winter 2008 THE FORENSIC EXAMINER 13


CE Article: (ACFEI) 1 CE credit for this article

How the Internet Facilitates Radicalization

xtremist groups use the Internet for many reasons: to disseminate propaganda and spread dis-
information; to recruit and train volunteers; to solicit funds from sympathizers; to gather data
from open sources; to plan and coordinate attacks; to maintain communications—many of
them encrypted—between members of a single terrorist group as well as with members of other
terrorist groups; to provide tutorials on building and planting explosive devices; and to publicize their
acts of violence and ultimately enhance the perceived image of their great strength. This article uses
examples gathered from public sources to examine how the Internet is used to facilitate the radicaliza-
tion of extremist groups, and offers options for implementing an effective response.

By Marie Wright, PhD, CHS-IV

14 THE FORENSIC EXAMINER Winter 2008 www.acfei.com


Introduction games, chat rooms, Web sites, and online forums
The Internet’s greatest assets—ease of access, fast (U.S. Senate Committee on Homeland Security &
transmission of multimedia information, immense Governmental Affairs, 2007). CDs, DVDs, training
and geographically dispersed audiences, lack of reg- manuals, pamphlets, and copies of speeches are
ulation or censorship, and inexpensive development downloaded and modified to better fit terrorist goals
and maintenance of a Web presence—are being and objectives (e.g., to target recruitment-aged youths
used by extremist groups to achieve their terror- or to intimidate those involved in the fight against the
ist agendas (Weimann, 2004). High on the list of extremists), then are disseminated through postings
their objectives is expanding the level of radicaliza- on publicly accessible Web sites (Smith, 2006).
tion that supports the terrorist enterprise (Jenkins, Messages are transmitted and repeated that accuse
2007). Radicalization encompasses a mindset that the United States and its allies of trying to shame
incorporates violence as the supreme test of one’s and dishonor Muslim society and culture. Global
belief. It is the necessary mental requirement for jihadist messages are aimed directly at the individual,
recruitment (Jenkins, 2007). claiming “that the Islamic community faces assault
Information operations are crucial to radicaliza- from aggressive infidels and their apostate allies; it is
tion, and terrorists use the Internet in many different threatened by military attack, cultural corruption,
ways to achieve this goal. Some uses are similar to social disintegration, and substandard zeal” (Jenkins,
those made by traditional organizations, such as dis- 2007). Recruits are called to action to fight to restore
tributing information and soliciting donations, and dignity to Islam as a religious obligation required of
some are comparable to those made by the average all true believers (Jenkins, 2007). Although most
user, such as searching for information (Weimann, of the messages are intended to appeal emotionally
2004). Other uses, though, are distinctly ominous to youths between the ages of 7 and 25 years of age,
and horrific, such as providing tutorials on explo- some are targeted toward their parents, encouraging
sive devices and publicizing acts of violence. them to “support the jihad from [their] kitchens by
raising children that support the cause” (Porth, 2006).

“The Internet has dramatically expanded the ability of Radical groups to recruit, train,
motivate, and coordinate terrorists over vast distances without direct contact.”
Disseminating propaganda All messages are carefully worded and translated into
and recruiting supporters targeted languages, including Arabic, Turkish, and
Over the past decade, the number of terrorist Russian (Porth, 2006).
Web sites has grown from less than 100 to more In a statement made by Susan Collins
than 5,000 (Kaplan, 2006). According to the (R-Maine):
Assistant Secretary of Defense for International
Security Affairs, the sites are being used to cre- The Internet has dramatically expanded the
ate speeches, graphics, training manuals, slides, ability of radical groups to recruit, train, moti-
blogs, and Web casts, all for propaganda pur- vate, and coordinate terrorists over vast distanc-
poses (Porth, 2006). The sites offer tutorials on es without direct contact. Terrorist can consult
building bombs, sneaking into Iraq, setting im- Web sites to learn techniques for shooting down
provised explosive devices (IEDs), and killing helicopters, watch videos of hostage beheadings,
U.S. soldiers, and are used to host videos and read letters left by suicide bombers, or listen to
messages to expand recruitment and fundrais- messages from militant leaders. And, even if
ing efforts. Some even offer video games where there were no Web sites, the Internet would still
users as young as 7 years of age can pretend to allow radicalizing messages as well as operational
be warriors killing U.S. soldiers (Kaplan, 2006). instructions to be passed along by e-mail. (U.S.
Pentagon analysts monitor terrorist Web sites, Senate Committee on Homeland Security &
including those of designated foreign terrorist Governmental Affairs, 2007).
organizations (Table 1) and their sympathizers
and supporters (Kaplan, 2006). Gathering data and planning attacks
Extremist groups routinely use the Internet to Last year, British military intelligence disclosed that
spread misinformation and false rumors, hoping to terrorists were using aerial footage displayed by
reach disaffected youth, and to enlist sympathizers and Google Earth to plan their attacks against British
financial supporters. Video and audio broadcasts are bases in Basra. In raids conducted on the homes
produced by terrorist-run media production companies, of insurgents in early January 2007, the military
and Islamic extremist messages are promoted in video found printouts of satellite photographs showing

(800) 592-1399 Winter 2008 THE FORENSIC EXAMINER 15


Table 1: Designated Foreign Terrorist Organizations in detail the buildings and other vulnerable areas
(e.g., tents, lavatories, and parking areas for ar-
Foreign Terrorist Organizations and Primary Locations/Areas of Operation mored vehicles) inside the bases. The photographs
were believed to have been made within the past 2
Abu Nidal Organization (ANO) Former other towns in Pakistan; conducts insur- years. In addition to being used for reconnaissance
and possibly current associates may be gent and terrorist operations in Kashmir missions against British military bases, the images
in Iraq and Lebanon and Afghanistan were reportedly being sold to rogue militias in the
Basra marketplace. The British security services re-
Abu Sayyaf Group (ASG) Founded in the Hizballah Operates in the southern sub- main concerned that Google Earth’s aerial imagery
Basilan Province and operates primarily urbs of Beirut, the Beka’a Valley, and could be used by terrorists to plan attacks against
in the provinces of Sulu Archipelago, the southern Lebanon; has established cells sensitive infrastructures, including electrical power
Zamboanga peninsula, and Malaysia in Europe, Africa, South America, North stations (Harding, 2007).
America, and Asia Over the past few years, mujahideen (Muslim
Al-Aqsa Martyrs Brigade (al-Aqsa) guerrilla warriors engaged in a jihad) have been de-
Operates mainly in the West Bank but Islamic Jihad Union (IJU) S c a t t e r e d veloping a form of online warfare called electronic
has conducted attacks inside Israel and throughout Central Asia and probably jihad, where the Internet is used to wage economic
the Gaza Strip parts of South Asia and ideological warfare against the West. In par-
ticular, Islamic hackers belonging to six groups
Ansar al-Sunna (AS) Primarily central, Islamic Movement of Uzbekistan (IMU) —Ansar Al-Jihad LilJihad Al-Electroni, Inhiyar
western, and northern Iraq Scattered throughout South Asia, Central AlDolar, Hackboy, Majma’ Al-Haker Al-Muslim,
Asia, and Iran; areas of operation include Majmu’at Al-Jihad Al-Electroni, and Munazamat
Armed Islamic Group (GIA) Algeria, the Afghanistan, Iran, Kyrgyzstan, Pakistan, Fursan Al-Jihad Al-Electronic—have used their
Sahel, and Europe Tajikstan, Kazakhstan, and Uzbekistan Web sites to recruit volunteers to participate in
electronic attacks, maintain communication be-
Asbat al-Ansar Primary base of opera- Jaish-e-Mohammed (JEM) Pakistan and tween others engaging in online warfare, and co-
tions is in the ‘Ayn al-Hilwah Palestinian Kashmir ordinate their cyber attacks (Alshech, 2007). To
refugee camp near Sidon in southern date, most of the hacking operations have been tar-
Lebanon Jemaah Islamiyah (JI) Based in Indonesia geted at religious Web sites that promote ideologies
and believed to have cells in Indonesia, perceived to be incompatible with mujahideen be-
Aum Shinrikyo (Aum) Principal mem- Malaysia, and the Philippines liefs (e.g., Christian Web sites) or those believed to
bership is located in Japan; a residual be defamatory to Islam (e.g., non-Islamic forums
branch is located in Russia Al-Jihad (AJ) Afghanistan, Pakistan, and sites promoting women’s rights). Few attacks
Lebanon, the United Kingdom, and have been launched against Web sites maintained
Basque Fatherland and Liberty (ETA) Yemen by the U.S. government, or those associated with
Operates primarily in the Basque au- U.S. defense or financial systems, although these
tonomous regions of northern Spain and Kahane Chai (Kach) Israel and West Bank sites are certainly of interest. In 2006, an Islamic
southwestern France settlements forum conducted a survey among its participants
concerning the targets they would like to attack.
Communist Party of Philippines/New Kongra-Gel (KGK/PKK) Operates pri- Among those identified were the FBI and CIA Web
People’s Army (CPP/NPA) Operates in marily in Turkey, Iraq, Europe, and the sites, as well as the Web sites of Western financial
rural Luzon, Visayas, and parts of north- Middle East institutions (Alshech, 2007).
ern and eastern Mindanao The cyber attacks conducted so far have not been
Lashkar e-Tayyiba (LT) Based in Muridke particularly effective, although they have been well-
Continuity Irish Republican Army (CIRA) and Muzaffarabad organized. The online attacks are led by attack co-
Northern Ireland and the Irish Republic ordinators, who are responsible for posting links to
Lashkar i Jhangvi (LJ) Punjab and Karachi the targeted Web sites and to the hacking programs
Gama’a al-Islamiyya (IG) Operates mainly that will be used by the participants against those
in the Al-Minya, Asyut, Qina, and Sohaj Liberation Tigers of Tamil Eelam (LTTE) sites. The attack coordinators also are responsible
Governorates of southern Egypt; has an Headquartered in northern Sri Lanka; con- for encouraging Islamic forum members to partici-
external presence in the United Kingdom, pate, and they have been responding in increasing
trols portions of the northern and eastern
Afghanistan, Yemen, and in various loca- numbers (Alshech, 2007).
tions in Europe coastal areas of Sri Lanka Two types of Denial of Service (DoS) attacks
have been favored by the Islamic attackers. The
The Islamic Resistance Movement (HAMAS) Libyan Islamic Fighting Group (LIFG) first is message flooding, where a targeted Web
Has an operational presence in every major Members are in Asian, Arabian Gulf, server is overwhelmed with incoming data packets,
city within the Palestinian territories African, and European countries, partic- causing network performance to slow down to an
ularly the United Kingdom unacceptable level or stop altogether. The second
Harak ul-Mujahedin (HUM) Based in is a variation of a buffer overflow attack known as
Muzaffarabad, Rawalpindi, and several a ping attack. A ping is a packet that allows an at-

16 THE FORENSIC EXAMINER Winter 2008 www.acfei.com


tacker to determine whether a given system is ac- Moroccan Islamic Combatant Group Al-Qaeda in Iraq (AQI) Predominately Iraq-
tive on a network. In this type of DoS attack, a (GICM) Morocco, Western Europe, based, with an extensive logistical net-
flood of pings is transmitted to a targeted site. The Afghanistan, and Canada work throughout the Middle East, North
pings saturate the victim’s bandwidth and fill up Africa, Iran, South Asia, and Europe
the system’s buffer (memory space), causing net- Mujahedin-e Khalq Organization (MEK)
work performance to deteriorate and the system Headquartered in Paris and has concen- Al-Qaeda in the Islamic Maghreb (AQIM)
to hang, crash, or reboot. These two types of DoS trations of members across Europe and [Formerly Salafist Group for Call and
attacks are neither new nor particularly effectual, at Camp Ashraf in Iraq Combat (GSPC)] Algeria, the Sahel,
and in most cases, the targeted Web sites have re- Canada, and Western Europe
turned to normal functioning within a few hours National Liberation Army (ELN) Rural and
of the attack (Alshech, 2007). mountainous areas of northern, northeast- Real IRA (RIRA) Northern Ireland, Great
There are signs that extremist groups are inter- ern, and southwestern Colombia, and Britain, and the Irish Republic
ested in carrying out more sophisticated types of Venezuelan border regions
cyber attacks. Disaffected youths who join the Revolutionary Armed Forces of Colombia
terrorist cause tend to be more comfortable using Palestine Liberation Front (PLF) Based in (FARC) Primarily in Colombia with some
information technology than their elder counter- Lebanon activities in neighboring countries
parts, and the technological interdependencies of
our critical infrastructures (e.g., banking and fi- Palestinian Islamic Jihad (PIJ) Primarily Revolutionary Nuclei (RN) Primary area
nancial networks, electrical power systems, water Israel, the West Bank, and the Gaza of operation is in the Athens, Greece met-
treatment facilities, emergency services systems, Strip; central leadership resides in Syria ropolitan area
transportation systems, and telecommunication
systems) are tempting targets. On January 19, Popular Front for the Liberation of Revolutionary Organization 17 November
2008, U.S. Central Intelligence Agency analyst Palestine (PFLP) Syria, Lebanon, Israel, Athens, Greece
Tom Donahue disclosed that online attacks had the West Bank, and the Gaza Strip
disrupted the power equipment in several regions Revolutionary People’s Liberation Party/
outside of the United States, causing power out- Popular Front for the Liberation of Front (DHKP/C) Turkey, primarily Istanbul,
ages in several cities (McMillan, 2008). Although Palestine-General Command (PFLP-GC) Ankara, Izmir, and Adana
not terrorist-related, these attacks did not go un- Headquartered in Damascus with bases
noticed by extremist groups, raising the specter of in Lebanon Shining Path (SL) Peru, with most activity
similarly caused events that might result in mass in rural areas
casualties, escalating levels of fear, and adverse eco- Al-Qaeda (AQ) Worldwide networks are
nomic reverberations. augmented by ties to local Sunni extrem- United Self-Defense Forces of Colombia
ists; while the largest concentration of se- (AUC) Strongest in northwest Colombia
Maintaining secret communications nior members reside in Pakistan, the net-
In January 2007, an encryption program called work incorporates members of al-Qaeda Source: Office of the Coordinator for
Counterterrorism. (2007b, April 30). Country re-
Mujahideen Secrets 1 was released on the Web site in Iraq and other associates throughout ports on terrorism, Chapter 6 – Terrorist organiza-
of Al-Ekhlaas, an Islamic forum and Al-Qaeda sup- the Middle East, Southeast Asia, Africa, tions. Retrieved January 5, 2008, from http://www.
port group. The program provided users with the Europe, and Central Asia state.gov/s/ct/rls/crt/2006/82738.htm

ability to encrypt files and e-mail messages using


five different cryptographic algorithms, including
256-bit symmetric (secret key) encryption systems
and 2,048-bit asymmetric (public key) encryption
systems (Messmer, 2008a).
One year later, an enhanced version of the
software was released on the same Web site.
Mujahideen Secrets 2 offers additional capabilities
not included in Mujahideen Secrets 1, including an
easier-to-use graphical user interface and the ability
to encrypt chat communications (Vijayan, 2008;
Messmer, 2008b). This latter capability is designed
to better protect the identities and locations of ter-
rorists while online (Anonymous, 2008).

Publicizing acts of violence and


enhancing the perception of strength
For several years, jihadists have used the Internet
to broadcast their atrocities and thereby promote
an image of power. In 2002, the execution-style
murder of journalist Daniel Pearl was electroni- s Hezbollah leaders and militaristic themes featured in a YouTube video.

(800) 592-1399 Winter 2008 THE FORENSIC EXAMINER 17


cally distributed. Over the next 2 years, as bet- … are increasing in both number and geograph-
ter video compression and editing tools became ic dispersion” (Office of the Director of National
available and network bandwidth increased, other Intelligence, 2006). Jihadist operations are de-
videos were distributed (Glasser & Coll, 2005). signed to draw attention, demonstrate capability,
On April 9, 2004, a short video entitled “Heroes harm their enemies, galvanize the Muslim com-
of Fallujah” was posted by Abu Musab Zarqawi’s munity, provoke and attract recruits to the cause
followers, showing masked men positioning a (Jenkins, 2007), and ultimately, foster a perception
roadside bomb in a hole in the road, then cap- of great strength (Kaplan, 2006). According to a
turing the result as it destroyed a U.S. armored 2007 National Intelligence Estimate, the threat of
personnel carrier (Glasser & Coll, 2005). More terrorist violence against the United States will per-
graphic videos followed, including one distribut- sist and evolve over the next 3 years (Office of the
ed on May 11, 2004, that underscored the hor- Director of National Intelligence, 2007).
rific partnership that had evolved between tech-
nology and terrorism. On that day, a link to a Implementing an effective response
sSara Berg, the sister of hostage video showing Nicholas Berg’s beheading by Abu The increasing threat from radicalization requires
Nicholas Berg, who was killed in Iraq, Musab Zarqawi was posted on the al-Ansar Web a deliberate and comprehensive response. The op-
gathers sympathy cards from floral ar-
rangements left at the family’s home in
forum (Glasser & Coll, 2005). Since then, terror- tions outlined below collectively form a coordinated
Chester County, Pennsylvania. MCT News ist atrocities have been recorded and distributed counter to terrorist information operations; these
Service. online in almost real-time. options are suggested for further discussion.
A 2006 National Intelligence Estimate conclud- Option 1: Develop a stronger connection with
ed that “activists identifying themselves as jihadists Muslim communities.

18 THE FORENSIC EXAMINER Winter 2008 www.acfei.com


To help prevent the alienation and isolation that
many believe are the prerequisites for radicaliza-
tion, we need to develop a better understanding
of, and connection with, Muslim communities, “Information operations are vital to radicalization; however,
both in the United States and throughout the world
(Sutherland, 2007). Muslim community leaders
should be active participants in improving cross- the United States and the international community have
cultural dialogue, and they should play an active
role in influencing Muslim perspectives in other
parts of the world (Sutherland, 2007). To assist
yet to marshal a coordinated and effectively resourced
in this endeavor, the U.S. Department of State’s
Bureau of International Information Programs
recently established Citizen Dialogues as part of
counter to the use of the Internet by extremist groups.”
their Strategic Speaker Program. Citizen Dialogues
sends teams of American Muslims abroad to con-
nect with Muslim communities in other countries,
and individual speakers to talk about religious free-
dom, diversity, and Muslim life in the United States Option 4: Assist our allies in implementing a
(Curtin, 2007). State and local governments must comprehensive online counter-narrative.
reach out to the Muslim communities, and individ- How we enable and assist our allies in launching
uals from the federal government (e.g., Department their online rebuttals and multimedia information
of Justice, Department of the Treasury, Department campaigns is just as important as how we create
of Homeland Security, Department of State) must and transmit our own counter-narrative. We must
continue to meet with leaders from these commu- continue to develop sound relationships with allied
nities to further establish open lines of communi- governments (Sutherland, 2007), and help them
cation (Sutherland, 2007). to understand that although extremist propaganda
Option 2: Encourage the integration of immi- and other online terrorist activities pose a signifi-
grants. cant danger to us, the threat is equally perilous to
Leaders in the Muslim communities can assist them.
in the integration of new immigrants, and they Option 5: Promote interagency initiatives to The FBI’s Role:
should be encouraged to do so (Sutherland, 2007). undermine terrorist information operations.
To assist in this endeavor, some promising commu- The U.S. Department of State’s Bureau of The FBI plays two important
nity activities have been initiated by the Office for International Information Programs has established roles in protecting cyber-
Civil Rights and Civil Liberties within the U. S. the Counterterrorism Communications Center, an space:
Department of Homeland Security. For example, initiative that draws together several U.S. govern-
in Michigan, the Instructor’s Guide for Community ment entities, including the Department of State, “1) The FBI is the lead law en-
Emergency Response Training has been translated the Department of Defense, and the United States forcement agency for detecting
into Arabic, helping American Muslims to become Agency for International Development (USAID). and defeating cyber-based at-
more actively involved in training efforts for emer- Experts from appropriate government agencies tacks against the nation’s criti-
gency response. Although an encouraging start, are assigned to the Center to develop and deliv- cal infrastructures by foreign
much more needs to be done to promote assimi- er proactive messages that are designed to under- adversaries and terrorists.
lation. mine ideological support for violent extremism
Option 3: Implement a comprehensive online (Curtin, 2007), and to respond to statements and 2) The FBI works to prevent
counter-narrative. actions by terrorist groups and leaders (Strategic criminals, sexual predators,
We must better understand the narrative used Communication and Public Diplomacy Policy and those intent on mali-
by violent extremists so that we can implement the Coordinating Committee, 2006). Working sub- cious destruction from using
necessary multimedia counter-narrative to combat groups of the Center study different aspects of the the Internet and online servic-
extremism and promote integration (Sutherland, philosophical struggle, including terrorists’ use of es to steal from, defraud, and
2007). The Digital Outreach Team within the the Internet, television programming, and publish- otherwise victimize citizens,
U.S. Department of State’s Bureau of International ing technologies, and make appropriate recommen- businesses, and communities.
Information Programs has established a U.S. pres- dations for action (Strategic Communication and Investigations can include unau-
ence in Arabic cyberspace (Curtin, 2007); howev- Public Diplomacy Policy Coordinating Committee, thorized access (hacking) viola-
er, to better compete with those who frequent ter- 2006). tions, denial of service attacks,
rorist sites, the federal government should launch Greater efforts need to be made to involve private Internet fraud schemes, mali-
additional Web sites, blogs, Web casts, video and sector entities in government interagency initia- cious code (virus and worms),
audio broadcasts, chat rooms, online forums, and tives. The travel and tourism industry, the higher or copyright violations.”
video games to create an online counter-offensive education community, and the business and labor
(U.S. Senate Committee on Homeland Security & communities have a collective interest in improv- Source: www.fbi.gov
Governmental Affairs, 2007). ing U.S. relations with individuals throughout the

(800) 592-1399 Winter 2008 THE FORENSIC EXAMINER 19


world (Strategic Communication and Public Messmer, E. (2008a, January 23). Al-Qaeda group Strategic Communication. Retrieved April 17, 2008,
Diplomacy Policy Coordinating Committee, claims to have strengthened its encryption security. Net- from http://jmw.typepad.com/political_warfare/files/
2006). work World. Retrieved February 13, 2008, from http:// stratcommo_plan_070531.pdf
www.networkworld.com/news/2008/012308-al-qaeda- Sutherland, D. W. (2007, March 14). Threat of
Conclusion encryption.html Islamic radicalization to the homeland. Written testi-
Information operations are vital to rad- Messmer, E. (2008b, February 1). Al-Qaeda group’s mony to the United States Senate, Committee on Home-
icalization; however, the United States encryption software stronger, security firm confirms. land Security and Governmental Affairs. Retrieved
and the international community have Network World. Retrieved February 13, 2008, from February 13, 2008, from http://hsgac.senate.gov/_
yet to marshal a coordinated and effec- http://www.networkworld.com/news/2008/020108- files/031407Sutherland.pdf
tively resourced counter to the use of the al-qaeda-encryption.html U.S. Senate Committee on Homeland Security &
Internet by extremist groups (Office of the Office of the Coordinator for Counterterrorism. Governmental Affairs. (2007, May 3). Terrorists use In-
Coordinator for Counterterrorism, 2007a). (2007a, April 30). Country reports on terrorism, Chap- ternet to recruit, train, launch attacks. Retrieved January
The Internet is used in numerous ways and, ter 1 – Strategic assessment. Retrieved January 5, 2008, 5, 2008, from http://www.senate.gov/~govt-aff/index.
from the terrorists’ perspective, each is in- from http://www.state.gov/s/ct/rls/crt/2006/82727. cfm?FuseAction=PressReleases.Detail&Affiliation=C&
dispensable. htm PressRelease_id=1457&Month=5&Year=2007
Office of the Coordinator for Counterterrorism. Vijayan, J. (2008, February 4). Updated encryption
References (2007b, April 30). Country reports on terrorism, Chap- tool for al-Qaeda backers improves on first version, research-
Alshech, E. (2007, February 28). Cyberspace as a ter 6 – Terrorist organizations. Retrieved January 5, 2008, er says. Retrieved February 13, 2008, from http://www.
combat zone: The phenomenon of Electronic Jihad. The from http://www.state.gov/s/ct/rls/crt/2006/82738. computerworld.com/action/article.do?command=view
Jerusalem Post. Retrieved January 8, 2008, from http:// htm ArticleBasic&articleId=9060939
www.jpost.com/servlet/Satellite?cid=1171894537514& Office of the Director of National Intelligence. Weimann, G. (2004). www.terror.net: How mod-
pagename=JPost%2FJPArticle%2FShowFull (2006, April). Trends in global terrorism: Implications ern terrorism uses the Internet. Special Report No. 116,
Anonymous. (2008, January 29). Jihadi Web- for the United States. Retrieved March 10, 2008, from United States Institute of Peace. Retrieved January 8,
site distributes new encryption program. Terror- http://www.dni.gov/press_releases/Declassified_NIE_ 2008, from http://www.usip.org/pubs/specialreports/
ism Focus. Retrieved February 13, 2008, from Key_Judgments.pdf sr116.html n
http://www.jamestown.org/terrorism/news/article. Office of the Director of National Intelligence.
php?articleid=2373929 (2007, July). The terrorist threat to the US homeland.
Curtin, J. (2007, May 10). Violent Islamic extrem- Retrieved March 10, 2008, from http://www.dni.gov/
ism: Government efforts to defeat it. Testimony pre- press_releases/20070717_release.pdf
sented before the U.S. Senate Committee on Homeland Porth, J. S. (2006, May 8). Terrorists use cyberspace
Security and Governmental Affairs. Retrieved March 10, as important communications tool. Retrieved January 8,
2008, from http://hsgac.senate.gov/_files/051007Curtin. 2008, from http://usinfo.state.gov/is/Archive/2006/
pdf May/08-429418.html
Glasser, S. B., & Coll, S. (2005, August 9). Smith, S. D. (2006, May 5). Terrorists use in-
The Web as weapon. The Washington Post. Re- ternet for propaganda, defense officials say. Mili-
trieved January 8, 2008, from http://www.washing- tary Connections. Retrieved January 5, 2008, from
tonpost.com/wp-dyn/content/article/2005/08/08/ http://www.militaryconnections.com/news_story.
AR2005080801018_pf.html cfm?textnewsid=1933
Harding, T. (2007, January 13). Terrorists use Strategic Communication and Public Diplomacy Earn CE Credit
To earn CE credit, complete the exam for this
Google maps to hit UK troops. The Daily Telegraph. Policy Coordinating Committee. (2006, December article on page 13 or complete the exam on-
Retrieved January 5, 2008, from http://www.tele- 14). U.S. National Strategy for Public Diplomacy and line at www.acfei.com (select “Online CE”).
graph.co.uk/news/main.jhtml?xml=/news/2007/01/13/
wgoogle13.xml
Jenkins, B. M. (2007, April 5). Building an army
of believers: Jihadist radicalization and recruitment. About the Author
Testimony presented before the House Homeland Secu-
rity Committee, Subcommittee on Intelligence, Informa- Marie Wright, PhD, CHS-IV, is a Professor of Management Information Systems
tion Sharing and Terrorism Risk Assessment. The RAND at Western Connecticut State University. She received her PhD in Information and
Corporation. Retrieved February 13, 2008 from http:// Control Systems from the University of Massachusetts/Amherst. She has written
www.rand.org/pubs/testimonies/2007/RAND_CT278- more than three dozen articles on information systems security, published in jour-
1.pdf nals such as Computer Fraud & Security, Computers & Society, Data Security
Kaplan, E. (2006, May 12). Terrorists and the Inter- Management, The Forensic Examiner, Network Security, and Review of Business,
net. Council on Foreign Relations. Retrieved January 8, and is the co-author of Information Security: Contemporary Cases (Jones and
2008, from http://www.cfr.org/publication/10005/ Bartlett Publishers, 2007). She is a member of the American College of Forensic
McMillan, R. (2008, January 19). CIA says Examiners Institute, American Society for Industrial Security, the Association for
hackers pulled plug on power grid. Network World. Computing Machinery, Beta Gamma Sigma National Honor Society, Computer
Retrieved January 22, 2008, from http://www.net- Security Institute, Information Systems Security Association, InfraGard Connecticut,
workworld.com/news/2008/011908-cia-says-hackers- and the Institute for Electrical and Electronics Engineers.
pulled-plug.html

20 THE FORENSIC EXAMINER Winter 2008 www.acfei.com


Case Study

DOES BRUTALITY COME WITH THE BADGE?

By Bruce Gross, PhD,


JD, FACFEI, DABFE,
DABFM, DABPS, DAPA

(800) 592-1399 Winter 2008 THE FORENSIC EXAMINER 21


Despite the ratification of the Eighth Amendment ology of such violence scarce, a few notable stud-
in 1791, which bans the use of “cruel and unusual” ies do exist.
punishment, reports of excessive violence perpe- In 1961, Yale University psychology professor
trated by correctional officers against inmates have Stanley Milgram conducted what his subjects be-
been documented since the inception of the United lieved was a study on memory (Milgram, 1974).
States penal system. These complaints come not The participants were divided into two, seemingly
only from inmates, but also from federal authori- random groups: the “teachers,” who were the actual
ties who acknowledge the problem is widespread. subjects; and the “learners,” who were, in fact, con-
(Gibbons & Katzenbach, 2006) federates of the study. The “teachers” were instruct-
According to the Commission on Safety and ed to read a list of words to the “learners” (whom
Abuse in Prisons, in 2005 there were 16,000 al- they could not see) and to administer a “shock”
legations of prison staff misconduct (including (none was actually given) whenever the “learner”
sexual and physical assault as well as the introduc- made a mistake. Each mistake was to be followed
tion of contraband) brought to the Office of the by a shock of increasing intensity.
Inspector General alone (Fine, 2005). To date, there Surprisingly, every “teacher” was willing to shock
is no system for collecting data on a national level their “learner” up to 300 volts, and two-thirds gave
regarding excessive, non-lethal violence used by the maximum shock requested: 450 volts. This was
prison staff against inmates. Despite this, a simple done despite the confederates’ claims of having a
Internet search regularly returns numerous links “heart condition” and while hearing the “learner”
to articles regarding violence in state and federal cry out in pain. In Milgram’s study, the subjects
prisons across the nation. were very “normal,” “everyman” people, who per-
Excessive violence by guards exists and persists formed rather horrific acts. The results of the study
not only in state prisons, but in county jails as well. were taken as scientific “proof ” that “evil” or violent
For over 25 years the Cook County jail in Illinois behavior might be more “ordinary” than we would
(one of the largest jails in the U.S.) has been un- like to believe.
der judicial review as a result of extreme and un-
resolved overcrowding (Becker, 2008). In 2004, a Creating Evil
special grand jury was convened to address the mass In August of 1971, 10 years after the Milgram ex-
beating of inmates that took place in 1999. Despite periment, psychology professor Philip Zimbardo
this, the use of excessive violence by correctional of- (who was friends with Milgram in high school)
ficers against inmates has continued to the present. led a team of researchers at Stanford University in
Inmates have been choked, kicked, punched, and a study of the dynamics that develop within and be-
hit with objects, by single or multiple guards, for tween groups in a simulated prison setting (Musen
offenses that range from an act of violence against & Zimbardo, 1991; Haney, Banks & Zimbardo,
staff, to verbal insults towards staff, to failure to 1973; Zimbardo, 1971). Zimbardo placed an ad in
comply with instructions. a newspaper, offering recruits $15 per day for their
These “punishments” have resulted in inmates suf- participation in a two-week “prison simulation”
fering everything from black eyes, contusions, lac- study. Of the 70 respondents, the 24 who were
erations, lost teeth, fractured noses and ribs, broken the most mentally stable and physically healthy
arms and jaws, as well as head trauma. For example, were randomly assigned to “prisoner” or “guard”
in 2007, an inmate was handcuffed and beaten by groups. The 24 male college-student guards were
a group of guards in a clothing room for having ex- predominantly white and middle-class. Rather than
posed himself to a female officer. The inmate, who objectively observing the study, one of Zimbardo’s
was left with severe head injuries, had a history of research assistants assumed the role of “warden”
mental illness. In July 2008, the U.S. Attorney’s of- and Zimbardo, himself, took the role of prison
fice in Chicago and the Civil Rights Division of the “superintendent.”
Department of Justice issued a 98-page report to Those subjects assigned to be guards were dressed
the Cook County Sheriff and Cook County Board in matching khaki “uniforms” and mirrored sun-
President outlining the atrocities. glasses (to block full eye contact). The day before the
experiment began, the guards were given an “orien-
The Study of Violence tation” by Zimbardo in which they were told they
History is replete with incidents of seemingly de- could not physically harm or injure the prisoners.
cent people committing horrendous acts of vio- However Zimbardo also told them, “You can create
lence in what they believe to be the pursuit or de- in the prisoners feelings of boredom, a sense of fear
fense of justice and right. After World War II and to some degree, you can create a notion of arbitrari-
the horrors of the Nazi Concentration Camps, ness that their life is totally controlled by us, by the
several attempts to study such extreme and “evil” system, you, me—and they’ll have no privacy. They’ll
behavior were undertaken. While moral and ethi- have no freedom of action, they can do nothing, say
cal constraints make empirical research on the eti- nothing that we don’t permit. We’re going to take

22 THE FORENSIC EXAMINER Winter 2008 www.acfei.com


away their individuality in various ways. In general the guards. For example, they made some prisoners
what all this leads to is a sense of powerlessness. That wear paper bags over their heads; took uniform/gowns
is, in this situation we’ll have all the power and they’ll away from the prisoners; and some guards forced pris-
have none.”(Zimbardo, 1989) oners into simulating homosexual acts, and some pre-
Those subjects who were assigned to the prisoner vented prisoners from using the bathroom.
group were “arrested” at their homes and “charged” By only the second day the prisoners were plan-
with armed robbery. With the assistance of the Palo ning a riot. In response, the guards agreed to work
Alto Police Department, the prisoners had their “overtime” without compensation and ultimate-
“mug-shots” taken at the station and were finger- ly used fire extinguishers to “calm” them. By the
printed, strip-searched, sprayed for lice, and given fourth day some of the prisoners were planning to
their uniform (ill-fitting hospital gowns, knit-type “escape,” in response to which some of the guards
caps, and no underwear) that were marked with (especially one) became increasingly malevolent. At
their “prisoner number.” With a chain around their this point, the “superintendent” and “warden” of-
ankles, the prisoners were blindfolded and taken fered the prisoners the option of parole, which they
to the simulated “prison” in the basement of the could only obtain by forfeiting their full stipend. s Stanley Milgram
psychology building on the Stanford campus. Although some of the prisoners had accepted the
terms of parole and signed away their pay, the op-
t The shock generator
Evil Interactions tion of parole was revoked. Despite this, none of
In order to erase the prisoners’ sense of individual the prisoners asked to leave the experiment.
identity, the guards were to refer to the prisoners by Around this time a new prisoner was introduced
number rather than by name. Repeatedly, the guards to the prison. He immediately began objecting to
had the prisoners “count-off ” and they were forced how the guards were treating the prisoners, which
into extended exercising for any errors. As mattresses only served to increase the guards’ mistreatment.
were valued in the prison, guards would remove them The new inmate went on a “hunger strike” for
as punishment, forcing the prisoners to sleep on the which the guards placed him in “solitary confine-
cold concrete floor. Other forms of depersonalizing ment” (that is, a closet). In an effort to create divi-
and degrading punishments were also employed by sion between the prisoners, they were told the only

Find the crime they’re trying to hide.


F orensic Accountants track the money and solve the crimes. The best of the best belong to an
elite organization that has rigorous standards and works constantly to advance the important
profession of forensic accounting. Becoming a Certified Forensic Accountant (Cr.FA) puts you in good
company, helps you to hone your skills, and recognizes your training, experience, and dedication.

W :
NO ABLE
AIL E
AV ONLINION
S
VER

®
Log on to www.acfei.com/crfa for details.
Call (800) 592-1399 to talk to member services.
Act now to start enjoying the benefits of certification.

(800) 592-1399 Winter 2008 THE FORENSIC EXAMINER 23


way the new prisoner would be able to get out of believed his study demonstrated that violence or ex-
solitary would be for all of them to give up their treme behaviors were the direct result of situational
blankets; all but one refused to do so. factors, rather than a reflection of the dispositions or
Numerous people (not associated with the study) personalities of the group members.
had observed the “prison” but not one commented Although the guards’ tyrannical behavior may have
on the conditions under which the prisoners were been a “natural” reaction to the dynamics of the in-
living or how the guards were behaving. Only one herent power differential, it is also possible that it was
person questioned the ethics or morality of the exper- due to any number or combination of other causes
iment, a female graduate student Zimbardo was dat- not accounted for by Zimbardo. The most obvious
ing at the time (and later married) and had brought possibility is related to the fact that Zimbardo did
in to the study to conduct interviews. Because of not truly allow the dynamics of differential power
her concerns, after only 6 days Zimbardo ended the to evolve independently. Instead, he literally set the
s Phillip Zimbardo
study. At their exit, many of the prisoners were show- stage for abuse in his “orientation” for the guards.
ing signs of traumatization, while most of the guards As such, the guards may merely have been respond-
Phillip Zimbardo were upset that the study had been shut down. ing to Zimbardo’s instructions and doing their best
Phillip Zimbardo is a professor emeri-
to comply and conform to what they believed was
tus at Stanford University. He conducted Putting Evil in Context expected of them. If so, and at least in terms of the
the Stanford Prison Experiment in 1971, During the 6 days of the study (known as the Stanford guards, the study was of how readily people would
and it remains controversial to this day.
The experiment, in which a simulated Prison Experiment [SPE]), approximately one-third realize Zimbardo’s vision of a prison.
prison was set up, found that a third of of the guards exhibited “sadistic” behaviors. Zimbardo Another possible explanation for the brutality
the “guards” exhibited sadistic behavior
only days into the scenario. Zimbardo is
felt this was the result of the guards’ inability to re- seen in the SPE is that the participants had more
also the author of The Lucifer Effect, which sist the pressure of their role. Believing that people vulnerability to, or propensity for, cruelty than the
examines the origins of evil.
lose their ability to exercise moral judgment once in screening methods were able to detect. This is es-
a group, he asserted that groups are inherently danger- pecially so given the ad Zimbardo used to recruit
ous. Zimbardo concluded that when groups of people subjects specifically indicated that the volunteers
have unequal power, cruel and vile behavior would would be participating in a prison study. The issue
be the “natural,” inevitable expression of those in the of possible selection bias is borne out by a study
role or group with power. In other words, Zimbardo conducted at Western Kentucky University. Having

YOUR SECURITY IS AT STAKE!


An Essential Certification for All Who Handle Sensitive Information
Information theft, corporate espionage, and trade
secret compromises are at all-time highs. Are you
armed with the training to protect your sensitive
personal and business documents?
SM
The Sensitive Security Information, Certified
program, developed by the American Board for
Certification in Homeland Security, will train you
to be an effective guardian of sensitive information
in all its forms. Certification shows your present
and future employers that you are well-trained and
dedicated to protecting information security—a
sought-after skill in today’s public and private sectors.

Become Sensitive Security


Information, Certified Today!

Register Today! Call Toll-free (800) 592-1399 or visit www.acfei.com/ssi for more details.

24 THE FORENSIC EXAMINER Winter 2008 www.acfei.com


recruited subjects using two ads, one with and one The ‘Reality’ of Evil Relevant terms:
without the words “prison life,” the researchers In May of 2002 the British Broadcasting
found that the students who volunteered for the Corporation (BBC) aired “The Experiment,” a Groupthink: Psychological
“prison life” study possessed underlying propensities reality show that chronicled the research of Alex studies have shown that thought
for violent or abusive behavior (such as social domi- Haslam and Steve Reicher, both psychology profes- patterns displayed by groups
nance, narcissism, aggressiveness, and the absence sors at universities in England (Reicher & Haslam, can be flawed because of the
of empathy) (Carnahan & McFarland, 2007). 2006a, 2006b; Haslam & Reicher, 2005). Funded tendency of group members
As “superintendent” of the prison, Zimbardo was by the BBC, the study was an effort to gain a full- to minimize conflict and reach
a participant in his own study but was not part of er understanding of the results of the SPE. Where consensus without proper eval-
the “guard” group. That is, he was not directly in- Zimbardo focused his findings on the “evil” side uation of ideas.
volved in the mistreatment of the prisoners. Despite of internalized group membership, Haslam and
this seeming detachment, Zimbardo did not inde- Reicher believed that pro-social empowerment Mob Mentality: When two
pendently perceive the immediate need to termi- or resistance to tyranny can also be motivated by or more people take justice into
nate the experiment, nor did any of his research as- group membership. their own hands, often ignoring
sistants. The researchers were essentially vicarious Unlike the SPE, the researchers did not take an ac- laws and common standards
participants in the mistreatment, suggesting they tive role in the study, and (among other safeguards) for human behavior.
may have created a climate or culture of abuse prior they had an independent ethics committee that was
to the onset of the project. fully empowered to end the experiment at any time Herd Behavior: Research
Of note, Zimbardo did not account for the two- should they deem it necessary. In addition, the par- shows that large numbers of
thirds of the guards that did not behave inhumane- ticipants underwent daily physiological and psycho- people tend to act in the same
ly towards the prisoners. Many of those guards as- logical screenings to assess for any changes in their way at the same time.
serted their authority, but with fairness. Others status. Another significant difference between the
were quite kind to the prisoners and actually did SPE and the BBC Prison Study (as it became known) Emulation: The tendency for
them favors. Rather than indicating that a group was that, initially, the prisoners had an opportunity some group members to copy
with power over another group is dangerous, the to be “promoted” to the position of guard. other members of higher sta-
results of the SPE might have been interpreted as The hypothesis being tested was that as long as tus.
supporting the premise that groups can foster pro- the prisoners had the possibility of promotion, they
social behavior, reinforcing moral judgment. would not fully accept the prisoner-group iden-

CMI
CERTIFIED MEDICAL INVESTIGATOR ,
CMI PROGRAM

Elite investigations are united by the company they


®

keep. Certification makes connections and advanc-


es the profession. Become a Certified Medical
Investigator, CMI today!

Levels 1—IV available online.


Level V available in person.

www.acfei.com • (800) 592-1399

(800) 592-1399 Winter 2008 THE FORENSIC EXAMINER 25


tity. At the beginning of the study the prisoners
were very compliant and focused on earning a pro-
motion. As soon as the option for promotion was
removed, the prisoners became increasingly unco-
operative and resistant towards the guards. At the
same time, in addition to becoming more positive
and empowered, the prisoners became increasingly
organized and effective as a group.
On the other side, the guards were unable to reach
a consensus regarding how to exercise their author-
ity; that is, they never developed or established a
shared identity. As a result, as a group the guards
were disorganized and unable to maintain order
among the prisoners. Psychologically, they showed
signs of increasing despondency and “burn-out.” As
might be expected, by the sixth day, the prisoners
had organized an “escape” and after its attempt, the
groups spontaneously began creating a more egali-
tarian system.
Although there was some self-governing or self-dis-
ciplining among the prisoners, there were some guards
who remained unable or unwilling to use their au-
thority or power. Among the guards a sub-group de-
veloped that included some of the prisoners that had
been promoted. This emerging guard-group wanted
to take a more rigid and harsh approach to running
the prison. Surprisingly, those guards who had sup-
ported the egalitarian structure not only did not fight
to maintain the status quo, but actually adapted to the
“new order” sub-group. Seeing the direction in which
the prison environment was inevitably moving, the
study was terminated before its scheduled end date.
Although both the SPE and the BBC Prison Study
ended early, Haslam and Reicher believed the results
of their study were not the natural outcome of group
assignment and mindless participation. Instead, they
On June 30, 2007 — concluded their outcome reflected the result of the
guards’ inability to form a shared vision and the
• 2,299,116 prisoners were held in federal or state pris- egalitarian group’s (which included some guards)
ons or in local jails – an increase of 1.8% from year- inability to turn their vision into reality. Consistent
end 2006, less than the average annual growth of 2.6% with Tajfel and Turner’s (1979) social identity theo-
from 2000-2006. ry, Haslam and Reicher assert that groups represent
• 1,528,041 sentenced prisoners were under state or fed- collective self-realization, and when a unified value
eral jurisdiction. or belief system is not manifested, individual mem-
• There were an estimated 509 sentenced prisoners per bers become increasingly willing to adopt those of
100,000 U.S. residents – up from 501 at yearend another, seemingly more functional group. Although
2006. Haslam and Reicher acknowledge that context has
• The number of women under the jurisdiction of state an effect on individual and group behavior, they are
or federal prison authorities increased 2.5% from year- not of the opinion that it is always and only in the
end 2006, reaching 115,308, and the number of men direction of misconduct and brutality.
rose 1.5%, totaling 1,479,726.
• At midyear 2007 there were 4,618 black male sentenced Good Born of Evil
prisoners per 100,000 black males in the United States, Both prison studies demonstrated that under some
compared to 1,747 Hispanic male sentenced prisoners circumstances, some individuals resist going-with-the-
per 100,000 Hispanic males and 773 white male sen- flow of group-associated brutality. Both studies focus
tenced prisoners per 100,000 white males. on the group itself as a causative factor; that is, via mere
membership or via assimilation of group identity. Both
studies also point to the importance of leadership of,
Credit: The Bureau of Justice Statistics and within, groups.

26 THE FORENSIC EXAMINER Winter 2008 www.acfei.com


In the BBC Prison Experiment, the par- rity and trained the guards to encourage and ida, Commission on Safety and Abuse in America’s Pris-
ticipants knew their behavior would be seen reinforce pro-social and responsible prisoner ons. Washington, D.C.: Vera Institute of Justice.
by a public audience that would include fam- behavior. In this prison, the guards were taught Gibbons, J.J. & Katzenbach, N. (2006). Confronting
ily and friends. This knowledge undoubtedly to respect the inmates, see their individuality, confinement: A report of the Commission on Safety and
affected both guards and prisoners, perhaps and to include them in decision-making. As Abuse in America’s Prisons. Washington, D.C.: Vera Insti-
inhibiting violence from the guards and keep- might be expected, the violence exhibited by tute of Justice.
ing the prisoners from complete loss of self. both guards and prisoners varied across prison Haney, C., Banks, C. & Zimbardo, P. (1973). Inter-
In the SPE, the participants also knew they types. The greatest brutality was seen in the personal dynamics in a simulated prison. International
were being observed, but in this case, by “su- “standard custodial” prison, and the least was Journal of Criminology and Penology, 1, 69-97.
periors” who directly and tacitly condoned seen in the “participatory” prison. Haney, C., & Zimbardo, P. (1998). The past and fu-
psychological and physical mistreatment. Certainly the incidence of excessive vio- ture of U.S. prison policy: Twenty-five years after the Stan-
How an individual behaves often varies lence against inmates can be reduced, creating ford Prison Experiment. American Psychologist, 53(7), 709-
based on who the individual knows or be- a more stable and safe prison environment. 727.
lieves will be witness (at the time or after-the- Perhaps the first step might be to ensure that Haslam, S.A., & Reicher, S.D. (2005). The psychology of
fact) to their behavior. As such, if a person guards, as a group, have a shared vision of the tyranny: Power corrupts, and absolute power corrupts abso-
with authority over a group of individuals purpose of prison, the role of authority, and lutely—or does it? Scientific American Mind, 16(3), 44-51.
varies in their zero-tolerance stance towards the “value” of prisoners as individual human- Lovibond, S.H., Mithiran, X., & Adams, W.G. (1979).
brutality, then brutality may emerge. This beings. This vision must be overtly and tacitly The effects of three experimental prison environments on
is especially so if pro-social values have not upheld by superiors within the prison system, the behavior of non-convict volunteer subjects. Australian
been instilled in the group. who actively monitor that the guards retain Psychologist, 14, 273-287.
Zimbardo felt tyranny evolved “naturally” their own sense of humanity. Milgram, S. (1974). Obedience to authority. New York,
in groups with unequal power. While it might Violence and extreme behaviors by guards N.Y.: Harper & Row.
not be “inevitable” as Zimbardo asserts, in against inmates have many sources. These in- Musen, K., & Zimbardo, P. G. (1991). “Quiet Rage: The
light of World War II, brutality may result clude individual pathology, lack of account- Stanford Prison Experiment.” (Documentary). Stanford,
when unequal power is combined with the ability, Machiavellian leadership that condones CA: Stanford University. Video or DVD can be ordered
perception of unequal humanity. That is, when tyranny, and a combination of other factors. In online: http://www.prisonexp.org/pdf/orderform.pdf
a group with power perceives a group with the prison studies mentioned here, it was not Reicher SD & Haslam SA. (2006a). On the agency of
lesser power as “sub-human” in some way. In surprising that seemingly good people com- individuals and groups: Lessons from the BBC Prison Study.
terms of inmates, guards and inmates are not mitted evil acts as individuals or a group. The In: T Postmes & J Jetten (Eds.) Individuality and the Group:
equal in terms of socially conferred status, but most surprising finding was that in the face of Advances in Social Identity. London, England: Sage.
are equally human. However, as the statistics such behavior, so few people acted proactively Reicher, S., & Haslam, S.A. (2006b). Rethinking the
show, they are not always treated as such. and humanely in response. Perhaps the adage psychology of tyranny: The BBC Prison Study. British
In being sentenced to prison, inmates lose is true, that real evil exists and flourishes when Journal of Social Psychology, 45(1), 1-40.
their liberty and, for the duration of their in- good people do nothing. Tajfel, H. (1978). Interpersonal behavior and inter-
carceration, guards control inmates’ freedoms. group behavior. In: H Tajfel (Ed.) Differentiation Between
From birth to death, people seem to have an References Social Groups: Studies in the social psychology of intergroup
inherent need to exert control over their self Becker, G. C. (2008). Report of the findings of the relations. London, England: Academic Press.
and the world in which the self exists. Even investigation of the Civil Rights Division and the Unit- Tajfel H., & Turner, J. C. (1979). An integrative
infants seemingly rebel in an attempt to influ- ed States Attorney’s Office into conditions at the Cook theory of intergroup conflict. In: W. G. Austin, & S.
ence their environment. Individuals in a closed County Jail. Washington, D.C.: U.S. Department of Jus- Worchel (Eds.), The Social Psychology of Intergroup Rela-
environment where the option of obedience tice, Civil Rights Division. tions. Monterey, CA.: Brooks/Cole.
is all that is left of free will may soon come to Carnahan, C. & McFarland, S. (2007). Revisiting the Zimbardo, P. G. (1971). The power and pathology
feel and act like “caged animals.” If dehuman- Stanford Prison Experiment: Could participant self-selec- of imprisonment. Congressional Record. Hearings before
ization of prisoners has been sanctioned in any tion have led to the cruelty? Personality and Social Psy- Subcommittee No. 3 of the Committee on the Judiciary,
way by prison hierarchy, the result may well chology Bulletin, 33(5), 603-614. House of Representatives, 92nd Congress, First Session on
be violence by guards and prisoners alike. Fine, G. (2005). Insiders’ view of violence in prisons. Corrections, Part II, Prisons, Prison Reform, and Prison-
Testimony of the U.S. Inspector General Glenn Fine. ers’ Rights: California. (Serial No. 15) Washington, D.C.:
Ending Evil Transcript of Public Hearing, Hearing One, Tampa, Flor- U.S. Government Printing Office. n
In 1979, Australian researchers conducted a
prison study in which they created three dif-
ferent types of prisons (Lovibond, Mithiran & About the Author
Adams, 1979). The first type was a simulation
of a “standard custodial” medium security pris- Bruce Gross, PhD, JD, MBA, is a Fellow of the American College of Forensic
on in Australia. The second, or “individualized Examiners and is an Executive Advisory Board member of the American Board
custodial,” added training for the guards that of Forensic Examiners. Dr. Gross is also a Diplomate of the American Board of
focused on teaching them how to encourage Forensic Examiners and the American Board of Psychological Specialties. He has
and reinforce the self-respect of prisoners, while been an ACFEI member since 1996 and is a also a Diplomate of the American
maintaining security. The third type, or “par- Psychotherapy Association.
ticipatory” prison, removed the focus on secu-

(800) 592-1399 Winter 2008 THE FORENSIC EXAMINER 27


Case Study

George Lawlor: An Early Visionary


Forensic Detective Established Ireland’s Equivalent of British ‘Murder Squad’
a Bobby’s baton. Thrown into prison, he was held
for more than a year, until his release after Britain
signed a treaty. Free again, Lawlor watched his for-
mer comrades disintegrate into political factions,
so he withdrew.
To earn a living, Lawlor decided to join the fledg-
ling Irish police force, the Garda Síochána. Finding
himself half an inch too short, he stretched up on
his toes, and passed. However, he found the train-
ing to be no more than an uninspired imitation of
methods used for the British police, which left re-
cruits ill-prepared for investigating serious crimes.
Because he was intelligent and responsible, Lawlor
became a detective sergeant in 1928, whereupon
he received his first case.
Galway, in western Ireland, has long been fa-
mous for its horse racing, and during one season
Lawlor was assigned with other detectives to watch
for petty crimes. A man reported the theft of his
gold watch and chain, on which his initials, W.R.,
were inscribed. Given the transient crowds, its re-
covery seemed unlikely, but then a scoundrel was
caught committing fraud and the watch was found
in his pocket. When W. R. received it back, he
went to a pub and sang Lawlor’s praises to anyone
By Katherine Ramsland who would listen. Gratified, Lawlor grew more
interested in what it meant to “detect” and resolve
a crime, which inspired him to read about other
investigations, especially murder.
“I came to realize and appreciate,” he wrote in
have met Mr. Luck several times, but I have always been introduced to his diary, “that in the investigation of crime many
him by his friends, Mr. Persistence and Mr. Hard Work.” So quipped old methods were becoming outdated and that the
Superintendent George Lawlor in a diary he kept in anticipation of time had arrived when science should be applied
writing his memoir. He never did, but Irish journalist Tom Reddy res- to assist in crime investigation.” He grew aware of
cued him from oblivion by publishing his crime stories. Relatively unknown developments in the U.S., particularly with regard
outside Ireland, Lawlor deserves more recognition than he’s received, because to the use of fingerprinting methods and trace evi-
he established Ireland’s equivalent of England’s famous “Murder Squad” and dence examination. By this time, Edmond Locard
brought scientific methods to the national police force. During his watch, his in France had set up the world’s first private crime
team of detectives had one of the best records in the world for solving murders. lab, a sensational trial in Britain had brought in-
Yet Lawlor was hardly a solid candidate for such a career. ternational attention to fingerprint identification,
and a U. S. appeals courts had affirmed fingerprint
methodology as scientific. Blood types had been
s Superintendent George Lawlor of the
Technical Bureau sits at right with a col-
During his youth in the early 1900s, Lawlor distinguished, ballistics was gaining a database,
league at his desk in Garda Headquarters. considered police work to be “dull and monoto- microscopy had improved, and there was even a
Lawlor established Ireland’s first nous,” and he soon had reason to despise author- vacuum apparatus to collect trace evidence. In
“Murder Squad.” Photograph, indexed
P1/150/04, courtesy the George Pickow ity. An idealist and Republican, he joined several addition, the popularity of Sherlock Holmes had
Collection of the James Hardiman Library, movements that resisted British rule in Ireland, brought more attention to the art of crime detec-
NUI Galway.
including the extremist Sinn Féin, and during the tion.
1916 uprising in Dublin, when Lawlor was 18, he Lawlor took a correspondence course in finger-
learned what it felt like to be on the wrong end of printing and photography sponsored by Chicago’s

(800) 592-1399 Winter 2008 THE FORENSIC EXAMINER 29


Institute of Applied Science and became acquainted it over with blue ink. This suspicious circumstance
with a local forensic pathologist, who taught him nevertheless maintained her status as a suspect.
about blood tests, toxicology, and wound analysis. The search around the body dump site turned
Lawlor even wrote a manual for identifying John up some interesting items. The victim had been
Does by how their specific trades left distinct marks pulled several feet, as revealed in drag marks ex-
on fingers and hands. tending from the body back toward Mamie’s flat,
Unfortunately, his colleagues failed to share his where bloodstains were found in the hallway of her
enthusiasm for these “newfangled” ideas, so he met building. This gave the detectives reason to process
with resistance. In fact, for the purpose of classify- the apartment, and they removed two coconut fiber
ing fingerprints taken from prisoners, one doubt- floor mats, a rabbit fur cape, a red dressing gown,
ing Thomas had simply used his own print rather and several combs with head hair in them.
than collecting them, resulting in a dismissal of the Making comparisons, they found that hairs and
Garda Síochána fingerprint system until the lazy maneuver was dis- fur lifted off the victim’s black overcoat matched
covered. Thus, Lawlor had to prove the worth of the rabbit fur coat, and this same fur was also found
The police force for Ireland is the scientific approach. on the floor mats. Hair from the combs was simi-
Garda Síochána, which means Through his self-taught knowledge and skill, he lar in texture and color to strands of hair on the
“Peace Guard of Ireland.” It eventually solved a case of murder that involved the coat. Also, in the heel of the dead woman’s shoe
is often referred to as “The coordination of expertise in several areas and gained they found two hair strands, one of which was re-
Guardians of the Peace of him international attention. By this time, he led markably similar to the rabbit fur. In addition, the
Ireland.” a special investigation unit for major crimes, the victim’s head hair was consistent with hair lifted
Garda Technical Bureau. He himself had suggest- from Mamie’s dressing gown, and red fibers from
Here are some facts about ed the blueprint for it in response to an essay con- the gown were similar to several fibers picked off
Garda Síochána: test, citing the need for widespread, standardized the victim’s coat. More precisely, eighty-nine fi-
training in basic police methodology and emerging bers were found on the dead woman from the floor
• The Irish Free State was forensic science. mats, closely matched along seven different color
established in 1923, and The body of young woman was discovered lying shades, including a faded blue.
the Garda Síochána Act on a Dublin footpath, near a city park known as St. Lawlor was gratified to see how the physical evi-
of August 8, 1923 cre- Stephen’s Green. The deceased was covered with dence brought the case together, and he used the
ated the police force. a black overcoat, soon to be identified as hers, but latest methods of microphotography to prepare ex-
her skirt had been removed and dumped onto her hibits for the judge and jury. Mamie Cadden was
• The first commissioner to head and her panties had been pinned to a cloth convicted of the murder.
lead Garda Síochána used to drag her to this area. A nylon stocking and Lawlor believed in coordinating his team and
was Michael Staines, who scarf were tied tightly around her neck. pooling information, so during each significant
served for only 8 months. Lawlor directed his team to place each article case he held daily conferences. They discussed
His successor, Eoin O’Duffy, of clothing into a separate bag, and they searched suspects and motives until they whittled down
served for 11 years, until the area for anything that could help identify the possibilities to what seemed the most effective
he was dismissed for en- victim. The autopsy indicated that she had died avenues for investigation. They also learned how
couraging a military coup. from air embolism leading to heart failure, rather to use the aura of science to trick suspects into
than from strangulation, as initially assumed. The believing they had evidence when they did not.
• The Scott Medal for stocking and scarf had been tied around the victim’s Lawlor also trained them in crime scene processing
Bravery, established in 1925, neck postmortem, staging the scene. It was also with exercises that had them on hands and knees
is the highest honor that can clear that an abortion had been performed, which going through an overgrown field. Sometimes
be awarded to a member seemed the likely cause of the embolism. they had to return to the same field the following
of the Garda Síochána. The A search of records turned up Mamie Cadden, a day to identify something placed there overnight
medal was named after an convicted abortionist on that street, about 50 feet that they had not noticed before—even an item
honorary commissioner of from where the victim lay. Mamie claimed she as small as a matchstick or hairpin. This kind of
the New York City Police knew nothing about the incident, although a search painstaking exercise assisted with another dicey
Department, who made a of her premises turned up surgical instruments that case, a murder in Howth.
donation to fund the honor. could have been used. She kept a log of clients, During the summer of 1948, in a lover’s lane
identified by code, who purchased cures for minor area in the countryside south of Dublin, the body
• The Garda Síochána has ailments, and on the day before the murder, she had of a woman was found nestled into a hollow in a
taken part in United Nations written “blue coat.” However, Lawlor noted some- hillside. There was blood on her mouth, and it
peace-keeping duties thing strange about this entry; it appeared to be soon became clear that her killer had bludgeoned
since 1989, sending mem- over-written. He had his experts take photographs her about the head and face several times, and had
bers to such locations as and refine them until the original entry was clear; manually strangled her. The Technical Bureau ar-
Angola, Cambodia, Cyprus, they could now see that Mamie had first written, rived to process the scene, photographing the body
Mozambique, South Africa, “black coat.” Mamie denied that was what it said, before removal, and then moving through the area.
and the former Yugoslavia. claiming she had written the first entry with red Fourteen officers got down on their hands and
ink and had difficulty reading it, so she had traced knees to search for evidence.

30 THE FORENSIC EXAMINER Winter 2008 www.acfei.com


Arrive in style to the 2009 National Conference. Order your ACFEI logo products today!

A B C D E

F G H I J

K L M N O

P Q R S

ACFEI Logo Products Name I.D. Number

A. ACFEI wall plaque—$150 Deliver To (Street Address Only)


B. ACFEI fleece blanket (available in black and pink)—$35
Address
C. ACFEI luggage tag—$5
D. ACFEI pocket bouillon, shipping/engraving included—$60 City/State/Zip
E. ACFEI pen & letter opener set—$12
F. ACFEI men’s camp shirt (dark navy, sizes: S to XXXL)—$55 Item Size Quantity Total
G.ACFEI men’s all-weather jacket (Navy, sizes: S to XXXL)—$60
H. The Forensic Examiner T-shirt men’s or women’s (black, sizes:
men’s—S to XXXL; women’s—S to XXL)—$24
I. ACFEI men’s T-shirt (navy, sizes: M to XXL)—$24
J. ACFEI men’s fleece jacket (black, or lt. blue/gray, sizes: S to
XXXL)—$60 Sub-Total
K. ACFEI men’s polo shirt (seafoam green, sizes: men’s—S to Shipping & Handling (See chart below)
XXXL; women’s—S to XXL)—$48 Rush Delivery
L. ACFEI men’s or women’s polo shirt (navy, sizes: men’s S to XXXL; Total
women’s—S to XXL)—$48 Payment Method (Please do not send cash.) ❒Check/Money Order ❒Mastercard/Visa ❒Am.Express
M. ACFEI women’s polo shirt (red, sizes: M to XXL)—$48 (please make checks payable to ACFEI)

N. ACFEI men’s polo shirt (tan, sizes: S to XXXL)—$48 Credit Card Number Exp. Date
O. ACFEI women’s dress shirt (blue, sizes: S to XXL)—$55
P. ACFEI men’s dress shirt (gray, sizes: S to XXXL; XLT & XXLT)—$55 Signature
Q. ACFEI lapel pin—$5
Shipping Costs:
R. ACFEI jotterpad—$5 1 item: $7.50, 2 items: $8.75, 3 items: $10.25, 4 items: $11.75, 5 items: $13.25, 6 items:
S. ACFEI padfolio—$20 $14.75, 7 items: $16.50, 8 items: $18.25, 9 items: $20.00, 10 items:$21.75, Add $1.75 for
each additional item. Overnight: additional $25.00. International orders: additional $25.00

ÓÇxäÊ °Ê-՘ň˜i]Ê-«Àˆ˜}wi`]Ê"ÊÈxnä{ÊUÊ*…œ˜i\Ê­nää®Ê{Ó·™ÇÎÇÊUÊ>Ý\Ê­{£Ç®Ênn£‡{ÇäÓÊUÊÜÜÜ°>Vviˆ°Vœ“
They found two recent newspapers in the been trying to break up with him and he’d himself rethinking his notions about motive,
hollow, apparently used as seats on the wet been fiercely resistant. noting the tragedy in someone’s life of one
grass the previous evening, and a cluster of Arrested for murder, he went to trial. false step, fueled by overwhelming emotional
a dozen burnt matches, as if someone was There, Fanning offered a confession, show- intensity. “Murder is murder … yet there are
searching for something in the dark. Two ing that whatever violence had occurred had cases in which one feels that a line of demar-
expensive fountain pens were also found, been outside his consciousness—he had sim- cation may be drawn.”
one of them missing its clip. Not far away ply reacted from desperation. In fact, a medi- Superintendent George Lawlor had a stel-
was a purse, stashed under a bush, which cal examination indicated a physical anomaly lar career, working long hours for the Garda
provided the victim’s name, Kay Boyne, a that his defense used to buttress his apparent and incorporating every scientific innovation
38-year-old widow. Inside was a desperate insanity: Fanning’s heart and liver were trans- about which he learned. He offered advice
love letter from someone named John, and posed—each was where the other should have freely to others who asked, and when he died
her boyfriend turned out to be John Fanning been. Two medical experts testified that this in January 1961, he was consulting on a case
(who claimed to be her unofficial fiancée). congenital defect was associated with men- for an inspector general from India. Despite
Fanning admitted that he had been with tal deficiency. The prosecutor had a difficult his apparent obscurity, Lawlor deserves rec-
Kay the evening before, but he said that a car- time proving there had been an intent to kill ognition as an early role model for an entire
load of her friends had picked her up, leaving and the defense countered that since Fanning police force and an eminent advocate for the
him to find his own way home. He claimed worked as a chemist’s assistant, he could eas- use of science in law enforcement.
he stopped at a pub and had then found a ily have poisoned Kay if he had intended her
ride with a friend. Nevertheless, questions to harm. The homicide appeared to have been References
his coworkers turned up an interesting item: a tragic over-reaction. Reddy, T. (1991). The murder file: An Irish detective’s
Fanning had recently confided to one woman After an hour and a half of deliberation, casebook. Dublin: Gill & Macmillan.
that he might commit suicide. His drink at the jury found Fanning guilty but recom- Reddy, T. (2005). Murder will out. Dublin: Gill &
the pub also proved to have been fabricated, mended mercy, as there was no evidence of Macmillan.
but physical evidence tying him to the mur- malice aforethought. He received death, but Thorwald, J. (1964). The century of the detective. New
der was lacking. this was later commuted to life. Lawlor found York: Harcourt, Brace & World. n
Then, through interviews, it became clear
that both pens from the murder site had re-
cently been in Fanning’s possession: the broken
one belonged to him (he had the clip) and he About the Author
had borrowed the other pen from a co-work- Katherine Ramsland, PhD, CMI-V, has published 33
er the day before the murder. A recognizable books, including True Stories of CSI and Beating the
pen missing from Boyne’s handbag was found Devil’s Game: A History of Forensic Science and Criminal
in a pocket of Fanning’s shirt, hanging at his Investigation. Dr. Ramsland is an associate professor of fo-
house. When Fanning was searched, detec- rensic psychology at DeSales University in Pennsylvania and
tives found a number of recent scratches on has been a member of the American College of Forensic
several areas of his body, as if from a struggle, Examiners since 1998.
as well as bloodstains on his trousers. Then a
stash of letters indicated that Kay Boyne had

For Most People, College is a Waste of Time


By Charles Murray, Reprinted from the Wall Street Journal © 2008 Dow Jones & Company

Imagine that America had no system of post- We will stigmatize everyone who doesn’t meet
secondary education, and you were a member of the goal. We will call the goal a “BA.”
a task force assigned to create one from scratch. You would conclude that your colleague
One of your colleagues submits this proposal: was cruel, not to say insane. But that’s the
First, we will set up a single goal to represent system we have in place.
educational success, which will take 4 years to Finding a better way should be easy. The
achieve no matter what is being taught. We BA acquired its current inflated status by ac-
will attach an economic reward to it that sel- cident. Advanced skills for people with brains
dom has anything to do with what has been really did get more valuable over the course
learned. We will urge large numbers of people of the twentieth century, but the acquisition
who do not possess adequate ability to try to of those skills got conflated with the existing
achieve the goal, wait until they have spent a lot system of colleges, which had evolved the BA
of time and money, and then deny it to them. for completely different purposes.

32 THE FORENSIC EXAMINER Winter 2008 www.acfei.com


Certification is the Solution
Outside a handful of majors—engineering Certification tests will not get rid of the But when so many of the players would ben-
and some of the sciences—a bachelor’s degree problems associated with differences in intellec- efit, a market opportunity exists. If a high-pro-
tells an employer nothing except that the ap- tual ability: People with high intellectual ability file testing company such as the Educational
plicant has a certain amount of intellectual will still have an edge. Graduates of prestigious Testing Service were to reach a strategic deci-
ability and perseverance. Even a degree in a colleges will still, on average, have higher certi- sion to create definitive certification tests, it
vocational major like business administra- fication scores than people who have taken on- could coordinate with major employers, pro-
tion can mean anything from a solid base of line courses—just because prestigious colleges fessional groups and nontraditional universities
knowledge to four years of barely remem- attract intellectually talented applicants. to make its tests the gold standard. A handful
bered gut courses. But that’s irrelevant to the larger issue. of key decisions could produce a tipping ef-
The solution is not better degrees, but no Under a certification system, 4 years is not fect. Imagine if Microsoft announced it would
degrees. Young people entering the job mar- required, residence is not required, expen- henceforth require scores on a certain battery of
ket should have a known, trusted measure of sive tuitions are not required, and a degree is certification tests from all of its programming
their qualifications they can carry into job in- not required. Equal educational opportunity applicants. Scores on that battery would ac-
terviews. That measure should express what means, among other things, creating a society quire instant credibility for programming job
they know, not where they learned it or how in which it’s what you know that makes the applicants throughout the industry.
long it took them. They need a certification, difference. Substituting certifications for de- An educational world based on certification
not a degree. grees would be a big step in that direction. tests would be a better place in many ways, but
The model is the CPA exam that quali- The incentives are right. Certification tests the overarching benefit is that the line between
fies certified public accountants. The same would provide all employers with valuable, college and noncollege competencies would be
test is used nationwide. It is thorough—four trustworthy information about job appli- blurred. Hardly any jobs would still have the
sections, timed, totaling 14 hours. A passing cants. They would benefit young people who BA as a requirement for a shot at being hired.
score indicates authentic competence (the cannot or do not want to attend a traditional Opportunities would be wider and fairer, and the
pass rate is below 50%). Actual scores are 4-year college. They would be welcomed by stigma of not having a BA would diminish.
reported in addition to pass/fail, so that em- the growing post-secondary online educa- Most important in an increasingly class-
ployers can assess where the applicant falls in tional industry, which cannot offer the halo riven America: The demonstration of compe-
the distribution of accounting competence. effect of a BA from a traditional college, but tency in business administration or European
You may have learned accounting at an anon- can realistically promise their students good history would, appropriately, take on similari-
ymous online university, but your CPA score training for a certification test—as good as ties to the demonstration of competency in
gives you a way to show employers you’re a they are likely to get at a traditional college, cooking or welding. Our obsession with the
stronger applicant than someone from an Ivy for a lot less money and in a lot less time. BA has created a two-tiered entry to adult-
League school. Certification tests would disadvantage hood, anointing some for admission to the
The merits of a CPA-like certification just one set of people: Students who have club and labeling the rest as second-best.
exam apply to any college major for which gotten into well-known traditional schools, Here’s the reality: Everyone in every occu-
the BA is now used as a job qualification. To but who are coasting through their years in pation starts as an apprentice. Those who are
name just some of them: criminal justice, college and would score poorly on a certifi- good enough become journeymen. The best
social work, public administration and the cation test. Disadvantaging them is an out- become master craftsmen. This is as true of
many separate majors under the headings of come devoutly to be wished. business executives and history professors as
business, computer science and education. No technical barriers stand in the way of of chefs and welders. Getting rid of the BA
Such majors accounted for almost two- evolving toward a system where certification tests and replacing it with evidence of competence
thirds of the bachelor’s degrees conferred would replace the BA. Hundreds of certification —treating post-secondary education as ap-
in 2005. For that matter, certification tests tests already exist, for everything from building prenticeships for everyone—is one way to
can be used for purely academic disciplines. code inspectors to advanced medical specialties. help us to recognize that common bond. n
Why not present graduate schools with cer- The problem is a shortage of tests that are na-
tifications in microbiology or economics— tionally accepted, like the CPA exam.
and who cares if the applicants passed the
exam after studying in the local public li- The essay printed above is adapted from Charles Murray’s
brary? new book, Real Education: Four Simple Truths for Bringing
Certification tests need not undermine the America’s Schools Back to Reality (Crown Forum). In the book,
Murray presents an argument that the current higher educa-
incentives to get a traditional liberal-arts edu- tion system is outdated and needs extensive overhaul. He says
cation. If professional and graduate schools that many students would be better served by attending trade
schools or working for certifications rather than going deeply
want students who have acquired one, all into debt for a costly Bachelor of Arts degree.
they need do is require certification scores in
the appropriate disciplines. Students facing
such requirements are likely to get a much
better liberal education than even our most
elite schools require now.

(800) 592-1399 Winter 2008 THE FORENSIC EXAMINER 33


To Register: Call Toll-Free (800) 592-1399 or visit www.acfei.com
2009 National Conference Registration Form
October 14-16, 2009 • Las Vegas, NV • Rio All-Suite Hotel
Members who wish to stay at the Rio All-Suite Hotel will receive a special group rate of $165/night.
For room reservations call (888) 746-6955. Mention the discount code ACFEI.

1 2 3 4
4 Easy Ways ONLINE FAX PHONE MAIL
www.acfei.com (417) 881-4702 (800) 592-1399 2750 E. Sunshine
to Register: Springfield, MO 65804

ATTENDEE INFORMATION (please print)


Name Member ID #

Address

City State Zip

Phone ( ) Fax ( ) Email


CANCELLATION POLICY: All requests for cancellation of conference registration must be made to Association Headquarters in writing by fax, mail, or email.
Phone cancellations will not be accepted. All cancelled/refunded registrations will be assessed a $50 administrative fee. All refunds will be issued in the form
of credit vouchers and are pro-rated as follows: cancellations received 4 or more weeks prior to the conference=100% refund (less $50 administrative fee);
cancellations received less than 4 weeks but more than 1 week prior to the conference=50% refund (less $50 administrative fee); cancellations received 1
week or less prior to the conference=no refund. For more information on administrative policies, such as grievances, call (800) 423-9737. The performance of
this conference is subject to the acts of God, war, government regulation, disaster, strikes, civil disorder, curtailment of transportation facilities, or any other
emergency making it impossible to hold the conference. In the event of such occurrences, credit vouchers will be issued in lieu of cash. Conference schedule
is subject to change. Please be prepared to show photo identification upon arrival at the conference.

Special Services: ❑ Please check here if you require special accommodations to participate in accordance with the Americans with Disabilities Act. Attach a
written description of your needs.

CHS CERTIFICATION CONFERENCE REGISTRATION (CHS Level V)


Wednesday, October 14, 8:00am-5:00pm
❑ CHS-V: CBRNE (Chemical, Biological, Radiological, Nuclear, Explosives) Preparedness
You must successfully complete the CHS-IV course to earn CHS-V status (CHS-IV is available online). $495

ACFEI, CHS, APA, AAIM, & ACC National Conference Registration


Wednesday, October 14 - Friday, October 16 *Registration rates include one ticket to the Awards Banquet*
Please check the primary association with which you wish to be affiliated with (check only one). Registration with ACFEI, CHS, APA, AAIM, or ACC grants you full
access to the sessions of ALL five associations. However, due to the nature of the material covered some CHS sessions may be limited to CHS membership only.
You will only receive the complimentary conference merchandise for the association with which you register.
❑ The American College of Forensic Examiners (ACFEI)
❑ The American Board for Certification in Homeland Security (ABCHS)
❑ The American Psychotherapy Association (APA)
❑ The American Association of Integrative Medicine (AAIM)
❑ The American College of Counselors (ACC)
Member Loyalty Early-Early Bird Advanced
Early Bird Regular Late/Onsite
*Please circle the approriate registration rate.* (before 12/31) Early Bird
(before 2/28) (before 6/30) (before 8/31) (after 8/31)
(before 4/30)

Member $349 $399 $449 $499 $549 $599


Life Member (save 10%) $310 $359 $400 $449 $494 $539
CHS Certfication Conference Attendee $299 $349 $399 $449 $499 $549
Non-Member $514 $564 $614 $660 $714 $764

PAYMENT PROCESSING Total Amount Due: $


❑ Check enclosed (payable to ACFEI, APA, AAIM, or ACC) Card Number Exp
❑ Purchase Order *ACC Members: Check Payment Only*
❑ MasterCard/Visa Name (as it appears on card)
❑ American Express Signature
New Members and Fellows

Welcome New ACFEI Members!


Christopher O. Akhidenor Donna L. Matthews Elizabeth L. Salley Mary E. Clemons
Terri Augspurger Tina M. McKain Eli M. Abeles Gerald L. Clough
Tonja Barnebee Tiffany Joy Michelli Maurizio C. Adornetto Michael James Conwell
Eric S. Bieber Denise Miller Jonathan K. Appel Cathy Crayton
Lisa A. Billiter Kim Joseph Onisko Timothy W. Armistead Hrayr Brian Der Vartanian
Eric M. Bonds Paul C. Piazza Karyn Marie Jester Ayers Darlene Dickerson
Debra Davis-Johnson Joshua S. Rader Lisa J. Bard James R. Dolan
Stephen G. Diamantoni Joseph E. Richard Dennis P. Bardelli Patricia Ann Dufour
Michael A. Falcone Carroll M. Rottmund Robert Richard Bell Richard M. Dupee
Pennie Farrell Kristen L. Rutt Alice R. Berkowitz Ghislaine I. Duvra
James O. Fourr Hugh E. Sandow Michael B. Berry Stephen W. Emerick
Patrick D. Glen David J. Schmidt Richard H. Besson John Felicetti
Richard A. Graff Jr. John Wanczyk Jeffrey Bone Crysta Fischer
Robert F. Granzow III David A. Wiesenberg Vickey S. Boonstra Anthony C. Flanagan
Jane E. Howett John S. Bain Shelley A. Botello Carol D. Frank
Steven R. Hudson Imad M. Adileh Sharon Bourg S Garvey
Mark A. Hutton Jamil Ali Darras JoLayne Bourque Catherine Marie Gates
Rachel Jacquet Leonard Dlamini Bianca E. Braden Gina Goss
Shahram Jahanian Jose A. Escuela Larry C. Bradford Sharon Grisham-Stewart
Donald Jones Jaime B. Gatawa Michael K. Brady John Hess
Tova Kirschner Richard Smith-Aidoo Robert B. Breskin Earl D. Hicks Jr.
James V. Lingg Delporte Steve Donald E. Brooks Edward L. Hoffner
Kelli S. Lingg Murali Talasila Dennis P. Bunda Leslie Hollile
Sharon Malik Tina Bulman Robert L. Calaway Alissa K M Hollinger
Guillermo Marin Robert A. Cerasoli Barbara A. Cassano Stephen Hummel
Guillermo Martinez Troy L. Dickerson Donnell R. Christian Jr. Earl J. Kasdon

Attention Forensic Educators


The Commission on Forensic Education
The Commission on Forensic Education, developed by The American College of Forensic
Examiners, emphasizes the importance of forensic science programs in education and is
committed to their expansion. The Commission offers guidance on instruction, provides
help to those who teach or study forensic science, and reviews professional certification
programs. The Commission is an effective and essential network that helps educators and
students stay informed of the latest innovations, breakthroughs, and important research in
the field. Commissioner membership is open to college and university administrators and
full-time, part-time, and adjunct professors; Associate Commissioner membership is open
to high school science teachers. The Commission helps educators advance the field and
inspire future forensic professionals through providing supportive services:
• Helping educators network with fellow teaching professionals and top experts in the
field.
• Teaching potential students about the importance and the benefits of studying foren-
sic science.
To join the commission, apply • Giving members a highly visible forum to publish and distribute their research.
online at www.forensiccommission.com • Helping members stay current in a constantly evolving field by providing quality
or call Anna at (800) 592-1399 continuing education.
• Providing certification programs that recognize achievement.

36 THE FORENSIC EXAMINER Winter 2008 www.acfei.com


Jason Khoury Duane A. Overturf Keith X. Terrell Michelle Erin Snyder
Sharon J. Koch Patricia Paterson Leon Cass Terry Lorna Jean Ste Marie
Ben Kohen-Kadosh Jairo Pelaez Marvette J. Thomas Richard Stewart
Alex Kwechansky Hans Petersen Anthony Paul Vappie Karl V. Umbrasas
Joseph A. Langevin Lee Anthony Picariello William T. Veith Laura Kay Wood
Daniel LaPadula Jose E. Pico Moises Velazquez Jr.
Nika E. Larsen Gaylon K. Powers Dean J. Vlahos New Diplomates
Trisha Latimer Mark J. Pry Ryan Wessels Alireza Bagherian
William S. Leach Chris E. Quigley Heather Westphal Stuart S. Hart
Paul S. Leonard Richard A. Reed Samuel M. White Syed Shoaib H Shah
Morgan Liddell Diane J. Reich Alicia A. Williams
Stacey M. Loggins Mary Alice Ricci Tammy Lynn Wooten New Fellows
John J. Lukaszewski Jr. Barbara Rosenberg Ronald F. Worst James D. Blair
Carlos J. Maggi Cheri D. Rosser Ruth Wyatt Dale W. Cillian
John F. Magino Donna Rudak Mujahid Tariq Ali James B. Clarke
Jessica D. Majors Yvonne Mendez Schroeder Liane Best Randolph Joseph Malsky
Mark A. Manzi Carra S. Sergeant Tessie Lea Bowmaker John M. Simonis
Donovan P. Martin Alex Serrano Christina Clarkson
Kevin Maloney McIntyre Lisa Angela Serri John A. Coppolo Jr.
Rudy Medrano J Shearer Danielle M. Fullen New Life Members
Sandy Miller Celeste Siebel Dana Galloway Marcus O. Durham
Michael S. Morton Preston K. Singleton Carol J. Gilmore Yvette M. Killian
Jacqueline A. Olsen Jane C. Smith Deborah Millington Holmes Christopher W. Reid
Thomas Olzak Daniel Stalcup Katherine Kakiuchi Elizabeth L. Salley
Ruth E. Ortolf Harry E. Styron Tatiana Martinez
Debra A. Ough Robert Taraszewski Jennifer Lynn Miller

ADVERTISE IN THE FORENSIC EXAMINER®


1 Time 2 Times* 4 Times*
Full Page $2,130 $2,025 $1,920
2/3 Page $1,490 $1,415 $1,345
1/2 Page $1,280 $1,215 $1,150
1/3 Page $1,065 $1,010 $960
1/4 Page $850 $810 $510
* Price of advertisement per insertion

Preferred Positioning Rates


Inside/Back Cover: + 25%

ACFEI members receive discounted rates!


$7.50 U.S./$9.50 CAN

Leann Long
Contact John Lechliter at (800) 592-1399 for
Editor in Chief
more information.

(800)Association
592-1399 Headquarters: Office: (417) 881-3818 Winter 2008 THE FORENSIC EXAMINER 37
2750 East Sunshine Direct: (417) 823-2517
Springfield, MO 65804
Books by ACFEI Members

True Stories of CSI: The Real Disaster Archaeology


Crimes Behind the Best Episodes
of the Popular TV Show By Richard A. Gould

By Katherine Ramsland, PhD “Closure … is a universal human experience in


which emotions surrounding uncertainties about
True Stories of CSI answers the question every the fate of a relative or friend lost in a disaster are
fan of the TV show asks from time to time: “Could resolved to some degree by identification of the
that really happen?” Katherine Ramsland takes us victim through physical evidence.”
case-by-case through episodes that not only could Richard A. Gould, author of Disaster Archaeology,
happen, but did, detailing the real-life crimes that has produced a work that not only acts as a primer
s True Stories of CSI: The Real Crimes inspired some of the more shocking episodes of the on disaster archaeology and its many applications,
Behind the Best Episodes of the Popular show. but that also communicates his passion for the
TV Show, by Katherine Ramsland
Each chapter opens with a brief description of truth—a passion with which all forensic profes-
an episode of CSI, then goes on to reveal the sto- sionals are familiar.
ry of an actual crime that is disturbingly similar. Gould opens with a chapter defining disaster
Ramsland’s work is notable not only for making archaeology and goes on to discuss the prominent
the connection of fact to fiction that satisfies the role of this demanding but important work dur-
curiosity of so many viewers, but also for her own ing an era in which massive natural disasters and
natural storytelling ability. horrifying terrorist attacks have befallen our na-
Ramsland often lays the crime out chronologi- tion. Disaster archeology is particularly difficult
cally, allowing her readers to experience the same because the task requires identifying remains while
twisting journey that police and forensic investiga- the physical and emotional effects of the disaster
tors took. Often, the revelation of new evidence are still being felt. There are not thousands of years
points an investigation in a different direction or buffering scientist from subject—the deceased are
sows doubt in what seemed to be an open-and-shut members of the same society as the investigators.
s Disaster Archaeology, by Richard case. Additional chapters discuss cases in a variety of
A. Gould Ramsland brings us face to face with the cruel locations—including the United States, Russia,
and calculating criminals that perpetrated such hei- even underwater—under a variety of circumstanc-
nous crimes. These are not the creations of a team es: the aftermath of the 9/11 attacks, an investiga-
of writers, but actual people—liars, narcissists, psy- tion in human rights violations from decades ago,
chopaths—dangerous criminals who once walked a fire in a nightclub, and even prehistoric cannibal-
freely in our society. ism. Gould samples the vast range of applications
Ramsland also brings to light the actual practice for forensic archaeology. Beyond simply educating
of forensic science. She examines the methods that his readers, Gould inspires with his dedication of
brought these criminals to justice—technology bringing closure to those who have already been
that has been evolving at a break-neck pace these through too much.
past decades, criminal justice procedure that deter- Richard A. Gould is a professor of anthropology
mines the pace of the investigation, and even the at Brown University and led full recoveries at the
coincidences that led police to the evidence that Station nightclub fire scene in Rhode Island. He
would name a killer and put him behind bars for is the author of Recovering the Past and Archaeology
s The Exam Cram 2: CISSP, by
Michael Gregg life. These cases do not wrap up in a neat package and the Social History of Ships. He is currently vice
in 60 minutes minus commercial breaks, but they president and treasurer of Forensic Archaeology
definitely open the reader up to the real world of Recovery (FAR), a volunteer team based in Rhode
crime scene investigation. Island.
Katherine Ramsland’s multiple degrees in- Gould has been a member of the ACFEI since
clude a master’s in forensic psychology. She 2007 and is currently serving on the Commission
is the author of more than two dozen books on Forensic Education.
and currently teaches forensic psychology as
an assistant professor at DeSales University in The Exam Cram 2: CISSP
Pennsylvania. Visit her Web site at www.kath-
erineramsland.com. By Michael Gregg
Ramsland has been a member of the ACFEI
since 1999, is a Certified Medical Investigator, The Exam Cram 2: CISSP is a fast-paced presen-
and was a presenter at the 2007 ACFEI tation of facts—excellent in assisting any informa-
s Witness Preparation for
Deposition and Witness Preparation
Conference. tion systems security professional with the review
for Trial, by Jan Mills Spaeth

38 THE FORENSIC EXAMINER Winter 2008 www.acfei.com


he or she needs to perform well on the Certified influence whether a case goes to trial or is settled
Information Systems Security Profession, CISSP, out of court.
exam. Witness Preparation for Trial has a similar open-
Chapter topics run the gambit from physical ing that explores not only what will be expected
security to cryptography, telecommunications to of a witness, but also what the witness will see and
business continuity planning. In addition to the how the witness can expect the lawyers, judge, and
important facts that comprise the chapters, each jury to act.
chapter also contains various teaching tools includ- Both DVDs cover Spaeth’s method of answering
ing “hot lists” of crucial terms and concepts; alerts questions that, if followed, will allow the witness
regarding the actual exam; tips, notes, and sidebars to avoid giving incorrect or misleading answers. s Katherine Ramsland
for additional information; and a “Need to Know Spaeth then discusses the 10 critical qualities all
More?” section that references additional sources credible witnesses must present, including com-
of information. petence, conciseness, and clarity.
Exam Cram 2 will prepare you not only with the Throughout the discussion, the DVDs include
information you’ll need to answer the questions cor- dramatized examples of witnesses, lawyers, judges,
rectly on the test, but also information regarding and jurors. Spaeth has produced a program that
the exam itself with tips that will help test-takers not only tells, but shows witnesses how to conduct
reach their full potential on this exam, as well as themselves. This method of presentation makes
practice questions in each chapter and two full prac- the learning process more effective. Spaeth also
tice exams at the end of the book. There is even a gives viewers inside information—an expert’s per- s Richard A. Gould
tear-out cram sheet that lists the most important spective of the courtroom—so that witnesses can
facts for last-minute preparation and a CD with understand how their behavior will be perceived
the preview edition of exam-simulation software. by attorneys, judges, and juries. Throughout the
Exam Cram 2: CISSP is the perfect marriage of DVDs, Spaeth points out critical missteps that wit-
a thorough presentation of information and tried nesses must not make in order to avoid being ad-
and true education practices. Anyone preparing monished by the judge, or, in severe cases, to avoid
for the CISSP exam and anyone looking to ex- causing a mistrial.
pand their knowledge in the Information Security These DVDs are essential for everyone who is
Systems field would do well to pick up this book. called upon as a witness—both those new to the
Michael Gregg has more than 20 years of expe- process and those with experience who want to s Michael Gregg
rience in the IT field. He holds multiple degrees establish themselves as credible and valuable wit-
and many certifications, including CISSP. He has nesses.
consulted and taught for many Fortune 500 com- Jan Mills Spaeth, PhD, has been a member
panies. He is a member of the ACFEI as well as the of ACFEI since 1996. She has written extensive-
Texas Association for Educational Technology, and ly on legal issues, particularly jury selection, trial
he has been a member of the ACFEI since 2004. simulations, witness preparation, and case strategy.
Spaeth has been an educator for the University of
Witness Preparation for Deposition Arizona and numerous colleges, and she has been
and Witness Preparation for Trial a frequent guest on many television and radio
talk shows and news broadcasts. Her Web site is s Jan Mills Spaeth
By Jan Mills Spaeth, PhD www.azjuryresearch.com n

Perhaps more than in any other field, forensic


professionals are called upon to contribute to court-
room proceedings. For those new to the process of Have a book you
serving as a witness and for those interested in im-
proving the quality of their testimonies, Jan Mills would like reviewed?
Spaeth, along with the American Bar Association,
has produced a two-DVD series to address prepa-
ration for both depositions and trials. Mail it to:
Witness Preparation For Deposition begins with
Editor; The Forensic Examiner;
a brief discussion of what can be expected at a de-
position, as well as the purpose of the deposition. 2750 E. Sunshine St.;
Spaeth communicates valuable information to the Springfield, MO 65804
viewer by expanding on the degree to which a de-
position can influence the following trial, or even Be sure to include a press release.

(800) 592-1399 Winter 2008 THE FORENSIC EXAMINER 39


Re e d Hayes
nett a and
on Ian
By Kim

40 THE FORENSIC EXAMINER Winter 2008 www.acfei.com


Handwritten material often shows red flags
for negative behavior that might not be detected
through more traditional investigative techniques.
This cutting-edge risk assessment tool provides a
discreet and unobtrusive way of validating hunches s Signature from early in Jackson’s ca-
reer: self-protection shown in the encir-

and gleaning useful information about suspected cled name; final n creates a barrier be-
tween self and the world.

deceivers, assisting in the implementation of


alternative possibilities in investigations.

Handwriting analysis is a comparatively quick analyses are admittedly brief and are not intended
method of peering into a subject’s mind and is es- to be exhaustive studies. However, additional pro-
s Although still self-protective (partially
pecially useful in detecting devious and potentially files that are interactive and more in-depth are avail- encircled name) Jackson has declared him-
dangerous or risky behavior. The following samples able at http://www.trialrun.com/id4u/profiles.html. self a star by the final burst of fireworks.
illustrate this method of predicting and tracking be- Handwriting, being closely tied to one’s brain
havior, revealing how the writer/suspect was feel- and emotional responses, illustrates a person’s state
ing at the time of the writing, as well as showing of mind at the moment pen is placed to paper.
long-term behavioral patterns. As moods and circumstances change, so the writ-
This dynamic method was developed and test- ing will change, often subtly, but sometimes more
ed over a period of 10 years by the authors of dramatically. This calls for the evaluation of more
this article, graphologist Kimon Iannetta and Dr. than one sample of writing for added accuracy
James Craine, head of Neuropsychology Services and insight, whenever possible. This also permits
Department at Hawaii State the analyst to consider the writing
Hospital in Kaneohe, Hawaii. over a period of time, which can
The basics regarding risk evalua- add further clues to the investiga-
tion through handwriting are pre- tion process or contribute to bet-
sented here. However, readers are ter understanding of crimes after
encouraged to consider Iannetta’s the fact.
Danger Between the Lines, a re-
source manual pertaining specifi- Michael Jackson
cally to the evaluation of risk and The handwriting of Michael
violence potential that resulted Jackson is clearly reflective of ex-
from the Hawaii study. To help treme changes over many years.
flesh out a useful profile of any Among the obvious benefits of
subject, it is also recommended s Peculiar mood shift. graphological assessment is that s Eccentric, exaggerated signature at the
that readers use the full set of 124 Forensic Profiling the subject need not be present when the exami- time of marriage to Lisa Marie Presley.
Cards (some of which are illustrated here), which nation takes place and, in fact, does not even have Taken from the marriage license, the unat-
tractive signature looks like a jellyfish, re-
include all of the danger signs as well as the facili- to participate in any testing procedure. There is, vealing his need to hide or conceal, and
tators and inhibitors to dangerousness identified therefore, little chance that the material to be ex- covers much of the page, showing egotism
and feelings of grandiosity.
by the study. Also recommended is Hayes’ Between amined will be consciously or deliberately altered
the Lines, which covers a full range of graphological in hopes of creating a certain result. Drawbacks
material outside the criminal context. include limited samples of writing—perhaps writ-
Profiles of subjects presented herein are designed ten under adverse conditions—or the evaluation of
to illustrate specific handwriting indicators and how written material produced after a crime has already
they can manifest in individuals’ behavior. The been committed. The competence of the analyst

s Publicly upbeat (rising baseline), pri-


vately turbulent (note tightly retraced
stroke where marked)

(800) 592-1399 Winter 2008 THE FORENSIC EXAMINER 41


downhill lines can be a temporary sign that may
show up as a result of fatigue or illness and then dis-
appear as the individual becomes rested. (More than
one writing sample is obviously required.) Also, this
is not necessarily an indicator of suicidal ideation.
It is nevertheless clearly evident in the writing of
Charles Bishop, the teenager who believed Osama
Bin Laden to be justified in the attacks of Sept. 11,
2001, and who subsequently flew a small plane into
a Florida building.
In some instances it is relatively easy to detect
mental instability from writing, as in the case of
Robert F. Kennedy’s assassin, Sirhan Sirhan. His
unstable, disorganized character is clear in the er-
ratic letter forms and spacing, variable slant and
pressure, tangled lines, cross-outs, and rambling
language. The writing is devoid of controls.
On the opposite end of the spectrum lies the
writing (opposing page) of a long-time underworld
hit man, which at first glance seems “normal” or
“nice.” In this case, the rigidly perfect writing shows
a façade of strength, masculinity, and over-con-
trol. There is no flexibility, no give, to the writer’s
thoughts and emotions. Along with these indica-
tions are the multiple angles that may not at first
be evident, revealing intense anger, especially con-
sidering the heavy pressure of the writing which
represents intensity of feeling. His “job” as a hit
man is a perfect vent for the inner rage and hostil-
ity that dominate his life.
Every exaggeration in handwriting is symbolically
representative of the extreme views and outlook of
s Jackson’s signature during his 2004 the subject: whether the writing is too slack or over-
trial for child molestation fills the entire may also be a contributing factor as to the accu- ly rigid; has exaggerated spacing, size or pressure;
page, revealing his bigger than life self
image; twisted upper zone formation racy of the evaluation. or contains repeatedly odd forms. Unusual and
shows distorted thinking and morals; ex- No analysis should be based on one or two fac- unique symbols all reflect the dance of the mind
cessively high M and n arches denote
delusions of grandeur and compensation
tors or an individual finding in the writing. Rather, as the writer leaves behind footprints that are eas-
for feelings of self-doubt; poorly formed, the writing must be carefully weighed and evaluat- ily tracked and deciphered. If the symbols are aes-
variable midzone letters (“ichael,” “ack- ed by taking all signs into consideration. People— thetic, well-formed, and supported by other posi-
son”) suggest inability to deal clearly with
everyday issues. including criminals—are complex. Red flags should tives, they may indicate talent or special skills, but
be considered for both frequency and intensity, if visually unpleasant and combined with negative
and positive factors should be weighed against factors, can reveal obsessions or odd thinking.
negative. Frequently criminals use a personal pronoun
It is to be noted that there is no specific “crimi- I (PPI) that deviates strongly from the copybook
nal type” as identified by handwriting, as crimes model. This letter, symbolic of one’s self-image, is
and other negative behavior come about for a often distorted or unusual in some way, pointing
variety of reasons. There are nevertheless many toward an odd or disrupted view of self which,
writing clues that, when considered as a whole, when accompanied by other negative signs, can
are highly valuable in determining perpetrators’ facilitate criminal behavior. (See Forensic Profiling
characters and the motivating factors behind their Cards D-1, Page 44.)
misdeeds.
Charles Ng, serial killer
Red flags Serial killer Charles Ng wrote twisted, awkward
A red flag with respect to one’s emotional state is personal pronoun I’s. Ng, along with Leonard
when the writing lines sink downward. This is sug- Lake, is suspected of murdering up to 25 people
gestive of a depressed mood likely accompanied by at Lake’s ranch in Calaveras County, California in
negative thoughts, which dampens the person’s en- the early 1980s. Ng’s creativity was instrumental
ergy and enthusiasm and may contribute to nega- in building a complete torture chamber where the
tive or desperate behavior. Note, however, that two filmed themselves raping and abusing their

42 THE FORENSIC EXAMINER Winter 2008 www.acfei.com


victims, most of them women. Ng was convict-
ed of 11 of the murders—those of six men, three
women, and two baby boys—and is presently on
death row awaiting execution. Ng’s personal pro-
noun I is contorted, showing a distorted self-image.
The downstroke of the letter is bent, suggesting
a twisted “backbone” and a perverted approach
that contributed to his ability and willingness to
bond with Lake. The i dots are repeatedly made
like slashes, indicative of deeply rooted hostility,
s Charles Bishop, teenager who flew a plane into a Florida building.
expressed in this extreme case as rage and cruelty.
Down-slanted crossbars (see t in “best”) reveal a
need to dominate and control. At the same time,
Ng had little control over his own urges and emo-
tions as the variable slant and pressure patterns of
his writing attest. Lower loops that pull strongly
to the left are suggestive of regressive, underdevel-
oped, or odd sexual attitudes.

Broken letters
The writing of criminals sometimes contains bro- s Sirhan Sirhan, who assassinated Robert F. Kennedy in 1968.

ken or segmented letters, suggesting weak bound-


aries between conscious thought and unconscious
drives. This implies that the “current is broken.” It
is often seen in the writing of those who are dishon-
est or able to compartmentalize their lives; in some
instances the person leads a double life. (Note: Care
must be taken to determine that the breaks are not
the result of a faulty pen. Also, this sign is at times a
reflection of physical health issues, particularly if the
writing in general is tremulous or uncertain. Breaks s Underworld hit man—“persona writing” designed to hide and impress
between individual letters do not count here.)

s The writing of former Enron CEO Ken Lay displays seg-


mented letters.
s The writing of murderer Charles Ng displays a distorted pronoun “I”.

Segmented letters are clearly evident in the writing


of Ken Lay, best known for his role in the corruption various angles of situations. Rather closely dotted i’s
scandal that led to the downfall of Enron Corporation. indicate attentiveness to detail. However, segmented
CEO and chairman of Enron from 1986 until his letters (especially lower case a’s) denote poor integra-
resignation on January 23, 2002, Lay became syn- tion and a propensity for devious, dishonest behavior
onymous with corporate abuse and accounting fraud so that the right hand did not know what the left
when the scandal broke in 2001. He was found guilty was doing. Variable emotions and responses are im-
of securities fraud and related charges and could have plied by fluctuation in slant and letter size. Tangled
faced 20 to 30 years in prison, but he died of heart lines imply confused thinking and poor judgment
failure before his scheduled sentencing. despite Lay’s ability to strategize. (Note that Charles
Lay’s rather firm personal pronoun I denotes confi- Ng’s writing also contains segmented letters.)
dence and independent thinking, supported by print-
script suggestive of self-control. The repeated angular Beth Friedman
formations of the t’s that look like flags or sails and Writing formations often referred to as “felon’s
reach into the upper zone of the intellectual arena claws” are frequently seen in the writing of unsa-
point toward strategic thinking and an ability to see vory, dishonest characters. s A mugshot of Sirhan Sirhan

(800) 592-1399
423-9737 Fall 2008 THE FORENSIC EXAMINER 43
Winter
tenced but released from prison after serving only
19 months. In 1983 he beat, raped and strangled a
young woman in a savage attack, and struck again
15 months later, leaving another victim strangled.
The seemingly innocuous words of Kipp’s writing
sample might appeal to some young lady seeking
the perfect, well established partner, but the slow-
ly written, artificial handwriting screams danger.
Although the writing is clearly designed to impress,
the bizarre lower loops show contorted, angry views
and attitudes related to sexual fantasy. The personal
pronoun I is angular and hooked, revealing intense
anger closely connected to his self-image. Clubbed
writing strokes that plunge heavily downward show
brutality and relentless urges, especially when com-
bined with heavy pressure, an indication of deep-
seated emotions and lasting thoughts and feelings.
s Psychological Implications: The personal
pronoun ‘I’ is directly connected to the in-
These claws are evident in the handwriting of Odd, disconnected formations (for example, the f ’s)
dividual’s self-image. Distortions of this let- Beth Friedman, a 54-year-old Florida school reveal forbidden thoughts and desires, all carefully
ter suggest in one’s self-concept. The writer teacher convicted of having improper sexu- hidden by near perfect midzone letter forms and
has an odd, unique, or distorted self-image
(according to the individual shape, size, al relations with one of her male students over an exactly straight baseline which together consti-
etc. of the letter) and may exhibit compul- an extended period of time. Underhanded be- tute a façade constructed to make an impression.
sive behavior patterns. This may indicate
talents and unique abilities (when accom- havior is suggested in the claw-like lower loops Kipp has few social boundaries and, given his lack
panied by positive indicators) or patho- that are repeated in the personal pronoun of social skills, his victims were generally taken by
logical obsessions (when accompanied by
negative indications). Philosophies and/
I. As noted above, distortion of this letter indicates surprise in places such as dark parking lots. His
or behavior may be altered to serve the a poorly developed sense of self, particularly when murders were especially brutal.
writer’s own emotional needs. combined with the childish nature of her writing
indicative of a mentality that is not much more Eric Rudolph, Olympic Park Bomber
advanced than that of her students. Wide distanc- Eric Rudolph, who committed a series of bomb-
es between words portray emotional isolation and ings across the southern United States in the 1990s
difficulty forming intimate relations. that killed three and injured at least 150 others, also
writes distorted lower zone structures. Rudolph was
connected with the Christian Identity movement: a
militant, racist, and anti-Semitic organization. He
declared that his bombings were part of a guerril-
la campaign against abortion, which he described
as “the homosexual agenda.” The distorted lower
loops of Rudolph’s writing pull strongly to the left,
representative of the past and, more specifically,
s A mugshot of Charles Ng mother. The script is highly connected, which
denotes one whose thoughts are compulsive and
Martin James Kipp, rapist & killer unbroken—once started on an idea or plan, there
Distorted lower zone formations are seen in the was no turning back. Rigidly braced initial strokes
writing of rapist and serial killer Martin James reveal deep-seated resentment—unresolved anger
Kipp, above. Kipp was the son of a prostitute who from the distant past—while ground-in dots (af-
abandoned him at the age of 22 months. He was ter “planet” and “mother”) denote explosive anger.
adopted by relatives and raised by an alcoholic “fa- Down-slanted cross bars such as those in “task,”
ther” who often beat him in public. Kipp joined “most,” and “significant” show a need to domi-
the Marine Corps, where he won divisional hon- nate and control while retraced upper loops sug-
ors in boxing. In 1981 he was accused of abducting gest restrictive, narrow morals. The smallness of
and raping a woman and, rather than face charges, the writing lends focus and concentration, as do
s A mugshot of Eric Rudolph went AWOL. He was eventually captured and sen- the relatively well placed i dots. Disappointment or

44 THE FORENSIC EXAMINER Winter 2008 www.acfei.com


depression is shown in words that sink downward
(see “mother” and “whether”).

Aileen Wuornos, serial killer


Club formations, also very negative, are evident
in the handwriting of Aileen Wuornos, a Florida
prostitute who shot her “Johns” at point-blank
range. She was filled with rage and aggression as
indicated by her exceptionally sharp, spiked writing
style full of club-like strokes (see markings) and all
held under wraps by repression (tightly squeezed
letters) until the point of explosion. Strong focus is
shown in the concentrated, rather careful writing.
Precisely placed t crosses add to detail-mindedness
and also show strong willpower at times amount-
ing to brutality, hence the clubbed forms. Letters
that jut below the baseline point to negative un-
conscious motivations and aggressive behavior,
intensified by letters growing successively larger.
The personal pronoun I’s are rigid, retraced, and
s Psychological Implications: Segmented
unpleasant, and the upper loop formations are con- napped by a black man. The writing is exception- (broken) letters suggest weak boundaries
stricted, showing limited or undeveloped ethics. ally mundane (shown by a predominant midzone), between conscious thought processes and
immature (childlike writing style), and repressed unconscious drives and urges. The writer
lacks integration and is incongruent in
(squeezed, retraced letters), which together reflects emotional or ideational processes. Broken
lack of discrimination and self-understanding. Its letters indicate the writer’s deficiency in
handling situations with moral distinction
carefulness is indicative of a façade of normalcy or judgement. The writer may have little
and a desire to create a certain impression. Poorly regard for laws or rules, and can be a law
unto self. Broken letters in the personal pro-
Christine Falling, trusted nanny defined morals are reflected in the stunted upper noun ‘I’ and/or signature are especially
Christine Falling, whose writing contains twisted loops, and exceptional self-underestimation in the significant, and are indicative of a serious
upper loops, killed a number of children (she of- very low t crosses. As desperation took hold, Smith disturbance in self-concept.

ten said she “loved them to death”) and an elderly probably felt there was no other way out than to
person who had been placed in her care. Her kill- eliminate her children from her troubled life.
ing method of choice was, as she called it, “smo-
theration” in response to voices chanting, “Kill the
baby” after which she simply reported that the child
had “stopped breathing.” Distorted ethics (twisted
upper zone forms) and odd ideas (bizarre letters
such as g in “everything” and “anything”) are seen
along with poor self-worth (disrupted personal
pronoun I, low t crosses, and primarily midzone
script). Ground-in dots denote anger and obsessive
thinking. Essentially midzone writing with unde- O.J. Simpson
s A mugshot of Aileen Wuornos
veloped upper loops implies a limited outlook and Orenthal J. Simpson, known as “O.J.” or “The Juice”
no sense of ultimate consequences. is one of the most famous running backs in American
football history, and was winner of the Heisman
trophy. In 1995, Simpson was acquitted in crimi-
nal court of the double murder of his wife, Nicole
Brown Simpson, and Ronald Goldman. In 1997, he
was found liable for their deaths in civil court, but
to date has not paid the judgment. In 2007, he was
arrested and charged with making an armed attack
Susan Smith, who drowned her two sons for an incident involving his efforts to recover sports
Susan Smith seat-belted her two young sons memorabilia he regarded as “stolen.” A jury convicted
into her car and pushed it into a lake where they Simpson on all charges and he was awaiting sentenc-
drowned, after which she claimed they were kid- ing at the time of this article’s publication. s A mugshot of Christine Falling

(800) 592-1399 Winter 2008 THE FORENSIC EXAMINER 45


dot after “now” (and others not shown here), and
strong willpower is portrayed in firm cross bars.
Emotional turmoil is evident in the variable slant,
letter size, and pressure patterns, augmented by the
stressful cross-outs and corrections.
As earlier suggested, handwriting produced over
a period of time can be instrumental in producing
longitudinal studies of subjects. In the case of O.J.
Simpson we have access to signatures that (with
one exception) were written within a three-day
time span during a traumatic phase of his life and
reveal extremes of feeling during that time. The
signatures work much like a lie detector or body
language, only the dynamic thinking and personal
symbols are preserved for continued study. In other
cases (see Timothy McVeigh and Ted Kaczynski,
below), writing samples show changes over a lon-
ger time span.

Signature 1: Written years before the murders,


the signature proceeds rapidly forward, show-
ing smooth mental and physical movement. The
swings in the lower zone are easy and fluid, much
The writing sample below is from the so-called like O.J.’s quick moves on the football field for
s Psychological Implications: Felon’s claws
(backward claw formations) suggest sneaky, suicide note written by Simpson after the murders which he was famous.
underhanded, devious, and irresponsible and before the infamous car chase on the freeways
behavior. The claws imply that the writer’s
“emotional cup” is never full and that the per-
of Los Angeles. The first statement of the sample
son feels starved for love. The person may appears to be a lie, as it is incomplete and improp-
seek emotional fulfillment in deviant ways. er. In fact, Simpson was unable to write that he
This sign is suggestive of unresolved sexual
desires, sexual guilt, tension and/or anxiety. did not murder Nicole. Additionally, there is ex-
It connotes possible sexual aberration and/ ceptional anxiety in the cross-outs after the word
or harsh, physically brutal sexual fantasies
or practices, especially when combined with “understand.” Extra wide spacing between “I” and
other strong negatives. It is frequently found “loved” denote pauses in thought, suggestive that
in the handwriting of criminals.
perhaps he did not love Nicole after all. Segmented Signature 2: Written earlier on the night of
letters (see d in “loved”) show compartmentalized the murders during the dance recital for O.J.’s
thinking and point to dishonesty. Out-of-place and Nicole’s daughter Sidney. The signature pulls
capitals (pop-up letters) reveal strong independence sharply leftward, hiding what lurked just beneath
and self-assertion, intensified by words that grow the surface—a symbolic knife blade written with
larger (“understand,” “always,” “and”). Strange let- heavy pressure showing intense feeling regarding
ter forms indicate odd thinking (b in “problem,” p that symbol. The knife formation appears to stab
in “despite”) verified by unclear letter formations the downstroke of the assertive p stem, then force-
(“weren’t” and “least”) and nonsensical statements fully changes direction and moves forward with
(“for now we weren’t right for each other at least speed, organization, and stealth right along and
s O.J. Simpson
for now”). Explosive anger is revealed in the heavy under the same path as the “son” portion of the
signature, which lies in the conscious midzone.
These strokes rise upward and forward, becoming
increasingly large and with added final thrust. The
image portrays planning, thoughtfulness, organiza-
tion, force and concealment.

46 THE FORENSIC EXAMINER Winter 2008 www.acfei.com


Signature 3: Penned that evening after the mur-
ders upon O.J.’s arrival at LAX Airport. Still pull-
ing to the left, the implication is one of hiding and
subterfuge. At the same time the signature races
forward, with the knife blade formation in the s
in “son” still dark in his mind, the vision still im-
pressed in his head ... and racing to flee to safety.

Signature 4. Signed just before the infamous


car chase. The “tic” (leftmost arrow) shows rage,
while confusion and turmoil are evident in tangled
formations and the midzone letters (representing
the person’s reality) are squashed to nothing and
turned upside down toward the end. This reflects
an effort to hide while still running in circles, to
s Psychological Implications: Lower zone
find a way out of his waking nightmare. ed incessantly. During the Gulf War he killed two distortions point to unusual or disturbed
enemy soldiers and bragged about it. He finished physical or sexual desires. When strong-
ly distorted, there amy be unconvention-
his tour in the Gulf and then wanted to become a al practices or sexual fantasies. Sexual
Green Beret. However, frustrated over his failure to confusion and/or emotional blocks are
complete the required training, McVeigh became also implied.

bitter and eventually turned his rage on the team


he so wanted to be a part of.
He became a drifter, living in motels, frequenting
gun shows, and growing increasingly bitter about
the federal government and its control. He became
outraged and started planning his personal protest
Timothy McVeigh when the FBI raided the Branch Davidian com-
Three samples of Timothy McVeigh’s writing are pound in Waco, Texas on April 19, 1993—which
provided. The first was written sometime before happened exactly 2 years before the bombing in
McVeigh carried out the April 19, 1995, bomb- Oklahoma City—and he visited the site to dem-
ing of the Alfred P. Murrah Federal Building in onstrate his anger over the raid. He witnessed the
Oklahoma City, which killed 168 people, includ- tanks used by the government on the Davidian
ing 19 children. The second sample (a personal compound as the same tanks he had driven in the
note to his sister signed “Tim”) and the third were Gulf War, which further inflamed his anger. This
written while awaiting execution after being con- created the framework for the violence that would
victed of the bombing. later erupt in Oklahoma City.
McVeigh grew up in a small town in upstate New McVeigh chose to print. This reflects a desire to
s A mugshot of Susan Smith
York. His father, a blue collar worker who was em- communicate clearly without revealing emotion-
ployed making radiators, and his mother, a travel al content and also suggests an urge to be in con-
agent, were reportedly often absent during his for- trol of his immediate environment. Printing often
mative years. In school he was considered outgo- shows someone who is cautious about establishing
ing, bright and talkative. According to biographical and maintaining significant interpersonal relations
accounts, McVeigh loved guns at an early age and and, with other signs, points to improper bonding
often took them to school. He is said to have spent and attachment. This often contributes to suspicion
hours by himself shooting at targets and dreaming and doubt regarding others’ motives, particularly
of one day being in the special forces unit in the when wide spaces appear between words, indica-
military. tive of a need for “elbow room.”
After high school McVeigh joined the Army, Overall, McVeigh’s rather consistent writing de-
where he served as an artilleryman. Those who re- picts intelligence, systematic thinking, and an abil-
call his time in the military remember that he talk- ity to be shrewdly manipulative and controlling. s A mugshot of Timothy McVeigh

(800) 592-1399 Winter 2008 THE FORENSIC EXAMINER 47


T in the first signature. The y’s in the first sample
are especially troublesome as they are angled and
weapon-like, revealing aggressiveness and a hidden
agenda. (As shown in the later writing samples,
these angles disappeared after the bombing.) The
unusually formed y and g structures reveal improper
bonding and an overwhelming need for intimacy,
yet emotional withdrawal is shown in the unnatural
leftward pull, the wide distancing between words,
and the linear printing style.
The signature is particularly revealing in that it
is of an entirely different style than the text above
it, a sign of conflict between inner desires and feel-
ings and outward expressions. What you see is not
necessarily what you get. The initial letter pulls far
to the left, showing emotional withdrawal and pre-
occupation with the past.
Upon close examination, there are subtle char-
acteristics that reflect special personal concerns
and behaviors of this writer. Of particular note
are the habitual reversals in direction of the writ-
ing at certain critical junctures. These occur with
unique endings such as the “ut” and “nt” at the end
of words. Similar backward formations are seen
s Psychological Implications: Clubs indi- The writing is organized and focused. Well-placed in “exists” and “which.” Contrary to normal, this
cate extreme decisiveness and/or force- t crosses show precision, while relatively straight denotes defiant, I’ll-do-it-my-way thinking, indi-
fulness. Look for brutality or cruelty, es-
pecially when seen in conjunction with baselines denote self-control. Every i is dotted and cating that he is able to carry out his activities in a
poor quality writing. It may indicate a every t crossed, so he would not miss any impor- creative, unconventional manner.
“hit first, ask questions later” impulsive-
ness. When seen in the personal pronoun tant details in any undertaking. Aggressive impulses are seen in club-like struc-
‘I’ and/or signature, it suggests pervasive However, negative signs abound. Certain repeat- tures at the beginning of some downstrokes, espe-
characterological anger (conscious or un-
conscious) and may indicate a disturbed
ed structures in the writing reveal McVeigh’s obses- cially visible when the writing is enlarged (see t in
self-concept. sion with unmet dependency needs. In particular, “arrest” and “tell”), in the angular y’s as previously
the g’s curl into a fetal position, as does the capital noted, and letters that are written as X’s (in particu-
lar, the letter t). The expression of his violent urges
is facilitated by the backward formations and out-
of-place capitals that reveal resistance to authority.
Further, he is able to compartmentalize his thoughts
and desires because the writing contains segmented
letters (Y in “York,” for example). It appears that
McVeigh was ready for battle.
From McVeigh’s writing, we would recognize in
advance, without knowing him or his violent crime,
that he was an introverted person and an organized
planner. He conceived ideas based on his personal
belief system and carefully and accurately put things
together with precision and perfection. His think-
ing style was obsessive and driven by strong, power-
ful feelings and a desire to act on them. He needed
to communicate and did so clearly. McVeigh want-
ed to be important, yet felt rejected, and his final
rejection resulted in retaliation.
The next two handwritings were written by
McVeigh while in prison. The personal note was
signed “Tim” as he felt comfortable with the recipi-
ent, his sister, with no need to impress her because
he knew she loved him unconditionally.
The final note before his execution was signed
with his affected signature but not so bold or ex-
treme as before. What we are left with is still a lone-

48 THE FORENSIC EXAMINER Winter 2008 www.acfei.com


ly, intelligent, and organized man, maintaining his
dignity and pride and ready for his own end. All
of the anger apparent in the first letter had been
expended with his grand finale/explosion, and he
seemed to be at peace in comparison.

McVeigh Sample 2, note to his sister

McVeigh Sample 3, shortly before his execution

s Psychological Implications: Thinking and


morals may be distorted or strange. The
writer may twist ideas or morals to fit his
Osama bin Laden behavior or to justify his actions.
Another well-organized terrorist is Osama bin
Laden, whose writing appears at right. Although
the sample is of poor quality, it is nevertheless
evident that the lines are straight and even, and
the writing is arranged nicely on the page, indi-
cations of organized thought processes. As the
text is written in Arabic, it moves from right
to left.
Therefore, the right represents where he is com-
ing from and the left is symbolic of his future,
his goals. As the writing gradually moves away
from the right margin and proceeds closely to
the left edge of the paper, there is evidence that
he is future-oriented and he is intent on meet-
ing his aims. He sees the big picture and plans
far ahead.
Bin Laden’s handwriting and signature (at right)
are interesting pictorially, whether or not we are ca-
pable of deciphering the Arabic characters. Both
s Osama bin Laden
are written with exceptional slowness, indicating
careful calculation and deliberate movement sug-
gestive of certainty and strong will. The enlarged
size of the signature reveals tendencies toward
megalomania and a desire to rule and prove him-
self. The two circles—black versus white, positive
versus negative—show conflict and anxiety. The
signature shape seems to symbolize a menacing Theodore John ‘Ted’ Kaczynski
insect or a rifle. Theodore “Ted” Kaczynski, commonly known as
the Unabomber, is a convicted terrorist best known
Translation (right to left) for his campaign of sending bombs to several uni-
First line: Your brother in Islam; second line: versities and airlines from the late 1970s through
Usama bin Mohamm Laden (signature) early 1990s, which killed three and wounded 29. s A mugshot of Ted Kaczynski

(800) 592-1399 Winter 2008 THE FORENSIC EXAMINER 49


Charged with many federal offenses stemming from
this activity, Kaczynski pleaded guilty and was sen-
tenced to life in prison.
While an infant, Kaczynski had a severe aller-
gic reaction to medication. He was in the hospi-
tal for several weeks and allowed only infrequent
visits from his parents, who were barred from
holding their child. The once-happy baby was
reportedly never the same. Afterwards, he be-
came increasingly withdrawn and unresponsive
s Kaczynski Sample 1, many years before the bombings to human contact.
According to various accounts, testing showed
the young Kaczynski to have a high IQ, and records
indicate that his academic performance through-
out his early life was brilliant. As a result of his in-
telligence, he was allowed to skip the sixth grade,
which he described as a pivotal event in his life.
He remembers not fitting in with the older chil-
dren and being subject to verbal abuse and teasing
from them.
Kaczynski did well academically in high school
but reported some difficulty with mathematics in
his sophomore year. He was subsequently placed in
a more advanced math class and mastered the mate-
rial. He then skipped the 11th grade so that he was
s Kaczynski Sample 2, angry letter to friend able to graduate from high school two years early.
In the fall of 1958, at age 16, he was accepted as a
student at Harvard.
At Harvard, Kaczynski was a volunteer test sub-
ject in personality-destruction experiments conduct-
ed by Harvard psychologist Dr. Henry A. Murray, a
former CIA interrogation and psychological warfare
expert, who was known to have experimented with
multiple mind-altering drugs. The experiments,
called “Dydactic Interaction Of Alienated Subjects”
s Kaczynski Sample 3, letter to family member
tested subjects’ beliefs and personality traits. The
test results have since been sealed. Kaczynski later
traced some of his emotional instability and fear of
mind control to those tests. (Further details about
these experiments are covered in Peter Vronsky’s
highly recommended book, Serial Killers: The
Method and Madness of Monsters.)
After graduation from Harvard in 1962,
Kaczynski attended the University of Michigan,
where he earned a master’s degree and a PhD in
mathematics. There he began a research career, but
s Kaczynski Sample 4, letter to potential girlfriend he made few friends. One of his professors said, “It
is not enough to say he was smart.” At Michigan
he held a National Science Foundation fellowship,
taught undergraduates for 3 years, and published
articles related to his dissertation in mathematical
journals. After he left Michigan, he published ad-
ditional papers.
In 1967, Kaczynski was hired as an assistant
professor of mathematics at the University of
California, Berkeley, but his aloofness and reserve
caused students to rate him poorly. Despite pleas
from the department staff, he resigned without ex-
s Kaczynski Sample 5, letter from prison planation in 1969.

50 THE FORENSIC EXAMINER Winter 2008 www.acfei.com


After resigning his position at Berkeley, emotional responses. The personal pronoun ter his attention on reading and study. Feelings
Kaczynski held no permanent employment. I is changeable in size and slant, suggestive of of isolation continue to show in the wide dis-
He lived a simple life in a remote shack on a shifting self-image. Intense irritability and tances between words. It is evident that in fact
very little money, occasionally worked odd growing anger are seen in the jabbed dots and Kaczynski needs the structure and stability of
jobs, and he received some financial support heavy punctuation. Segmented letters reveal prison in order to “hold things together.” n
from his family. disconnectedness or disassociation, allowing for
As with Timothy McVeigh, Kaczynski’s compartmentalized thinking (see especially the
handwriting confirms his intelligence. The g in “Although” and some of the y’s as in “any”
first sample of printing (produced many and “celebicy”). Kaczynski’s difficulty with in-
years before the bombings) is organized and timacy is confirmed by the rather small and/or Handwriting indicators discussed herein are
only a selection of the many risk factors that
well placed on the page. It is clear, direct, incomplete lower loops of his writing, which
are potentially evident in handwritten mate-
and efficient. The lines are even, spacing is imply emotional or sexual isolation. Wide word rial. As earlier indicated, the authors’ studies
consistent, and all dots and crosses are in spacing also shows emotional distancing. have determined that there are multiple signs
place. Together, these factors denote clarity The final sample, penned after Kaczynski revealing potential criminal behavior or vio-
lence, but it is imperative to consider all fac-
of thought and expression and an ability to was imprisoned, is notable for the changes evi-
tors, both positive and negative, before reach-
think logically and with an eye toward im- dent in the personal pronoun I. The bottom of ing final conclusions.
portant details. The exceptional consistency this letter—its base and the symbolic founda- Additional material regarding the use of
of the writing points to perfectionism, com- tion of the self—is relatively weak. This implies written communication as an investigative tool
may be found at http://www.trialrun.com, in-
pulsion, and rigid self-control. some lack of stability and personal strength, al-
cluding more extensive interactive profiles of
The signature (representing one’s out- though this might be expected given the pro- people known to have been dangerous or vi-
ward expression, the face that is shown to the tected surrounding in which Kaczynski now olent. Readers are encouraged to contact the
world) conforms closely to copybook writ- finds himself. The writing remains organized, authors for further information (see URL ad-
dresses below).
ing, suggesting a desire to be seen as fitting consistent, and focused, allowing him to cen-
in and seeming to adhere to what is expected.
Like the printed text, it is clear and relatively
consistent. The i is carefully dotted, indicat- About the Authors
ing care with details and specifics.
The additional samples reflect changes over Kimon Iannetta has three decades of experience working with law enforcement, se-
the years. The awkwardly bent upper loops of curity professionals, and human resources specialists. Her profiling
sample two, along with the somewhat vari- techniques add another dimension in identifying high-risk poten-
able slant and baseline, show emotional stress tial in employees, patients, prisoners, and criminals. Additionally,
and potential breakdown. This is a letter in her knowledge of graphology assists in tracking and targeting
which Kaczynski expressed anger to a friend suspects and understanding timelines of criminal behavior. As the
he felt had betrayed him. founder of Trial Run, she performs jury consultation, witness profil-
The third Kaczynski sample, written to a ing and pre-trial evaluations for attorneys. Her most recent book is
family member, is interesting in that it is a Handwritings & Drawings of Death Row Prisoners, which she uses
mixture of cursive and printing. The print- as a textbook, along with her set of 124 Forensic Profiling Cards.
ed portions, which grow larger and bolder as She is the author of Danger Between the Lines, a reference manual for profiling violent
they progress, are obviously produced for ef- behavior, and its companion tool, and she provides tutoring and training sessions in the
fect and emphasis. However, the authors note use of these resources. Iannetta is also the author of Precision Personnel Placement, a hir-
that a mix of writing styles within one sample ing and management tool for human resource professionals. She is a Life Fellow of the
is sometimes a facilitator to the expression of American College of Forensic Examiners Institute, a member of the American Society of
negative urges. It suggests sudden bursts of Industrial Security, and a Diplomate of the American Board of Forensic Examiners. Her
energy or self-assertion and is often accompa- Web site is http://www.trialrun.com. Her books may be purchased at http://www.tri-
nied by out-of-place capitals, which signals in- alrun.com/id4u/buy_books.html.
dependence and defiant action. In this sample
and the previous one, the personal pronoun Reed Hayes is a long-time graphologist who focuses his expertise on the examination
I is more vertical than the rest of the script, of questioned handwriting and documents as well as the evaluation
again confirming independent thinking and of handwriting for personnel screening purposes. He holds certifica-
a tendency toward withdrawal. The retraced tions from the International Graphoanalysis Society and the National
upper portion of the letter portrays repression Association of Document Examiners and has been a member of the
and a narrow philosophical outlook. American College of Forensic Examiners Institute since 1992. Reed
Sample four, less stable than the previous is the author and co-author of several articles and books including
writings, is from a letter written to a poten- Forensic Handwriting Examination: A Definitive Guide (2006), Written
tial girlfriend. While Kaczynski wanted a sig- in Crime (1995) and Between the Lines: Understanding Yourself and
nificant female in his life, he was never very Others Through Handwriting Analysis (1993). He lectures extensively
comfortable with women and had difficulty on various aspects of handwriting and currently teaches a distance course in questioned
communicating intimately with them. The handwriting and document examination. His Web site is http://www.reedwrite.com.
variable slant and baselines show fluctuating

(800) 592-1399 Winter 2008 THE FORENSIC EXAMINER 51


ANALYZING
EVIDENCE
IS ONLY THE START
WHAT YOU SAY
IN THIS CHAIR
CAN MAKE OR
BREAK THE CASE
AND YOUR CAREER

CERTIFIED FORENSIC CONSULTANT (CFC) N


AVAI OW
L
ONLINE FOR YOUR CONVENIENCE/THOROUGH FOR YOUR PROTECTION ONLIABLE:
VERS NE
ION
CALL: (800) 592-1399 / LOG ON AT WWW.ACFEI.COM

“Protecting Our Homeland


Protect Your Homeland. in the 21st Century”
Become Certified in Homeland Security today.

The CHS program has earned its reputation as the premier group dedicated
to providing certification, training, and continuing education to profession-
als across the nation who are committed to improving homeland security. We
boast a total commitment to our country’s safety, an extraordinary knowledge
base, and an in-place organizational structure that delivers the highest-quali-
ty certification and continuing education opportunities in homeland security.

Join us today as we work together to protect what matters most—our families,


communities, country, and way of life.

OOO GI BILL APPROVED! OOO

The American Board for Certification in Homeland Security


2750 E. Sunshine St. | Springfield, MO 65804 | www.chs.acfei.com | (800) 592-0960 | cao-chs@acfei.com
CE ARTICLE 2: To Shoot or Not to Shoot (pages 54–64)

ATTENTION ACFEI MEMBERS: Journal-Learning CEs are now FREE when taken online. Visit www.acfei.com.

TO RECEIVE CE CREDIT FOR THIS ARTICLE CE ACCREDITATIONS FOR THIS ARTICLE


In order to receive one CE credit, each participant is required to This article is approved by the following for continuing education credit:
1. Read the continuing education article.
2. Complete the exam by circling the chosen answer for each question. Complete the evaluation form. (ACFEI) The American College of Forensic Examiners International provides this continuing education credit for
3. Mail or fax the completed form, along with the $15 payment for each CE exam taken to: Diplomates.
ACFEI, 2750 East Sunshine, Springfield, MO 65804. Or Fax to: 417-881-4702. Or go online to
www.acfei.com and take the test for FREE.

For each exam passed with a grade of 70% or above, a certificate of completion for 1.0 continuing educa-
tion credit will be mailed. Please allow at least 2 weeks to receive your certificate. The participants who do
not pass the exam are notified and will have a second opportunity to complete the exam. Any questions,
grievances or comments can be directed to the CE Department at (800) 592-1399, fax (417) 881-4702, or
e-mail: cedept@acfei.com. Continuing education credits for participation in this activity may not apply toward
license renewal in all states. It is the responsibility of each participant to verify the requirements of his/her state
licensing board(s). Continuing education activities printed in the journals will not be issued any refund.

LEARNING OBJECTIVES KEY WORDS: shooting response, perpetrator, confrontation


After studying this article, participants should be better able to do the following:
1. Demonstrate understanding of the issue of weapon identification and of the difficulty involved in distinguishing TARGET AUDIENCE: law enforcement officers, prosecutors, law officials
weapons from innocuous objects under forensically-relevant circumstances. Demonstrate understanding of the
situational and psychological dynamics underlying possible confusions of weapons and innocuous objects.
2. Describe how in controlled experiments, respondents were relatively ineffective at distinguishing weapons
from innocuous objects and indicated strong tendencies to shoot at “perpetrators” either armed or carrying
PROGRAM LEVEL: update
an innocuous object such as a power tool.
3. Describe how these results were obtained under idealized conditions, and that variables typically present in
actual crime scenes would tend to reduce accuracy still further. DISCLOSURE: The author has nothing to disclose.
4. Tell how respondents in controlled experiments, although exhibiting strong tendencies to shoot perpetra-
tors themselves, generally felt that police officers should not do so even under conditions crafted to require
a shooting response on the part of police. PREREQUISITES: none

ABSTRACT
In recent research, we found that eyewitness memory and interpretation of crime scenes were less effective than anticipated. However, conditions which enhanced the feature-intensive processing of crime
scenes tended to facilitate or improve both memory and interpretation. In the present study, abilities to evaluate potential hazard and appropriate police response to armed assailants were addressed under
idealized laboratory conditions. Using methods established in previous work, and in consultation with experienced police field training officers, we developed scenes of situations involving armed assailants
confronting victims. Using these scenes, it was shown that the majority of civilian respondents demonstrated very low capacity for distinguishing weapons from innocuous objects in context, even under
ideal viewing conditions. However, respondents were in general personally willing to fire on what appeared to be an armed perpetrator, even if that “perpetrator” was holding a power tool rather than an
actual weapon. In contrast, the vast majority of respondents was unwilling to accept a shooting response to the same situations on the part of police, even when the situations in question were rated by
experienced police officers as absolutely requiring a shooting response to prevent loss of life. Results are considered in terms of the Gestalt/Feature-Intensive processing theory of cognition, and in terms
of the ramifications of these findings for jury and public perceptions of officer involved shootings.

POST CE TEST QUESTIONS (Answer the following questions after reading the article)
1. Bartlett showed that mental representations: 4. About ____% of college-student respondents felt that police officers, in situations crafted to
a. Remain static, but are nearly perfect records of reality. require a shooting response 100% of the time, should fire.
b. Remain static, but may exhibit diminished accuracy. a. 100%
c. Are significantly reconfigured and changed with time. b. 84-87%
d. May be relied on to represent reality under conditions of stress. c. 11%
d. 0%
2. We would anticipate the ability to distinguish weapons from other objects to:
a. Improve under real-world, dynamic field conditions. 5. What reasons did respondents give for suggesting that officers should not fire?
b. Deteriorate under real-world, dynamic field conditions. a. Elaborate systems of rules of engagement.
c. Be identical across all conditions. b. Need to assume or understand perpetrator motives.
d. Be related to honesty and integrity on the part of police officers. c. If they did fire, they should shoot an arm or leg to reduce harm.
d. All of these.
3. In a controlled experiment, under idealized circumstances, college-student respondents on
average confused a power screwdriver with a pistol:
a. Most of the time.
b. Less than 50% of the time.
c. Approximately 11% of the time.
d. Virtually never.

EVALUATION: Circle one (1=Poor 2=Below Average 3=Average 4=Above Average 5=Excellent) PAYMENT INFORMATION: $15 per test (FREE ONLINE)
If you require special accommodations to participate in accordance with the Name: State License #:
Americans with Disabilities Act, please contact the CE Department at (800)
Phone Number: Member ID #:
592-1399.
Address: City:
1. Information was relevant and applicable. 12345
2. Learning objective 1 was met. 12345 State: Zip: E-mail:
3. Learning objective 2 was met. 12345 Credit Card #
4. Learning objective 3 was met. 12345
5. You were satisfied with the article. 12345 Circle one: check enclosed MasterCard Visa American Express
6. ADA instructions were adequate. 12345
7. The author’s knowledge, expertise, and clarity were appropriate. 12345 Name on card: Exp. Date:
8. Article was fair, balanced, and free of commercial bias. 12345 Signature Date
9. The article was appropriate to your education, experience, and 12345
licensure level. Statement of completion: I attest to having completed the CE activity. Please send the completed form, along with your
10. Instructional materials were useful. 12345 payment of $15 for each test taken. Fax: (417) 881-4702, or mail the forms to ACFEI Continuing Education, 2750 E.
Sunshine, Springfield, MO 65804. If you have questions, please call (417) 881-3818 or toll free at (800) 592-1399.

(800) 592-1399 Winter 2008 THE FORENSIC EXAMINER 53


CE Article: (ACFEI) 1 CE credit for this article

Shoot NOT
To or to

SHOOT:
Response and
By Matthew J. Sharps and Adam B. Hess

n recent research, we found that eyewitness memory and interpretation of crime scenes were less
effective than anticipated. However, conditions that enhanced the feature-intensive processing
of crime scenes tended to facilitate or improve both memory and interpretation. In the present
Interpretation study, abilities to evaluate potential hazard and appropriate police response to armed assailants
were addressed under idealized laboratory conditions. Using methods established in previous
work, and in consultation with experienced police field training officers, we developed scenes of
of Response situations involving armed assailants confronting victims. Using these scenes, it was shown that
the majority of civilian respondents demonstrated very low capacity for distinguishing weapons

to Armed from innocuous objects in context, even under ideal viewing conditions. However, respondents were
in general personally willing to fire on what appeared to be an armed perpetrator, even if that “perpe-
trator” held a power tool rather than an actual weapon. In contrast, the vast majority of respondents

Assailants was unwilling to accept a shooting response to the same situations on the part of police, even when
the situations in question were rated by experienced police officers as absolutely requiring a shooting
response to prevent loss of life. Results are considered in terms of the Gestalt/Feature-Intensive pro-
cessing theory of cognition, and in terms of the ramifications of these findings for jury and public per-
ceptions of officer involved shootings.

When a police officer confronts an armed sus- under conditions of darkness or semidarkness. In
pect, the officer’s choice of response must be made addition, as is also the case in eyewitness identifi-
swiftly. Frequently, such decisions must be made cation situations, a given suspect’s weapon may be
in less than a second. During that time, many occluded or partially occluded by suspect cloth-
factors in the scene must be evaluated: the sus- ing, posture, or structures behind which the sus-
pect’s motions; where the weapon is aimed; the pect may have taken cover (e.g., Narby, Cutler, &
presence of other people, including other poten- Penrod, 1996; Sharps, Barber, Stahl, & Villegas,
tial suspects, and whether or not they are in the 2003). All of these factors contribute to the dif-
officer’s probable field of fire; and other potential ficulty inherent in the rapid and pervasive cogni-
sources of hazard, to self, to others, and to the sus- tive processing involved.
pect, in the immediate environment (e.g., Gelles, In view of these extensive processing demands, er-
2006; Montejano, 2004; Tietjen, 2004; Moore, rors in perception or cognitive processing are likely to
2006). This type of rapid cognitive processing is be relatively frequent. In situations involving deadly
frequently required of law enforcement officers force, such errors may of course result in tragedy.

54 THE FORENSIC EXAMINER Winter 2008 www.acfei.com


(800) 592-1399 Winter 2008 THE FORENSIC EXAMINER 55
A classic case of this type occurred in 1999 in
New York City, when Amadou Diallo was shot
and killed by New York City police officers (e.g.,
Gladwell, 2005). It must be noted that Diallo’s
behavior was not typical for the innocent person,
which he in fact proved to be. When challenged by
plainclothes police, he ran. He was unresponsive
to police commands, possibly because of language
issues. During his flight from the police, Diallo at-
tempted to escape through a door, and he appar-
ently became increasingly agitated while attempting
to open it. He began to dig in his pockets while
turning his body away from the officers. Ultimately
he drew what appeared to be a black object from
a pocket, which he raised in the direction of the
officers. At least one officer perceived the top of
this object as the slide of a semi-automatic pistol.
The officers fired, with lethal effect. The object,
as has been extensively publicized ever since (e.g.,
Lee, 2005), turned out to be a wallet.
This type of event, in which officers mistake a
non-lethal object for a firearm, is not common in
terms of occurrence per police contact, but the ef-
fect does exist and has been extensively reported.
Recently, a man in Tacoma, Washington, was shot
and killed by police officers when he pointed a
“small black cordless drill” directly at the officers
after threatening to shoot them (Associated Press,
2007). In Central California alone, the authors
are aware of a number of such instances involving
a toy rocket, pellet guns, and—for perhaps incom-
prehensible reasons—a suspect who pointed a shoe
at an officer from a position of cover behind a bed.
Many other instances might be cited, although it
is not the purpose of the present article to present
a catalog of such errors—there are, quite simply, a
fairly large number of cases in which various rela-
tively innocuous objects have been mistaken for
firearms.
As noted above, extraordinary demands are
placed on the cognitive and perceptual abilities
of police officers in cases of gun violence. Public
perception of these incidents, however, typically
does not center on the cognitive or perceptual is-
sues involved. In the prototypical case cited above,
Diallo, presumably because of language issues, dis-
obeyed police commands. Presumably also because
of fear and emotional arousal, he ran from police
and made motions similar to those that a bona fide
suspect would make in drawing a weapon. All of
this occurred quickly and under very limited view-
ing conditions from the standpoint of officers.
However, the officers’ error in shooting him was at-
tributed, in many sources, to racism (see Gladwell,
2005, for extended discussion).
Accusations of racism and of failures of integ-
rity are frequently made in such cases, explicitly
or implicitly. In a recent example, the authors ob-
s Author, Mathew J. Sharps holds a cordless electric power drill, similar to the tool that was often mistaken
for a gun in a recent study. served a number of ad hominem attacks, in local

56 THE FORENSIC EXAMINER Winter 2008 www.acfei.com


media and “on the street,” on the officers involved of the police. It seems probable that these errors
in the pellet gun case mentioned above; it seemed more typically result from fundamental character-
incomprehensible, to many people, that officers istics of the human nervous system, when under
could possibly mistake a pellet gun for a real fire- heightened stress.
arm in the dark. Yet, a pellet gun is specifically But where deliberate malfeasance or integrity is-
engineered to resemble a handgun. Various me- sues are absent, where do these errors come from?
dia and Web-based sources publish what amount Although the effects are complex, diminished per-
to databases on police shootings, including those ceptual and cognitive resources may, of course,
made under circumstances such as those cited above result from the physiological arousal that derives
(e.g., Lee, 2005). The Diallo case even inspired a from danger and from physical effort, such as that
famous singer to write and perform a popular song involved in a foot chase (e.g., Clifford & Scott, s Amadou Diallo
(Gladwell, 2005). 1978; Morgan et al., 2004). There are broad in-
Frequently, however, this media and popular atten- dividual differences in such
tion has little or no basis in fact; while, as Gladwell effects; some people function
points out, the Diallo case was not “exactly exem- better under stress, including
plary police work” (p. 197), “there was no evidence the stress of violence, than oth-
that the four officers in the Diallo case were bad ers (e.g., Grossman, 1996),
people, or racists, or out to get Diallo” (p. 197). for reasons that have not yet
For these reasons, it is suggested here that pop- been fully elucidated. Yet law
ular perception of these mistaken-object effects, enforcement officers are typi-
at least in many cases, may have more to do with cally selected from, and self-
highly unrealistic public and mass-media expecta- select into, groups of people
tions, and with popular ideas about deadly force, who have undergone rigorous
than with putative racism or integrity issues on the training, an important purpose
part of police. To mistake a black square object in of which is to reduce negative
the dark, such the top of a wallet, for the slide of a psychological response to high
semi-automatic pistol, or to mistake a near-perfect, levels of arousal. It seems, in
full-size pellet-firing facsimile of a firearm for the short, that some other basic
real thing, does not necessarily impugn the char- characteristics of the human
acter of a given officer in question. nervous system are likely to
These considerations certainly do not excuse be involved in the generation
or justify unwarranted use of force; although it is of these errors.
certainly true that inappropriate or excessive use In fact, even in the absence
of force, including deadly force, does occur (e.g., of identifiable stress or dan-
Grossman, 1996), no sane person would condone ger, people in general may ex-
or excuse the shooting of innocent persons under hibit remarkably poor perfor-
any circumstances. However, especially in view of mance in describing what they
the enormous professional, personal, and legal costs have seen, and in deciding on
that frequently face officers in situations of genuine appropriate actions based on
or alleged wrongful death, it seems unlikely that their observations. Studies in
the most parsimonious explanation of the major- our laboratory have addressed
ity of these errors is lack of integrity on the part the ability of respondents to

(800) 592-1399 Winter 2008 THE FORENSIC EXAMINER 57


identify forensically relevant inanimate objects such the static, videotape-like system of popular imagi-
“What we see is not as weapons and vehicles. We have shown that even nation. Rather, cognitive representations become
necessarily what we ‘get’ under ideal conditions of lighting, exposure time, reconfigured. Representations become shorter and
freedom from contextual distraction, and relatively more abbreviated. Details are lost, leaving general
at deeper levels—semi- brief retention intervals, pistol identifications were gist representations on which information obtained
automatic pistols may on average less than 50% correct (Sharps, Barber, after the fact may act to alter memory elements,
Stahl, & Villegas, 2003). Even poorer performanc- which may or may not have been correct in the
become revolvers in the es derived from a similar study of vehicle identifica- first place. Finally, personal belief can alter memory
tion (Villegas, Sharps, Satterthwaite, & Chisholm, significantly in both the visual and verbal realms.
elastic workings of the 2005). Again under idealized conditions, vehicles For example, Bartlett (1932) showed that custom
mind, blue Chevrolet were identified correctly, on average, only one quar- and cultural beliefs significantly altered British sub-
ter of the time. This serves as strong evidence that jects’ memories of Native American stories, and that
Caprices may become the representations initially formed by human be- relatively abstract figures were recalled by respon-
white minivans (as in the ings may be significantly diminished and reconfig- dents as specific, meaningful pictures of everyday
ured by the nervous system even under normal cir- objects if suggested to be such by the experimenter.
Washington sniper case; cumstances (see Bartlett, 1932; also see Ahlberg & Modern work in several venues has confirmed the
Sharps, 2002). What we see is not necessarily what major points originally described by Bartlett (e.g.,
e.g., Blades, 2005; Villegas we “get” at deeper levels—semi-automatic pistols Ahlberg & Sharps, 2002; Bergman & Roediger,
et al., 2005), and, as has may become revolvers in the elastic workings of the 1999).
mind, blue Chevrolet Caprices may become white Research under the auspices of the Gestalt/
been seen, a momentarily- minivans (as in the Washington sniper case; e.g., Feature-Intensive Processing theory of visual cogni-
glimpsed wallet may readily Blades, 2005; Villegas et al., 2005), and, as has been tion (G/FI) has shown that these phenomena may
seen, a momentarily-glimpsed wallet may readily be encapsulated along a single processing dimen-
become ‘some kind of gun.’” become “some kind of gun.” sion (Sharps & Nunes, 2002; Sharps, 2003). As
The fact that such cognitive reconfiguration has been shown in the eyewitness memory studies
occurs has been known for more than 70 years. outlined above, people typically encode what they
Bartlett (1932) addressed similar issues in the see in a “gestalt” manner, with little actual atten-
realm of memory. He showed that memory is not tion to details that might assist in making a cor-

58 THE FORENSIC EXAMINER Winter 2008 www.acfei.com


rect identification. This tendency, repeatedly ob- this also influence their actions? The standardized
served in work on eyewitness identification, would stimulus materials described briefly above, depict-
be strongly expected to reduce the ability of an ob- ing realistic crime situations in static format, al-
server, especially under the conditions typical of a lowed us to address a question of significant po-
crime situation, to identify a weapon or other ob- tential importance for the weighing of evidence, in
ject correctly as such and to act accordingly. courtroom and investigative situations, concerning
In an earlier study (Sharps, Hess, Casner, Ranes, police shootings: What would the average citizen
& Jones, 2006 and in press), we employed this do in an officer’s place, if faced with a similar situ-
perspective and framework to test the ability of ation? In other words, does the average person,
untrained, civilian eyewitnesses to distinguish a faced with the question of whether an armed per-
weapon, specifically a 9mm Beretta semi-automat- petrator should be fired upon, integrate the neces-
ic pistol, from an innocuous object, specifically a sary feature-intensive information about the weapon
Sears Craftsman power screwdriver, in context. In or non-weapon in context to arrive at an accurate
view of the cases cited above, especially the recent decision?
Tacoma incident involving the cordless drill, this Also, regardless of what the average person would
research may provide important data for investiga- do when faced with an armed assailant, what do we
tive and courtroom situations. typically expect the police to do in the same life-or-
This research (Sharps et al., 2006 and in press) death situations?
employed high-quality digital photographs of eco- The present experiments addressed these ques-
logically valid crime scenes, developed with the ad- tions.
vice and supervision of expert police officers who
were highly experienced in tactical realities and in EXPERIMENT 1
the sorts of situations encountered by witnesses The intent of this experiment was to address the
and officers on the street. These photographs de- question of how untrained people would react,
picted a potentially violent crime scene, in which themselves, if placed in the position of police of-
a male or female perpetrator appeared, holding the ficers confronting a situation potentially involving
handgun or the screwdriver. The scene was either firearms and firearm violence.
(a) a “simple” one, sparse in terms of potentially Participants. The participants in this study were
distracting objects, or (b) was “complex,” includ- recruited from the Psychology Department Subject
ing a “victim” threatened by the armed perpetrator Pool of the California State University in Fresno,
as well as typical street clutter. Exposure time was California. Eighty-seven women (mean age 19.36,
a full 5 seconds, far beyond the amount of time SD = 1.31) and 38 men (mean age 20.16, SD =
under which relevant tactical decisions are typi- 1.68) provided usable data, participating for col-
cally made. Lighting was excellent and, of course, lege credit. The population was reflective of the
the scene was static, with no motion or possible multiracial makeup of the region, and all respon-
occlusion to distract or diminish the views of the dents were shown to be able to resolve visual stim-
respondents. Under these idealized conditions, it uli (standard letters from the Snellen test of visual
was interesting to note that the vast majority of re- acuity) far smaller than the actual objects to be
spondents who saw the gun identified it correctly resolved. Gender proportions reflected those of
as a gun, although the complex scene was associ- the subject pool population. This pool, which has
ated with diminished accuracy in this regard. What a relatively high attrition rate in their first year of
was less heartening, however, was the fact that the college, may reasonably be generalized to the pop-
vast majority (89%) of subjects who saw the power ulation at large, although these college-aged indi-
screwdriver, specifically 92 out of 103, also iden- viduals are of course generally young and in good
tified it as a gun. If these results generalize across health.
situations and populations, the depressing reality Materials. As in our previous research (Sharps et s Black and white hands rise up from
is that the human nervous system tends to recon- al., 2006 and in press), this study employed high- the crowd of several thousand protesters
during a march around the Department
figure harmless objects into guns if the context is quality digital photographs of ecologically valid of Justice in Washington D.C. Thursday
right. This result is of obvious relevance to the is- crime scenes, developed with the advice and super- protesting the acquittal of four white
police officers in the slaying of unarmed
sues discussed above; rather than having anything vision of expert police field training officers. All African immigrant Amadou Diallo.
to do with duplicity or integrity issues, many such officer advisors were highly experienced in tactical Lawyers representing the family of
errors may derive from what appear to be the gen- realities and in the sorts of situations encountered Amadou Diallo took their case to Justice
Department officials in an effort to per-
eral characteristics of human visual cognition when by witnesses and officers on the street. The photo- suade federal prosecutors to pursue a
faced with these types of situations (see Sharps et graphs depicted a potentially violent crime scene, criminal civil rights case against the four
New York police officers acquitted last
al., 2003). in which a male Caucasian perpetrator appeared, week in the 1999 death of the African
These considerations motivated the present ex- armed with a Beretta 9 mm handgun. Four scenes immigrant in his Bronx neighborhood.
KRT PHOTOGRAPH
periments, reported below. It has been shown that, were employed. The first scene was a “simple” one,
in context, people tend to identify non-weapons sparse in terms of potentially distracting objects.
as weapons with a fair degree of regularity. Does The second was “complex,” including street clut-

(800) 592-1399 Winter 2008 THE FORENSIC EXAMINER 59


ter, garbage cans, and other potentially distracting would be available to a police officer encountering
items. The third scene included several bystanders this situation.
and a young, female “victim” threatened by the Half the respondents were given the instruc-
armed perpetrator, as well as the typical street clut- tion to press a button on a Lafayette Instruments
ter of Scene 2. response apparatus if their decision was to fire on
An additional fourth scene was generated, iden- the “suspect.” The other half were asked to make
tical to Scene 3 except in one respect. In Scene 4, this decision, if they deemed it necessary, by liter-
the weapon was replaced with a power screwdriver, ally “firing” on the suspect, depicted on the screen,
as in our earlier work in the eyewitness realm (e.g., with a toy suction-cup dart gun. Obviously this
Sharps et al., 2006 and in press). This manipula- latter manipulation was not intended to mimic the
tion has recently assumed specific significance in the complex dynamics involved in firing a real weapon.
wake of the Tacoma shooting referenced above. Rather, we wished to provide preliminary informa-
Thus, in the first three pictures, the “perpetrator” tion, for the sake of future research, on whether the
was seen to be holding a handgun or pointing it at simple act of raising a “weapon” into a simulacrum
a “victim.” In the fourth, the “perpetrator” was an of a firing position, while attempting to aim at a
unarmed person holding a power screwdriver, or target, might have an influence on the ability to
perhaps waving the tool for emphasis in a non-le- ascertain the necessity of a shooting response.
thal discussion or argument with the “victim.” The
conditions for all four scenes involved uniformly Results
excellent lighting (strong sunlight), and the relative To evaluate the effects of exposure time, shoot-
comfort of witnesses being seated, 10-20 feet from ing framework (dart gun versus button), and gen-
a standard white movie screen, which they faced der of respondent, a “combined shooting score”
and on which the given scene was projected. was computed across scenes. For each of the four
There was no movement or occlusion of impor- scenes, a decision to shoot was rated as 2, where-
tant elements of the scenes, and of course there as a decision not to shoot was rated as 1. It was
was no personal danger for the respondents in the shown that, overall, respondents were more likely
experiment. As in our previous work, these ideal- to indicate a decision to shoot when pressing the
ized conditions were selected with the knowledge button than when “firing” the dart gun, F (1,124)
that an actual criminal situation, evolving quickly = 6.82, p = .01. The mean score across scenes for
in uncertain lighting and potentially occluded con- the button was 7.25 out of 8 possible, (SD = .98);
ditions, will typically result in poorer performance the mean score for the dart gun was 6.82 (SD =
given the known dynamics of human visual cogni- .88). Neither the gender of the respondent, nor
tion (e.g., Narby, Cutler, & Penrod, 1996; Spoehr the exposure time (2 s versus ½ s), were significant
& Lehmkule, 1982). influences on overall decision to shoot.
Procedure. Each respondent viewed only one The pattern of results for the four scenes em-
of the four scenes described above. Respondents ployed was consistent with the predictions of G/
were given the following instructions: “On the FI theory (Sharps & Nunes, 2002; Sharps, 2003).
screen, you will see a scene or a series of scenes The scene involving a lone perpetrator holding a
which may or may not involve a crime or sources gun, in a simple environment, with no victim, re-
of danger. These scenes will be shown very briefly. sulted in the smallest number of individuals de-
A person holding a weapon is a source of danger, ciding to shoot. However, even under these cir-
because he or she could point it at you and shoot. cumstances, in which no crime was depicted (the
You may intervene to protect yourself or others “perpetrator” as depicted in the “simple” scene
if you see an individual holding a weapon. You could have as easily been target-shooting as com-
demonstrate your decision to intervene by shoot- mitting a crime), 64% of respondents indicated
ing at the perpetrator holding the weapon (press- the decision to fire. This result was significant
ing the button). If you decide to shoot (or press (χ2 [1] = 9.80, p = .002).
the button), you must do so quickly before the In Scene 2, which depicted the same individual,
scene is gone.” (Note: The “shooting at the per- alone and armed, but in an area with garbage cans,
petrator” instruction was given for the “dart gun” debris and typical street clutter, the proportion of
condition described below; the “button” instruc- those who decided to shoot rose slightly, to 67%
tion was given for the Lafayette response appara- (χχ2 [1] = 14.79, p < .001). In Scene 3, when a
tus condition, also described below.) “victim” and several bystanders were added to this
Based on police advice and on information pro- condition, and the perpetrator was seen to be hold-
vided in training for police psychologists and for ing a pistol, the proportion of “shooters” rose sig-
United States Marshals (e.g., Montejano, 2004; nificantly, to 88% (χ2 [1] = 72.20, p < .001).
Moore, 2006; Tietjen, 2004), respondents saw the Finally, the victim condition was repeated, ex-
scene for a period of either 2 s or ½ s, times that cept that the perpetrator held the power screwdriver,
effectively bracketed the actual response time that rather than the gun. The proportion of respondents

60 THE FORENSIC EXAMINER Winter 2008 www.acfei.com


who decided to shoot him was 84.8% (χ2 [1] =
60.55, p < .001).
Further research will be needed to clarify this finding
and to select between theoretical alternatives. “respondents were
The effect of scene on shooting score was signifi-
cant, F (3,122) = 10.53, p < .001. Predetermined
Several important points may be derived from
these results. First of all, when untrained people equally likely to
paired t-tests (p = .05; experiment-wise error rate/cap-
italization on chance = 14.26%) indicated that both
(the same people who are, of course, eligible for jury
duty) “confronted” a suspect, the majority decided shoot the perpetrator
scenes with the victim produced higher proportions
of “shooters” than did those without, but that there
to shoot him under all conditions employed. A
slightly larger number decided to do so when they whether he was
was no significant difference between the screwdriver
and gun conditions when the “victim” was present
had the opportunity to be distracted by other ob-
jects in their visual fields, such as street clutter and armed or unarmed,
(p < .05). In other words, respondents were equally
likely to shoot the perpetrator whether he was armed
garbage cans, than when such objects were not pres-
ent. However, when a “victim” was also depicted, as long as there was
or unarmed, as long as there was a potential “victim”
in the scene. It made no difference whether the per-
and the “perpetrator” held a gun, the number of
these individuals who decided to shoot rose to an a potential ‘victim’ in
petrator held a gun or a power tool. overwhelming majority; 88%, nearly 9 out of 10,
made this decision. the scene. It made no
Discussion
The small but significant difference between the dart
When the “suspect” held a power tool rather than
a gun, approximately 85% elected to shoot this un- difference whether
gun and timer conditions may have resulted from a
disinclination to shoot when actual targeting behavior,
armed individual. The difference between the gun
and screwdriver conditions was not significant. It the perpetrator
even involving a toy gun, was required. However, it
could also have resulted from a higher degree of active
should be noted that the situation in which most
people effectively decided to kill an unarmed sus- held a gun or a
attention, and concomitant processing of the scene, in
the dart-gun situation. This would be predicted to re-
pect was similar to the circumstances surrounding
the Diallo case and the recent Tacoma incident, power tool.”
sult in a heightened level of feature-intensive process- with the potentially important exceptions of dif-
ing, which would in turn be expected to enhance gen- ferent body postures and orientation of the mis-
eral cognitive processing of the scene (Sharps, 2003). taken objects involved, and the exception that the

(800) 592-1399 Winter 2008 THE FORENSIC EXAMINER 61


Acknowledgements present results were obtained under ideal visual toward impulsive aggressivity versus deliberation,
The authors wish to thank circumstances: involving static stimuli, free of oc- and racial attitudes might very well be expected to
Chief of Police Jerry Dyer clusion, in excellent lighting, and with no personal influence these results. None of these factors were,
and the staff and Training risk. We would venture to suggest that these very of course, topics of the present study, but it should
Bureau of the Fresno Police high numbers of those who decided to shoot the be emphasized that the present results should not be
Department for their unstint- unarmed suspect under ideal conditions might be construed as reflecting universal human tendencies.
ing expert advice, generosity, inflated even further under the rapidly changing Once again, these are important topics for future
and support of this research. and visually confusing circumstances of a typical research.
Thanks also to Scott Larsen, police emergency. Finally, of course, it is essential to emphasize that
and to Amy Neff, Morgan There are, of course, limitations and exceptions the present results do not excuse or condone the
Goodwin, and Randy Vaughn- to these results. In the “complex” scenes, the gun shooting of innocent persons under any circum-
Dotta for their help in the or power tool was held, in a one-handed grip, at stances, let alone under circumstances in which po-
preparation of the materials an orientation that pointed it in the direction of lice integrity issues or other biasing conditions actu-
for this research. The research, the victim. As pointed out by reviewers of an ear- ally exist. The most important point of the present
views, and opinions presented lier version of this paper, this very posture may research is simply this: under excellent conditions of
in this paper are those of the have conveyed menace, which may in turn have visibility, a randomly-selected population of young
authors, and do not necessarily contributed to respondents’ decisions to “shoot.” adults observed a person holding either a gun or a
reflect the views or opinions of It is of course true that in some cases (e.g., the power tool in the same position and orientation.
the Fresno Police Department, Tacoma case cited above), innocuous objects re- Between 64% and 88% of the respondents indicated
or of its chief, staff, officers, or ally are pointed directly at officers or potential ci- a decision to fire on this person. They were most
employees. vilian victims (note that this was not the case in likely to make this response if the object in question
the Diallo tragedy). However, a less “menacing” was pointed at another person. When this was the
posture, involving a less direct orientation of the case, it made no statistical difference whether the
object toward a potential “victim,” might reduce object in question was a gun or a power screwdriver.
the shooting tendencies observed. On the other These results indicate an important potential source
hand, any other posture would have placed both of cognitive confusion in weapon/object discrimi-
the gun and the power tool in a non-profile view, nation, and further suggest the need for evidence-
reducing the level of feature-intensive visual infor- based law-enforcement training to address this issue
mation available to the observer and thus, perhaps, directly in practical field applications.
resulting in even greater confusion of innocuous
objects with weapons. It should also be noted that EXPERIMENT 2
it would be difficult to ascertain at what point in The intent of this experiment was to address the
orientation a given object comes to be viewed as second question posed above: to determine how
sufficiently menacing to increase the decision to untrained people felt that a police officer should re-
fire on the part of an observer. However, this im- spond to a given situation involving gun violence.
portant point concerning weapon/object orienta- Participants. The participants in this study were
tion should absolutely be addressed parametrically 33 women (mean age 19.36 years, SD = 3.80)
in future studies, employing different objects, held and 11 men (mean age = 20.72 years, SD = 2.28)
at different orientations and viewed from different recruited from freshman psychology classes at
perspectives. California State University, Fresno. These respon-
The instructions for this experiment, quoted dents participated in the development of our da-
above, informed respondents that they would see tabase established in recent work on eyewitness is-
a situation in which a weapon might or might not sues (Sharps et al., 2006 and 2007) and were drawn
be present. Cognitive framing is of course criti- from the same population, with the same character-
cally important for perception (see Bartlett, 1932; istics, as the respondents of Experiment 1. Gender
Ahlberg & Sharps, 2002). The intent here was to proportions reflected those of the classes.
simulate, as far as possible, the minimum level of Materials and procedures. This work again em-
information that might be held by a law enforce- ployed the same types of high-quality digital pho-
ment officer answering a call. However, as pointed tographs of ecologically valid crime scenes used in
out by a reviewer, this study did not address what our previous work (Sharps et al., 2006 and 2007),
might happen if a respondent were to encounter developed with the advice and supervision of expert
this situation unexpectedly, with no knowledge police field training officers, highly experienced in
that he or she might be about to view a crime, or tactical realities and in the sorts of situations encoun-
that a weapon might be present. Such a situation tered by officers and witnesses on the street. These
might very well precipitate a different result, and photographs depicted a potentially violent crime
again should be addressed in future research. scene. In Experiment 1 above, only a male perpetra-
In addition, also as pointed out by a reviewer of tor was employed, for the sake of typicality for real-
an earlier version of this paper, individual differ- world crime scenes, which, of course, overwhelm-
ences in such factors as temperament, tendencies ingly involve male perpetrators. In Experiment 2,

62 THE FORENSIC EXAMINER Winter 2008 www.acfei.com


both genders of potential assailants were included, conclusions from these results with regard to gen-
in order to ascertain whether gender would influence der, however; the percentages are sufficiently low
perceptions of proper police actions. Therefore, in that we might very well expect idiosyncratic re-
this study, a male or female Caucasian perpetrator sponding to have influenced these results, and the
appeared, holding a Beretta 9 mm handgun in a percentages with reference to gender are presented
one-handed grip, oriented toward a young, female solely for completeness and as a potential basis for
“victim” amid typical street clutter. future studies.
Three senior field training officers and a senior
police commander were asked to evaluate proper Discussion
police reaction to these scenes. In all cases, there The results of this experiment indicate that approxi-
was no question in the officers’ minds that this situ- mately 9 out of 10 people, within the experimental
ation, as depicted, absolutely required a shooting framework employed, were of the opinion that an
response for both the male and female perpetra- officer should not fire in this situation, although
tor; according to these officers, any police officer all of the senior police officers consulted stated that
encountering this situation must fire on the per- the situation depicted absolutely required a shoot-
petrator, who is depicted as clearly threatening an ing response. This result may have important im-
unarmed person with a gun, in order to prevent plications for situations in which 12-person juries
the probable imminent death of the victim. All must evaluate a given police shooting.
officers were in agreement on this issue. The reasons given by respondents for their views
In this experiment, we made use of an extended on this issue were varied and should be the subject
exposure time, a full 5 seconds. As noted above, of future studies. Some respondents felt that the
law enforcement experts are generally in agree- daylight, public conditions of the situation would
ment that a firearm assault situation such as that preclude the perpetrator’s firing. Others concocted
depicted may result in a violent conclusion in lit- elaborate sets of rules of engagement, or conditions,
erally less than a second (e.g., Montejano, 2004; under which the officer might fire (for example, if
Tietjen, 2004; Moore, 2006). Therefore, respon- the suspect fired first [in which case, of course, the
dents had far more than typically ample observa- victim would probably already have been shot], or
tion and processing time in this study. The same if the suspect had already committed murder, or
ideal conditions of observation used in Experiment if the officer had first attempted to “convince” the
1 were duplicated here. After viewing the scene, suspect to drop his or her weapon). Others liter-
respondents were asked, as part of a realistic police ally invoked the need for clairvoyance on the part
interview designed with the aid of senior, experi- of the police, saying that an officer should not fire
enced police field training officers, what a police in this situation because the suspect “did not look
officer should do on encountering the situation de- like she wanted to kill.” Several qualified their re-
picted. They were also asked the reasons for their sponses with the idea that if the police had to fire,
responses to this question. they should shoot the perpetrator’s leg or arm, be-
cause, in the case of one response, “a shot to the
Results leg is relatively harmless, if he is trying to escape,
The results of this study indicated a strong prefer- which means he is most likely guilty.” It is sug-
ence, on the part of civilian observers, for the police gested that many of these unrealistic responses may
to refrain from firing if confronted with this situ- have derived from confusion of media depictions
ation. Overall, 11.36% of respondents felt that a of police work with the real thing on the part of
shooting response was called for, in a stimulus situ- the public. It is further suggested, however, that if
ation that was deliberately crafted to create an ab- these ideas and attitudes are as widespread as the
solute necessity for a shooting response. Responses results of this initial research effort suggest, there
varied somewhat with both gender of observer and is substantial need for better education in the reali-
gender of perpetrator, but the unexpectedly low ties of crime and police work for the public from
numbers of respondents who suggested the need which, of course, all jurors are selected.
for a shooting response precluded formal statistical In this experiment, only 11.36% of individuals
analysis. Specifically, however, no male respondent saw a shooting response as appropriate in a situa-
felt that a shooting response was justified with a tion absolutely requiring one. This result may be
female perpetrator, although 22.22% of male re- of special interest for courtroom proceedings. In
spondents felt that it was appropriate to shoot the any given, randomly selected jury of 12 citizens,
male perpetrator. Women in this experiment were these results suggest that on average, one or at most
more likely to suggest the shooting of the female two jurors out of 12 would be likely see an officer
perpetrator (11.76%), but only 1 of 16 female re- on trial in an officer-involved-shooting situation as
spondents in the relevant condition (6.25%) was justified in shooting a perpetrator, even under the
in favor of a shooting response with the male. We clearest and most appropriate of circumstances. This
caution in the strongest terms against drawing any extreme discrepancy between public perception and

(800) 592-1399 Winter 2008 THE FORENSIC EXAMINER 63


actual police policy and operations warrants Bartlett, F.C. (1932). Remembering: A study in ex- eyewitness identifications. In S.L. Sporer, R.S. Malpass,
further attention, both in future research and perimental and social psychology. Cambridge, UK: Cam- & G. Koehnken (Eds.), Psychological issues in eyewitness
in the modern criminal justice system. bridge University Press. identification (pp. 23-52). Mahwah, NJ: Erlbaum.
Bergman, E.T., & Roediger, H.L. (1999). Can Bar- Sharps, M.J. (2003). Aging, representation, and thought:
Summary and Conclusions tlett’s repeated reproduction experiments be replicated? Gestalt and feature-intensive processing. Piscataway, NJ:
The results of these studies, taken together, Memory and Cognition, 27, 937-947. Transaction.
reveal several crucial points: Blades, H.B. (2005). The Washington, D.C., sniper Sharps, M.J., Hess, A.B., Ranes, B., Jones, J., & Cas-
1. Contrary to much popular opinion, av- case: A case study in how eyewitness identification of ner, H. (2006, October). Memory for elements of com-
erage people exhibited extreme difficulty in vehicles can go wrong. Forensic Examiner, 14, 26. plex crime scenes. Paper presented at the annual meet-
distinguishing a handgun from an innocuous Clifford, B.R., & Scott, J. (1978). Individual and ing of the Society for Police and Criminal Psychology,
object such as a power tool. situational factors in eyewitness testimony. Journal of Washington, DC.
2. This difficulty was observed even under ideal Applied Psychology, 63, 352-359. Sharps, M.J., Hess, A.B., Casner, H., Ranes, B., &
viewing conditions, far superior to those in ac- Gelles, M. (2006, October). Behavioral threat as- Jones, J. (2007) Eyewitness memory in context: Toward
tual crime situations. sessment: Law enforcement considerations. Society for a systematic understanding of eyewitness evidence. In
3. Average people indicated an overwhelm- Police and Criminal Psychology, Washington, D.C. press, Forensic Examiner, 16, 20-27.
ingly strong tendency to shoot, or at least to Gladwell, M. (2005). Blink. New York: Little, Sharps, M.J., & Nunes, M.A. (2002). Gestalt and
decide to shoot, an armed perpetrator them- Brown, & Co. feature-intensive processing: Toward a unified model of
selves if given the opportunity, and did so at Grossman, D. (1996). On killing. Boston: Little, human information processing. Current Psychology, 21,
the same levels even if the perpetrator was Brown. 68-84.
“armed” only with a power tool which was Lee, C. (2005, March 15). A list with bullets: NYPD Sharps, M.J., Barber, T.L., Stahl, H., & Villegas, A.B.
evidently readily mistaken for a weapon. shooting deaths of civilians, starting with Diallo and not (2003). Eyewitness memory for weapons. Forensic Ex-
4. However, even though the vast majority ending. Village Voice. Retrieved January 19, 2007, from aminer,12, 34-37.
of the civilian respondents indicated a readi- http://www.villagevoice.com/news/0511,lee,62083,5. Spoehr, K.T., & Lehmkule, S.W. (1982). Visual in-
ness to shoot the perpetrator themselves, only html formation processing. San Francisco: Freeman.
about 1 person in 10 felt it would be appro- Morgan, C.A., Hazlett, G., Doran, A., Gattett, S., Tietjen, T. (2004, November). Fresno Police De-
priate for the police to do so under the same Hoyt, G., Thomas, P., Baranoski, M, & Southwick, S.M. partment Conference on stress in police work. Fresno,
circumstances. (2004). Accuracy of eyewitness memory for persons en- California.
These results reveal a substantial disparity countered during exposure to highly intense stress. In- Villegas, A.B., Sharps, M.J., Satterthwaite, B., & Ch-
between the actions, attitudes, and beliefs ternational Journal of Law and Psychiatry, 27, 265-279. isholm, S. (2005). Eyewitness memory for vehicles.
of typical adults and the practical realities of Moore, L. (2006, November). Conference on the Forensic Examiner, 14, 24-28. n
police work in violent situations. It is sug- use of force in law enforcement. Office of the United
gested, as a matter for further research, that States Marshal, Fresno, California.
much of this disparity may lie in public per- Montejano, D. (2004, November). Fresno Police De-
ceptions garnered from popular media depic- partment Conference on stress in police work. Fresno, Earn CE Credit
To earn CE credit, complete the exam for this
tions of crime and police work, and probably California.
article on page 53 or complete the exam on-
from unrealistic expectations concerning the Narby, D.J., Cutler, B.L., & Penrod, S.D. (1996). line at www.acfei.com (select “Online CE”).
workings and capabilities of the human ner- The effects of witness, target, and situational factors on
vous system in terms of such processing tasks
as distinguishing actual firearms from, for ex-
ample, screwdrivers. A substantial body of About the Author
future research will be needed to address the
underlying mechanisms and the ramifications Matthew J. Sharps, PhD, is Professor of Psychology at
of the findings obtained in these initial stud- California State University, Fresno and adjunct faculty member
ies. For the present, however, it is clear that at Alliant International University. He received his MA (clinical
these effects assume special significance for psychology) from UCLA, and MA and PhD (psychology) from
the real-world courtroom circumstances un- the University of Colorado, and is a Diplomate of the American
der which actual witnesses, jurors, and public Board of Psychological Specialties with the American College
constituencies consider and testify as to the of Forensic Examiners. He is the author of numerous articles
actions of law enforcement personnel in ap- and papers on visual cognition and related topics, as well as
plication to real-world violent crime. the book Aging, Representation, and Thought: Gestalt and
Feature-Intensive Processing (2003, Transaction Publishers).
References He has consulted on issues of eyewitness identification in over
Ahlberg, S.W., & Sharps, M.J. (2002). Bartlett revis- one hundred and sixty criminal cases.
ited: Reconfiguration of long-term memory in young and
older adults. Journal of Genetic Psychology, 163, 211-218. Adam Hess is lecturer in Criminology at California State
Associated Press. (2007, February 13). Police: Man
University, Fresno, and a Fellow of the American College of
pointed cordless drill at officer. Retrieved February 15,
Forensic Examiners Institute.
2007, from http://www.kirotv.com/news/11004849/
detail.html

64 THE FORENSIC EXAMINER Winter 2008 www.acfei.com


CE ARTICLE 3: Can Suggestion Be Minimized in the Investigative Interview? (pages 66–75)

ATTENTION ACFEI MEMBERS: Journal-Learning CEs are now FREE when taken online. Visit www.acfei.com.

TO RECEIVE CE CREDIT FOR THIS ARTICLE CE ACCREDITATIONS FOR THIS ARTICLE


In order to receive one CE credit, each participant is required to This article is approved by the following for continuing education credit:
1. Read the continuing education article.
2. Complete the exam by circling the chosen answer for each question. Complete the evaluation form. (ACFEI) The American College of Forensic Examiners International provides this continuing education credit for
3. Mail or fax the completed form, along with the $15 payment for each CE exam taken to: Diplomates.
ACFEI, 2750 East Sunshine, Springfield, MO 65804. Or Fax to: 417-881-4702. Or go online to
www.acfei.com and take the test for FREE.

For each exam passed with a grade of 70% or above, a certificate of completion for 1.0 continuing educa-
tion credit will be mailed. Please allow at least 2 weeks to receive your certificate. The participants who do
not pass the exam are notified and will have a second opportunity to complete the exam. Any questions,
grievances or comments can be directed to the CE Department at (800) 592-1399, fax (417) 881-4702, or
e-mail: cedept@acfei.com. Continuing education credits for participation in this activity may not apply toward
license renewal in all states. It is the responsibility of each participant to verify the requirements of his/her state
licensing board(s). Continuing education activities printed in the journals will not be issued any refund.

LEARNING OBJECTIVES KEY WORDS: Suggestion, Demand Characteristics, Forensic Hypnosis


After studying this article, participants should be better able to do the following:
TARGET AUDIENCE: Law officers, investigators, attorneys, legal officials
1. Identify specific ways often subtle and pervasive influence of suggestion affects everyday human interac-
tions. PROGRAM LEVEL: update
2. Name the primary ways in which uncorroborated testimony provided by a previously hypnotized witness
can unwittingly subvert justice.
3. Describe ways that reliance on techniques that encourage imagination and visualization by the witness can DISCLOSURE: The author has nothing to disclose.
seriously undermine the reliability of witness reports obtained during an investigation, including those elic-
ited with the cognitive interview.
PREREQUISITES: none

ABSTRACT
This article examines multiple sources of suggestive bias that may taint evidence obtained from forensic interviews with eyewitnesses and victims of crime. We present several research paradigms used to
identify what constitutes undue suggestion, as well as the manner in which suggestive cues can be communicated and accepted by the witness as fact. Procedures that have been adopted as potential law
enforcement tools to enhance eyewitness recall, such as forensic hypnosis and the cognitive interview, are submitted to special scrutiny and relevant cautions are raised. Finally, we provide specific recom-
mendations to minimize suggestion in the investigative interview that are intended to expand upon current “good practice” guidelines.

POST CE TEST QUESTIONS (Answer the following questions after reading the article)
1. The term, “demand characteristics”: 4. According to the article, the current version of the cognitive interview:
a. refers to fundamental biological motives (e.g., hunger, thirst, threat, etc.) a. remains vulnerable to sources of suggestive bias in its use of imaginative and
b. refers to one of the mnemonic components of the cognitive interview visualization strategies
c. refers to social cues that may be used to infer another person’s intentions b. has little in common with the forensic use hypnosis
d. refers to the ritual used by a hypnotist to induce the condition of hypnosis c. has been adopted and utilized faithfully, according to protocol, by law
enforcement agencies worldwide
2. Which of the following would probably operate least as a demand d. None of the above
characteristic in a law enforcement investigative situation?
a. a polygraph instrument 5. Among the recommendations for minimizing suggestive bias during
b. a detective’s badge investigative interviews, the authors endorse:
c. videotaping equipment a. developing a positive rapport and establishing a collaborative, rather than a
d. a conference room table confrontative or antagonistic, relationship with the witness.
b. encouraging straightforward repeated attempts by the witness to try hard to
3. The notion that hypnosis can be used to aid the retrieval of accurate memories: remember.
a. was suggested by the early clinical work of Breuer and Freud. c. avoidance of any instructions to imagine or visualize events relevant to the
b. was generally discredited by researchers specializing in hypnosis and memory during the crime or the witness’s personal experiences.
latter decades of the 20th century. d. electronic recording (preferably audiovisual) of the full proceedings of the
c. remains the basis of controversy concerning the reliability of hypnotically elicited testimony investigative interview.
in U.S. courts and their counterparts in other countries. e. All of the above
d. All of the above

EVALUATION: Circle one (1=Poor 2=Below Average 3=Average 4=Above Average 5=Excellent) PAYMENT INFORMATION: $15 per test (FREE ONLINE)
If you require special accommodations to participate in accordance with the Name: State License #:
Americans with Disabilities Act, please contact the CE Department at (800)
Phone Number: Member ID #:
592-1399.
Address: City:
1. Information was relevant and applicable. 12345
2. Learning objective 1 was met. 12345 State: Zip: E-mail:
3. Learning objective 2 was met. 12345 Credit Card #
4. Learning objective 3 was met. 12345
5. You were satisfied with the article. 12345 Circle one: check enclosed MasterCard Visa American Express
6. ADA instructions were adequate. 12345
7. The author’s knowledge, expertise, and clarity were appropriate. 12345 Name on card: Exp. Date:
8. Article was fair, balanced, and free of commercial bias. 12345 Signature Date
9. The article was appropriate to your education, experience, and 12345
licensure level. Statement of completion: I attest to having completed the CE activity. Please send the completed form, along with your
10. Instructional materials were useful. 12345 payment of $15 for each test taken. Fax: (417) 881-4702, or mail the forms to ACFEI Continuing Education, 2750 E.
Sunshine, Springfield, MO 65804. If you have questions, please call (417) 881-3818 or toll free at (800) 592-1399.

(800) 592-1399 Winter 2008 THE FORENSIC EXAMINER 65


CE Article: (ACFEI) 1 CE credit for this article

Can Suggestion be Minimized in the


Investigative Interview?

66 THE FORENSIC EXAMINER Winter 2008 www.acfei.com


By Wayne G. Whitehouse, PhD, DABPS, Emily Carota Orne, BA, and David F. Dinges, PhD

his article examines multiple sources of suggestive bias that may taint evidence obtained
from forensic interviews with eyewitnesses and victims of crime. We present several re-
search paradigms used to identify what constitutes undue suggestion, as well as the manner
in which suggestive cues can be communicated and accepted by the witness as fact. Procedures
that have been adopted as potential law enforcement tools to enhance eyewitness recall, such as
forensic hypnosis and the cognitive interview, are submitted to special scrutiny and relevant cau-
tions are raised. Finally, we provide specific recommendations to minimize suggestion in the in-
vestigative interview that are intended to expand upon current “good practice” guidelines.

One cornerstone of our justice system is the eye- Unfortunately, the complications of suggestive bias
witness report. Unfortunately, the substance and on the products of human memory are not so neatly
reliability of the report, conveyed in interviews resolved.
and later in court, may be a direct function of The theoretical perspective advanced in this article
the amount of undue suggestion that arises dur- developed from several decades of our laboratory’s
ing the investigative interview process. Therefore, research into a variety of investigative techniques.
any scientific data that might establish a base for One of these, hypnosis, receives special attention
more careful investigative in- because its hallmark feature is
terviewing in order to avoid an increase in responsiveness
undue bias is of considerable to suggestion on the part of the
relevance to law enforcement hypnotized individual. Such
and the legal community. situationally enhanced suggest-
Throughout this article we ibility, coupled with one’s native
attempt to provide evidence capacity to respond to hypno-
of the pervasive nature of sug- sis, allows hypnotized persons
gestion in everyday experience. to modify their subjective ex-
Even in medical science, sug- periences in accordance with
gestion is taken into account the hypnotist’s instructions.
when evaluating the effective- This can lead to often remark-
ness of new treatments. The able positive outcomes, such as
classic “double-blind, place- the suppression of pain during
bo-controlled study” was de- childbirth or dental procedures,
veloped to isolate the specific but it is also responsible for in-
benefits of the treatment itself stances of memory contamina-
from those benefits that accrue tion and belief in false recollec-
from a hopeful patient’s confi- tions, which can pose a serious
dence in his or her doctor as threat to the very foundation of
well as from the doctor’s belief the justice system.
in the efficacy of the prescribed treatment. A simple, In order to identify what is unique about hyp-
elegant research strategy emerged: The treatment, nosis, scientists long ago recognized the need to
say a medication in the form of a pink pill, would understand the role of suggestion in normal, ev-
be administered to a random half of the patients eryday human interactions. Among the impor-
enrolled in the study, while the remaining patients tant lessons learned from this effort is that sug-
received an identically appearing pink pill that was gestion is ubiquitous in the social environment
actually inert (i.e., placebo). Not even the prescrib- and that it doesn’t need to be intentional to have
ing doctor knows whether the patient is receiving an impact. Even in the absence of explicit cues
the actual medication or placebo. Therefore, the provided by the parties, people attempt intuitive-
expectations of patients and their doctors for im- ly to infer the motives behind another’s words or
provement of symptoms would be roughly equiva- behavior. Martin Orne, who founded our labo-
lent regardless of whether the patients were receiving ratory in the 1960s, coined the term “demand
the actual treatment or the placebo. This essentially characteristics” to describe the aggregate of ele-
nullifies the influence of optimism, hope, and sug- ments in a social situation that provide informa-
gestion on the outcome, thereby permitting a clearer tion a person can use to draw inferences about
picture of the intrinsic efficacy of the medication. someone else’s intentions.

(800) 592-1399 Winter 2008 THE FORENSIC EXAMINER 67


Demand Characteristics: How do volunteers or
witnesses bring their personal theories to bear on their
reports? To illustrate the operation of demand char-
acteristics, Orne and Whitehouse (2000) described
an investigation in which research participants who
volunteered for a “scientific study” were quite will-
ing to engage in ostensibly meaningless activities
for several hours—such as working rapidly and ac-
curately to solve successive sheets of 224 addition
problems, only to follow instructions to tear up
each sheet into miniscule pieces before proceeding
to the next!
When questioned later by a different researcher
about their perceptions of the purpose of the study,
participants invariably assigned great importance to
their endeavors, viewing the experimental task as a
test of endurance or something similar. Thus, the
explicit communications consisted of instructions
(a) to work quickly and accurately on a large num-
ber of arithmetic calculations (participant’s infer-
ence: “A test of my math ability”), and (b) to tear
up your work and begin again (participant’s infer-
ence: “They don’t really care how many problems
I got right—what a waste of time and effort!” and
possibly, “But I’m supposed to continue, maybe
this next one is the one that counts. Yeah, maybe
they are trying to see what happens after I get dis-
couraged.”). The participant continually develops,
tests, and modifies hypotheses about the purpose
of the study, which are intermittently or scarcely
confirmed. When, after several hours repeating
this pointless task, participants are queried about
their impression of the study’s purpose, they still
manage to rescue a meaningful hypothesis: “It
was an endurance test.” On what evidence is this
conclusion based? Among the demand character-
istics operating here are subtle cues from the social
context that enable critical assessments by the par-
ticipant: “I volunteered to take part in a scientific
investigation—it must be something important.
These scientists are serious professionals. They
know I have a busy schedule—they wouldn’t take
up my time for frivolous purposes. They even of-
fered to pay me at the end of the experiment.” In
other words, the participants were responding to
the implicit suggestion, communicated by a host of
subtle demand characteristics, that their purpose
was to make a contribution to advance scientific
understanding and interpreted the importance of
the research, as well as their roles, accordingly.
An altogether different scenario was depicted in
a recent episode of a popular TV crime drama, but
is still rife with suggestion created by demand char-
acteristics. Here, one of the investigators, having
just returned from collecting evidence at the crime
scene, was consoling a female witness. After help-
ing her to gain composure, he pulled out his digital
camera and displayed the photograph of a male per-
son-of-interest and asked essentially, “Was it him?”

68 THE FORENSIC EXAMINER Winter 2008 www.acfei.com


The witness affirmed that the person in the photo witnessed, the experimenter asks a question that
was the perpetrator. Notwithstanding whether the includes a bit of explicit misinformation (e.g., sub-
witness would have been able to identify the same stituting “yield sign” for “stop sign”) or a nuanced
person under different circumstances, the method phraseology (e.g., “smashed into” for “bumped
used to obtain this identification was tainted by into”). While the theoretical basis for the effect re-
suggestion. Consider the demand characteristics mains controversial (e.g., McCloskey & Zaragoza,
that may have influenced the witness’s response: 1985), the evidence is clear that post-event misin-
“I have just witnessed my friend’s murder. I am formation conveyed, intentionally or inadvertently,
vulnerable and afraid for my own life. The police by an interviewer stands a very good chance of be-
are the only ones who can protect me and I must ing assimilated into the eyewitness’s account.
help them. The investigator just came back from A second approach was developed in the con-
the crime scene and he has important evidence. text of basic memory research on the circumstances
He suspects a particular person was responsible; that lead to the production and acceptance of false
he has a photo in his camera’s memory; he hasn’t memories (Roediger & McDermott, 1995). The
even printed it out yet; he needs me to identify this standard paradigm involves the presentation of a
suspect.” The victim’s emotional state, her view of number of conceptually related and nonrelated
the police as authorities and the ultimate source of words, followed by testing for recognition of those
her protection, and the urgency with which the in- same words when embedded in a list of nonpre-
vestigator sought identification of the suspect may sented words, including one that is conceptually
have coalesced as a suggestive cue that led her to related, but nonetheless not previously presented
identify a particular individual. The level of sug- (i.e., the critical lure). For example, a subject might
gestion could have been reduced had the investi- see the words yawn, pillow, dream, pajamas, and bed
gator taken time to present the suspect’s photo in interspersed among a list of nonrelated words like
a less-biased photo identification array. Yet, even saxophone, computer, car, ocean, and leaf. The sub-
this might not sufficiently diminish the influence sequent recognition test would include all of the
of suggestion, as witnesses may well infer that law previously presented words in addition to an equal
enforcement agencies do not routinely maintain number of nonpresented words, among which is the
photo galleries of completely innocent citizens to word sleep. The typical finding in this research is
use as foils in the identification process (Witness’s that subjects often mistakenly identify the concep-
inference: “They are probably all guilty of some- tually related, nonpresented word (in this example,
thing.”). sleep) as having been presented in the earlier list—
If this analysis leads the reader to the conclusion a case of false memory. Such research serves as a
that suggestion is unavoidable in social interactions, warning that eyewitness recollections can include
then our point has been made. Nevertheless, it is schematically consistent details that were never per-
unacceptable for investigators to be indifferent to ceptually experienced.
this premise, because to do so is to diminish the The third avenue of investigation into the impact
standards of forensic evidence. Instead, the legal of suggestion on eyewitness memory derives from
community needs to be aware of relevant research the individual differences perspective and is best ex-
findings in the social sciences and be willing to re- emplified by the model of Gudjonsson and Clark
vise best practice guidelines to remedy shortcom- (1986). These researchers endorse the objective as-
ings in current investigative procedures. In the re- sessment of witnesses’ “interrogative suggestibility”
mainder of this article, we attempt to draw upon with respect to their “yield” and “shift” predispo-
contemporary research that highlights problems and sitions, corresponding, respectively, to their likeli-
offers potential solutions to mitigate the effects of hood of succumbing to (mis)leading questioning
suggestive influence in forensic interviews. (“yield”) or changing their testimony under pres-
sure (“shift”). Their overall model takes into ac-
Laboratory Research on the count the individual’s interrogative suggestibility, as
Vulnerability to Suggestion measured by the Gudjonnson Suggestibility Scale
of Eyewitness Memory (Gudjonnson, 1984)—which differs from hypno-
A review of the literature reveals three distinct ap- tizability (Register & Kihlstrom, 1988)—in addi-
proaches to investigating the vulnerability to sug- tion to features of the interview context, such as
gestion of eyewitness memory reports. One of the closed dyadic social interaction between inter-
these represents the field of applied memory research viewer and interviewee, procedural aspects of the
and relies upon the subtle introduction of leading interview, as well as the presentation, acceptance
or misleading post-event information by an inves- of, and behavioral response to, any “suggestive
tigative interviewer (Loftus, 1992). A typical ex- stimuli.” Much like contemporary hypnosis re-
periment involves presenting a short film depicting search, the Gudjonnson and Clark (1986) model
some incident, such as a traffic accident. When considers the person-situation interaction as a fun-
subjects are later interviewed about what they had damental determinant of the individual’s response.

(800) 592-1399 Winter 2008 THE FORENSIC EXAMINER 69


If the circumstances are stressful (as is typically the
case), and the witness is uncertain about particu-
lar details, and is someone who is characteristically
prone to “yield” or to “shift” his or her testimony,
the situation is fertile for suggestion to contaminate
the evidentiary record.
The scope of laboratory studies of eyewitness
memory extends beyond the examples cited above.
Drawing upon the same core paradigms—applied,
basic, and individual differences approaches—re-
searchers have been active in evaluating the pros
and cons of various interview techniques adopted
by law enforcement. Here we consider two such
techniques, designed to enhance witness recall, that
have emerged in forensic investigations over the past
40 years.
The Forensic Use of Hypnosis. Hypnosis gained a
reputation as a useful agent of memory retrieval in
the late nineteenth century with the publication of
reports by Josef Breuer and Sigmund Freud, which
cited its ability to access lost memories in psycho-
analytic therapy—a claim that Freud later retract-
ed. Nevertheless, it was not until the late 1960s
(Harding v. State, 1968) that hypnotically elicited
testimony was permitted as evidence in courts of
law in the United States. This occasioned a prolif-
eration of laboratory research aimed at identifying
the mechanisms by which hypnosis might facilitate
memory retrieval. Whereas some early studies re-
ported positive or mixed findings, the more meth-
odologically sophisticated research of the 1980s
and 1990s revealed troublesome characteristics
of hypnotically derived recollections (see Orne,
Whitehouse, Dinges, & Orne, 1988). Among these
were observations that (a) hypnosis influenced re-
call in an indiscriminate manner—posthypnotic
testimony contained virtually equivalent amounts
of new correct and incorrect information; (b) hyp-
nosis increased the witness’s confidence that the
newly accessed “memories” were accurate, thereby
bolstering resistance to cross-examination; and (c)
the expressed confidence of the previously hypno-
tized witness translated into greater perceived cred-
ibility of the testimony by jurors.
As this research unfolded, the judicial system re-
sponded with the imposition of various restrictions
on hypnotically elicited testimony, ranging from
full-blown “per se inadmissibility” (adopted by the
majority of state Supreme Courts) to stipulating
procedural safeguards, such as those recommended
by Martin Orne in State v. Hurd (1981), to consid-
erations of admissibility based on the “totality of
circumstances” surrounding the hypnosis session
as well as scientifically valid precedents (Daubert
v. Merrell Dow Pharmaceuticals, Inc., 1993). The
United States Supreme Court, in Rock v. Arkansas
(1987), ruled that per se inadmissibility of hypnoti-
cally derived testimony could not be extended to
the case of a previously hypnotized defendant in a

70 THE FORENSIC EXAMINER Winter 2008 www.acfei.com


criminal trial because it infringed upon the consti- nel as interviewers. Here the original version of
tutionally guaranteed right to self-defense. Overall, the cognitive interview was evaluated against a
scaling the legal hurdles established for the foren- hypnosis interview and a standard police interview.
sic use of hypnosis was becoming an impractical Hypnosis and the cognitive interview produced
strategy for law enforcement, yielding to a search comparable results, and both procedures yielded
for viable alternative interview methods. a greater amount of correct information than did
The Cognitive Interview. An apparently prom- the standard interview. Curiously, however, neither
ising solution to the problem was embodied by procedure resulted in more incorrect information
the cognitive interview proposed by Geiselman, than the standard interview. The latter finding is
Fisher, Firstenberg, Hutton, Sullivan, Avetissian, inconsistent with a large body of hypnosis research,
and Prosk (1984), which consisted of a set of in- which indicates that, typically, hypnosis produces
terview mnemonics derived from well-established increases in both correct and incorrect recall (for a
basic research in human memory. The objectives review, see Orne et al., 1988).
are (a) to maximize the overlap of cues in the re- In our attempt (Whitehouse et al., 2005) to rep-
trieval context with the memory trace of the target licate their findings, we recognized that Geiselman
event, and (b) to encourage the witness to adopt et al. (1985) used a measure of hypnotic ability that
multiple memory search strategies. Accordingly, correlates very poorly with standardized instru-
witnesses are instructed to mentally reconstruct ments assessing hypnotizability (Orne et al., 1979).
environmental circumstances associated with the This makes it difficult to know how responsive their
incident, including their own thoughts, physiologi- witnesses actually were to the hypnotic interview
cal, and emotional experiences; to report every de- condition. Also, Geiselman and colleagues per-
tail that comes to mind, regardless of perceived im- mitted their law enforcement interviewers to use
portance; to recall events in a different order from hypnotic procedures with which they were famil-
the way in which they transpired; and to adopt iar, rather than prescribing a standardized protocol.
the perspective of another witness in order to de- Our replication study also used a brief, filmed crime
scribe the events from that person’s point of view. scenario, but all participants were screened for hyp-
A strong emphasis is placed on permitting the in- notizability with a well-validated, tape-recorded
terviewee to engage in a comprehensive narrative assessment instrument, the Harvard Group Scale
with minimal interruption. Subsequently, and as of Hypnotic Susceptibility, Form A (HGSHS:A;
appropriate, more specific prompts may be given Shor & E. Orne, 1962). Standardized protocols
to encourage the witness to elaborate on particular were also adhered to in conducting our hypnosis,
details. In recent years, the cognitive interview has cognitive interview, and motivated repeated-recall
been modified to include rapport-building strate- control interviews.
gies, visualization, and attention to the witness’s Our findings differed from those of Geiselman
emotional circumstances and communication skills and colleagues in several respects, the most impor-
(Fisher & Geiselman, 1992; Geiselman & Fisher, tant being that participants’ hypnotic ability, as
1997). measured by the HGSHS:A, was positively associ-
The cognitive interview has been widely ad- ated with the recall of erroneous and confabulatory
opted by law enforcement agencies and continues (i.e., information that was never presented) details
to be studied by researchers, throughout North for subjects interviewed with hypnosis and the
America, Europe, and Australia. Its superiority to cognitive interview, but not for those interviewed
standard police interviews (in terms of eliciting a in the motivated repeated-recall condition. This
greater quantity of correct information) has been suggests that some components of the cognitive
confirmed, but so has its tendency to moderately interview may tap hypnotic-like processes among
increase incorrect information. Its overall rate of hypnotizable individuals.
accuracy (85%) was only slightly better than con- Let’s examine those features that hypnosis and
trol interviews (82%) across the studies reviewed in the cognitive interview appear to have in common.
a recent meta-analysis (Köhnken, Milne, Memon, Hypnosis relies on an ability to set aside current
& Bull, 1999). reality and to vividly imagine being in other times
For our purposes, the critical question is whether and places. Thus, hypnotized individuals can
the cognitive interview can provide a law enforce- mitigate noxious events by engaging in imagery of
ment tool that escapes the problems associated with pleasant experiences; they can strategically navigate
forensic hypnosis. The most straightforward way the temporal realm by imagining themselves in the
to address this issue is to compare the results of past or future. Hypnosis provides both license and
interviews involving hypnosis with those that em- a legitimate context for persons with the requisite
ploy the cognitive interview. Geiselman, Fisher, cognitive ability to deploy fantasy to alter their in-
MacKinnon, & Holland (1985) reported such the-moment circumstances.
a comparison using films of simulated crimes as Whitehouse et al. (2005) employed a hypnotic
stimuli and experienced law enforcement person- interview technique, popularized by Martin Reiser

(800) 592-1399 Winter 2008 THE FORENSIC EXAMINER 71


of the Los Angeles Police Department (Reiser,
1980), in which hypnotized witnesses are instruct-
ed to imagine they are watching the events of the
crime unfold in a television documentary. They are
told to use their imaginary remote control device
to “zoom in,” “fast forward,” “reverse,” and “freeze
frame” the TV footage in their “mind’s eye.” The
metaphor provides a mechanism and rationale to
review their recollections in different orders and
amplify details in response to the investigator’s
questions. Highly hypnotizable persons are quite
able to do this; it is generally not as effective among
comparatively less hypnotizable individuals. The
cognitive interview uses similar instructions to
guide memory retrieval, such as recalling events in
different temporal sequences or recounting them
from someone else’s point-of-view. Again, although
less explicitly, witnesses are encouraged temporarily
to discount their reality orientation and engage in
fantasy. The ostensible difference between hypnosis
and the cognitive interview is that typically the for-
mer employs a familiar, ritualized induction proce-
dure to facilitate the transition from a normal wak-
ing state to the hypnotic condition. However, it is
important to bear in mind that formal induction is
not a necessary precondition for hypnosis to occur
(Banyai & Hilgard, 1976; Estabrooks, 1948); hence
this procedural distinction does little to undermine
the proposition that the two interview procedures
may involve similar cognitive processes.
An additional source of concern with the cog-
nitive interview is the instruction to “report ev-
erything, regardless of its perceived importance
to the investigation.” The stated intention of this
instruction is to communicate to witnesses that
they should not censor their reports with regard
to confident recollections that they might feel are
not relevant to the case. The danger, however, is
that this may be misinterpreted to mean that they
should include all information, even that about which
they have little certainty (i.e., lower their subjective
report threshold), which would engender the sort
of problem that hypnosis creates—the potential
inability of the witness to discriminate between
factual and inaccurate recall. In response to this
concern, Fisher and Geiselman (1992) now urge
investigators to warn witnesses “not to guess or
fabricate” (p. 41). Unfortunately, several survey
studies of law enforcement personnel (Clifford &
George, 1996; Kebbell, Milne, & Wagstaff, 1999)
have determined that the cognitive interview is of-
ten modified in actual field use due, primarily, to
time constraints, such that the prescribed version
is not always the same as that which is ultimately
adopted by forensic investigators.
In view of the difficulties associated with hyp-
nosis and the cognitive interview, it is worth em-
phasizing that the motivated repeated-recall inter-
view procedure used by Whitehouse et al. (2005)

72 THE FORENSIC EXAMINER Winter 2008 www.acfei.com


as a control condition in their study was found to will, no doubt, recognize that elements of the cog-
be substantially less vulnerable to memory errors. nitive interview, in its current state of development,
It was based on extensive evidence that repeated are incorporated in the NIJ document. Rather
efforts to recall previously presented information than reiterate their recommended guidelines, our
produced by corresponding incremental gains in purpose is, instead, to highlight a few issues that
memory output, referred to as hypermnesia (Erdelyi sometimes create excursions from best practice
& Becker, 1974; Payne, 1987). No special inter- standards, which, in turn, might open the door to
vention (e.g., hypnosis, guided imagery, cognitive suggestive bias.
interview) was necessary, only the willingness of
the witness to really try several times to remem- Toward Minimizing Suggestion
ber the same material. Our sole modification to in Investigative Interviews
this formula was to introduce intervening “distrac- Of course, situational factors will always prevail
tor” tasks (see Whitehouse et al., 2005) designed and our recommendations here are intended to
to temporarily change the participant’s cognitive be generic. Implementation should be considered
set, reduce fatigue, and to sustain repeated effort, judiciously on the basis of such eyewitness factors
which might not be as important (but should not as age, language skills, psychological disability, and
be dismissed) in an actual forensic interview situa- relationship to any suspects in the case.
tion. The goal simply was to implement a control The scenarios described at the beginning of this
condition in which subjects were engaged in an article indicate that an important consideration
equal number of recall attempts as participants in should be the demand characteristics or contex-
the hypnosis and cognitive interview conditions, tual cues present in the interview setting. Law en-
with an equivalent motivation to expend recall ef- forcement officials are perceived to embody vastly
fort. different personae, ranging from protective civil
Our experience with these interview procedures servants to fearsome bullies, with the power to in-
leads us to recommend (a) wholesale rejection of carcerate. Which role the interviewer adopts can
hypnosis due to its essential reliance on suggestion have a considerable impact on the outcome of the
and fantasy; (b) further development and specific investigation.
modification of the cognitive interview to mini- Most successful forensic interviews begin by de-
mize or replace the use of suggestive elements that veloping rapport and ensuring the interviewee’s
can be activated by instructions to engage in vi- comfort. Part of this initial process involves con-
sualization; and (c) emphasizing straightforward veying to witnesses that they, alone, possess defini-
repeated entreaties to “try again” or “tell me ev- tive, critical information about the incident under
erything you can remember,” as embodied by the investigation. The interviewer thereby establishes
motivated repeated-recall procedure. In a similar his or her role as a collaborator, rather than as an
vein, Fisher, Brennan, and McCauley (2002) ar- antagonistic authority figure. This cooperative re-
gue that additional refinements to the cognitive lationship is then reinforced by encouraging wit-
interview should now include explicit warnings to nesses to tell everything they can remember at their
witnesses not to guess about details of which they own pace and in as much detail as possible, while
are uncertain, and to avoid the “change perspec- the interviewer refrains from interruption.
tive” technique when interviewing young children. Prior to obtaining the witness’s narrative report of
Evidence from a recent study (Davis, McMahon, investigationally relevant aspects of the crime, how-
& Greenwood, 2005) suggests that certain mne- ever, it is often recommended (see National Institute
monic components of the cognitive interview (i.e., of Justice, 1999) that the witness be encouraged to
“change perspectives” and “change order”) can be mentally reconstruct various environmental circum-
replaced by additional free-recall opportunities— stances surrounding the event in question. These
similar to the motivated repeated-recall procedure might include details such as the time of day, day of
—without any significant reduction in its efficacy. the week, weather conditions, prior activities of the
Along with minimizing suggestive, fantasy-based witness, emotional state (e.g., upbeat, neutral, angry,
aspects, these modifications to the cognitive inter- or upset), physical state (e.g., activated, fatigued, or
view by Davis et al. (2005) make it more feasible hungry), and how the witness happened upon the
when time constraints are a concern. scene. The goal of this exercise is to mentally rein-
Collectively, these developments contribute to state peripheral details that might serve as potential
a general procedural outline for investigative in- retrieval cues for other, more critically important,
terviewing that can be used to minimize or, at the information to emerge during the witness’s free nar-
very least, identify instances of suggestive bias. The rative. It is based upon a set of well-documented re-
points described below are intended as a supple- search findings, articulated by the encoding specific-
ment to the comprehensive guide for law enforce- ity principle (Tulving & Thompson, 1973), which
ment interviews published in 1999 by the National imply that memory for an event is optimal when
Institute of Justice (NIJ). The interested reader the conditions present at remembering match those

(800) 592-1399 Winter 2008 THE FORENSIC EXAMINER 73


present when the event was originally experi- gestible. Second, it is brought about by sim- eyewitnesses and victims of crimes. Instead,
enced. However, an important caveat that is ple instruction, without any attempt to alter the reliability of evidence obtained from foren-
often overlooked is that, in order to be maxi- the witness’s state of consciousness as, for ex- sic interviews ultimately must be evaluated by
mally effective, the mentally reproduced con- ample, through a formal hypnotic induction jurors. Sworn testimony is often inadequate,
textual details must, in fact, include the critical procedure. Third, these findings have direct particularly if there is any chance the witness
retrieval cues pertinent to the incident under relevance to the development of the cogni- has become convinced of the veracity of his or
investigation. Thus, rather than running the tive interview, where a similar strategy was her account as a result of suggestive question-
risk that the effort to mentally reconstruct recently incorporated in which witnesses are ing by law enforcement officials. In such cases,
circumstances associated with the event of in- instructed to focus their attention on vari- the availability of some form of memorialized
terest might lead to mismatched or irrelevant ous sensory aspects of an incident by closing record of the interview session can be critical.
retrieval cues, in major forensic cases where their eyes and visualizing the event (Fisher et At minimum the documentation could be in
the witness’s report may be critical, physically al., 2002). Accordingly, the phenomenon of the form of a stenographic transcript provided
transporting the witness to the scene of the in- imagination inflation has serious implications by a disinterested third party, or, even more
cident whenever possible is likely to prompt for practices by law enforcement investigators acceptable would be a well-labeled and well-
the most viable retrieval cues to aid the wit- and psychotherapists because it sheds light on archived audiotape recording. Ideally, in criti-
ness’s recollections of the event. the alarming ease with which events, once cal forensic cases, videotape that features the
By far the most serious concern regard- adamantly denied by the interviewee, might witness, a clock, and the investigator should
ing the influence of suggestion on eyewitness come to be confidently adopted as part of be considered as it permits a full evaluation of
memory arises when interview techniques that the individual’s autobiographical history in the extent of duress, the demeanor of the in-
rely on fantasy and imagination are introduced response to implicit or explicit suggestions vestigator and the witness, as well as any ver-
in a situation in which the witness perceives to imagine they actually took place. bal and nonverbal cues that might have been
salient demand characteristics to provide evi- Thus it is clear that visualization and im- communicated with the potential to influence
dence consistent with a particular investiga- agery based strategies to enhance recollec- the witness’s report. Although every precau-
tive theory. Recall from the examples at the tion are fraught with the same problems that tion needs to be taken to avoid the possible
beginning of this article that demand charac- plague the forensic use of hypnosis, despite influence of suggestion on eyewitness memo-
teristics are often subtle and, unless anticipated the absence of a specific induction ritual that ry in the first place, for justice to be served it
and strategically managed by the investigator, is typical of hypnosis. This is why we strong- is equally important that a reliable record of
they are apt to surface during the interview. ly urge that specific modifications of the cog- the means and methods used to acquire such
This is a source of influence that appears to nitive interview include the abandonment evidence be made available to the courts.
be ubiquitous in human social interactions. of such strategies as “visualization of sensory
Ordinarily, honest, well-intentioned witness- details,” “change perspectives,” and “recall References
es with relevant information to provide might events in a different temporal sequence.” If Banyai, E., & Hilgard, E.R. (1976). A comparison
stave off such pressure and, indeed, exert a the witness did not actually experience events of active-alert hypnotic induction with traditional re-
countermanding influence (e.g., confidence) from someone else’s point-of-view or in re- laxation induction. Journal of Abnormal Psychology, 85,
to accept their accounts as truthful. But the verse order, then to ask him or her to recount 218-224.
introduction of techniques such as hypnosis, events from that perspective is literally asking Clifford, B.R., & George, R. (1996). A field evalu-
visualization, and guided imagery can easily the witness to engage in fantasy, i.e., to use ation of training in three methods of witness/victim in-
undermine the veridicality of testimony by imaginative skills to elaborate aspects of the vestigative interviewing. Psychology, Crime and Law, 2,
rendering witnesses more compliant with de- event that could not otherwise be known. If 231-248.
mand cues from the investigator, while at the it were the case that such an exercise had a Daubert v. Merrell Dow Pharmaceuticals, Inc., 509 U.S.
same time permitting them to abrogate per- benign impact on the witness’s memory and 579, 113 S. Ct. 2786, 125 L. Ed. 2d 469. (1993).
sonal responsibility for the accuracy of their produced additional investigationally relevant Davis, M., McMahon, M., & Greenwood, K. (2005).
statements. There is a well-documented sci- details, then it certainly should be adopted. The efficacy of mnemonic components of the Cognitive
entific literature that demonstrates memory But the evidence strongly suggests that such Interview: Towards a shortened variant for time-critical
modification and confidence augmentation techniques can sensitize witnesses to confi- investigations. Applied Cognitive Psychology, 19, 75–93.
with hypnosis and suggestive imagery (e.g., dently report information about which they Erdelyi, M.H., & Becker, J. (1974). Hypermnesia
Orne et al., 1988). have little direct knowledge. for pictures: Incremental memory for pictures but not
Recently it has been shown that instruc- Finally, the need to authenticate the pro- words in multiple recall trials. Cognitive Psychology, 6,
tions to close one’s eyes and merely imagine ceedings of investigative interviews cannot be 159-171.
events that never happened increases confi- overemphasized. As we have tried to demon- Estabrooks, G.A. (1948). Hypnotism. New York:
dence that such events really did transpire— strate, suggestive bias emanates from a variety Dutton.
a phenomenon known as imagination infla- of sources—some ubiquitous, some unique, Fisher, R.P., Brennan, K.H., & McCauley, M.R.
tion (Garry, Manning, Loftus, & Sherman, some inadvertent, and some even perhaps in- (2002). The cognitive interview method to enhance
1996; Thomas, Bulevich, & Loftus, 2003). tentional. Regrettably, there is no known an- eyewitness recall. In M. L. Eisen, J. A. Quas, & G. S.
Research on this topic is noteworthy for alog to the double-blind, placebo-controlled Goodman (Eds.) Memory and suggestibility in the foren-
several reasons. First, the imagination infla- study—used by scientists to isolate the influ- sic interview (pp. 265-286). Mahwah, N.J.: Erlbaum.
tion effect has been observed in the general ence of suggestion from true treatment ef- Fisher, R.P., & Geiselman, R.E. (1992). Memory-en-
population and thus does not appear to be fects—available to investigative interviewers in hancing techniques for investigative interviewing: The cog-
limited to witnesses who are extremely sug- their efforts to extract truthful evidence from nitive interview. Springfield, IL: Charles C Thomas.

74 THE FORENSIC EXAMINER Winter 2008 www.acfei.com


Garry, M., Manning, C.G., Loftus, E.F., & Sherman, Register, P.A., & Kihlstrom, J.F. (1988). Hypnosis nation inflation effect. Memory & Cognition, 31, 630-640.
S.J. (1996). Imagination inflation: Imaging a childhood and interrogative suggestibility. Personality and Indi- Tulving, E., & Thomson, D.M. (1973). Encoding
event inflates confidence that it occurred. Psychonomic vidual Differences, 9, 549-558. specificity and retrieval processes in episodic memory.
Bulletin & Review, 3, 208-214. Reiser, M. (1980). Handbook of investigative hypno- Psychological Review, 80, 352-373.
Geiselman, R.E., & Fisher, R.P. (1997). Ten years of sis. Los Angeles, CA: LEHI Publishing Co. Whitehouse, W.G., Orne, E.C., Dinges, D.F., Bates, B.L.,
cognitive interviewing. In D.G. Payne & F.G. Conrad Rock v. Arkansas, 483 U.S. 44. (1987). Nadon, R., & Orne, M.T. (2005). The cognitive interview:
(Eds.), Intersections in basic and applied memory research (pp. Roediger, H. L., III, & McDermott, K.B. (1995). Does it successfully avoid the dangers of forensic hypnosis?
291-310). Mahwah, NJ: Lawrence Erlbaum Associates. Creating false memories: Remembering words not pre- American Journal of Psychology, 118, 215-234. n
Geiselman, R.E., Fisher, R.P., Firstenberg, I., Hutton, sented in lists. Journal of Experimental Psychology: Learn-
L.A., Sullivan,, S., Avetissian, I., & Prosk. A. (1984). ing, Memory, and Cognition, 24, 803-814.
Enhancement of eyewitness memory: An empirical eval- Shor, R.E., & Orne, E.C. (1962). The Harvard Group
uation of the cognitive interview. Journal of Police Sci- Scale of Hypnotic Susceptibility, Form A. Palo Alto, CA: Acknowledgment
ence and Administration, 12, 74-80. Consulting Psychologists Press. Preparation of this article was support-
Geiselman, R.E., Fisher, R.P., MacKinnon, D.P. & State v. Hurd, 432 A.2d 86 (N.J.). (1981). ed in part by a grant from the Institute
Holland, H.L. (1985). Eyewitness memory enhance- Thomas, A.K., Bulevich, J.B., & Loftus, E.F. (2003). Explor- for Experimental Psychiatry Research
ment in the police interview: Cognitive retrieval mne- ing the role of repetition and sensory elaboration in the imagi- Foundation.
monics versus hypnosis. Journal of Applied Psychology,
70, 401-412.
Gudjonnson, G.H. (1984). A new scale of interroga- About the Author
tive suggestibility. Personality and Individual Differences,
5, 303-314. Wayne G. Whitehouse, PhD, DABPS is a Research Psychologist with academic ap-
Gudjonnson, G.H., & Clark, N.K. (1986). Sug- pointments in the Department of Psychiatry of the University of
gestibility in police interrogation: A social psychologi- Pennsylvania School of Medicine and the Department of Psychology
cal model. Social Behaviour, 1, 83-104. at Temple University, both in Philadelphia, Pennsylvania. He has
Harding v. State, 5 Md. App. 230, 246 A.2d 302 been Principal Investigator or Project Director of federal grants from
(1968), cert. denied, 395 U.S. 949. (1969). the National Institutes of Health and the National Institute of Justice,
Kebbell, M.R., Milne, R., & Wagstaff, G.F. (1999). as well as research grants from private foundations. He holds mem-
The cognitive interview: A survey of its forensic effec- berships in the American Psychological Association, the Association
tiveness. Psychology, Crime & Law, 5, 101-115. for Psychological Science, the Psychonomic Society, the Eastern
Köhnken, G., Milne, R., Memon, A., & Bull, R. Psychological Association, Sigma Xi, and the American College of
(1999). The cognitive interview: A meta-analysis, Psy- Forensic Examiners International. His research interests include forensic evidence, cog-
chology, Crime & Law, 5, 3-27. nitive science, hypnosis, psychopathology, and behavioral medicine.
Loftus, E.F. (1992). When a lie becomes memory’s truth.
Current Directions in Psychological Science, 1, 121-123. Emily Carota Orne, BA is a Research Psychologist and Co-Director of the Unit for
McCloskey, M., & Zaragoza, M. (1985). Misleading Experimental Psychiatry in the Department of Psychiatry at the
post-event information and memory for events: Arguments University of Pennsylvania School of Medicine. She has a distin-
and evidence against the memory impairment hypothesis. guished research career in the areas of hypnosis, demand charac-
Journal of Experimental Psychology: General, 114, 3-18. teristics, interview dynamics, and behavioral medicine. She co-
National Institute of Justice. (1999). Eyewitness evidence: developed, with Ronald E. Shor, PhD, the Harvard Group Scale of
A guide for law enforcement. Retrieved July 15, 2007, from Hypnotic Susceptibility, which enjoys worldwide recognition as the
http://www.ncjrs.gov/pdffiles1/nij/178240.pdf. premier group assessment instrument for hypnotizability screening
Orne, M.T., Hilgard, E.R., Spiegel, H. Spiegel, D., in the context of hypnosis research. She is on the Board of the False
Crawford, H.J., Evans, F.J., Orne, E.C., & Frischholz, Memory Syndrome Foundation.
E.J. (1979). The relation between the Hypnotic Induc-
tion Profile and the Stanford Hypnotic Susceptibility David F. Dinges, PhD is Professor and Director of the Unit for Experimental Psychiatry
Scales, Forms A and C. International Journal of Clini- in the Department of Psychiatry at the University of Pennsylvania
cal and Experimental Hypnosis, 27, 85-102. School of Medicine. In addition to his work evaluating memory
Orne, M.T., & Whitehouse, W.G. (2000). Demand enhancement techniques for law enforcement, Dr. Dinges is an in-
characteristics. In A.E. Kazdin (Ed.), Encyclopedia of ternationally recognized expert in the biological limits of human
psychology. Washington, DC: American Psychological performance relative to sleep need and circadian biology. During
Association and Oxford University Press. the past 30 years his research has been continuously supported
Orne, M.T., Whitehouse, W.G., Dinges, D.F., & by grants from many Federal agencies, including the National
Orne, E.C. (1988). Reconstructing memory through Institutes of Health and the Department of Defense. He is a mem-
hypnosis: Forensic and clinical implications. In H.M. ber of the NIH Council, and he currently serves as Team Lead for the Neurobehavioral
Pettinati (Ed.), Hypnosis and memory (pp. 21-63). New and Psychosocial Factors area of the national Space Biomedical Research Institute. He
York: Guilford Press. has been the recipient of numerous awards, including the 2004 Decade of Behavior
Payne, D.G. (1987). Hypermnesia and reminiscence Research Award from the American Psychological Association, and the 2007 NASA
in recall: A historical and empirical review. Psychologi- Distinguished Public Service Medal.
cal Bulletin, 101, 5-28.

(800) 592-1399 Winter 2008 THE FORENSIC EXAMINER 75


Order Today!

The CFP is an advanced credential that recongnizes additional


training and expertise for forensic physicians. ACFEI has elevated
standards through education, basic and advanced training.
The CFP designation will provide a mechanism for measuring
scientific standards and procedures required to perform thorough
forensic medical investigations and proper consultation.
Awarded “The Most Innovative Training Program for 2008”
The World Head of Family Sokeship Council (the world’s largest and
most prestigious grandmasters martial arts organization)
BECOME A CERTIFIED FORENSIC PHYSICIAN TODAY!

www.homelandcombatives.com
www.acfei.com • (800) 592-1399 Call Today to Purchase Your Copy at a Special Introductory Price (800) 592-1399

Attn: Chaplains
Benefits
• Membership in • Opportunities
the American to join a strong,
Psychotherapy unified group of

ONLINE JOURNAL-LEARNING CEs! Association.


• Membership
fellow chaplains
to address is-
https://members.acfei.com/_catalog.php sues concerning
with a Certified
your field.
in Homeland
The American College of Security level • Free one-year
Forensic Examiners (AC- one, CHS-I. subscriptions
to The Forensic
FEI) is now offering FREE • One-year mem- Examiner, Annals
CE credits to all members in bership with
of the American
Certified in
good standing. To receive Psychotherapy
Homeland Se-
free credits, simply read an Association, and
curity National
Inside Home-
Examiner CE article and Emergency Man-
land Security.
take the online examination. agement Team.
Only online exams qualify
for this free offer.
CALL TOLL FREE (800) 592-1399
The Academy of Certified Chaplains is a community of chaplains who passion-
ately serve their country in every aspect of daily life in such settings as hospitals,
police stations, fire departments, schools, and elsewhere. Their mission is to pro-
vide a unified front for devotion, education, and training within the area of chap-
laincy and to provide a voice for the dedicated chaplains of this nation.
www.americanpsychotherapy.com/acc.

76 THE FORENSIC EXAMINER Winter 2008 www.acfei.com


CE ARTICLE 4: Corrupted DVDs: An Emerging Forensics Problem ... (pages 78–83)

ATTENTION ACFEI MEMBERS: Journal-Learning CEs are now FREE when taken online. Visit www.acfei.com.

TO RECEIVE CE CREDIT FOR THIS ARTICLE CE ACCREDITATIONS FOR THIS ARTICLE


In order to receive one CE credit, each participant is required to This article is approved by the following for continuing education credit:
1. Read the continuing education article.
2. Complete the exam by circling the chosen answer for each question. Complete the evaluation form. (ACFEI) The American College of Forensic Examiners International provides this continuing education credit
3. Mail or fax the completed form, along with the $15 payment for each CE exam taken to: for Diplomates.
ACFEI, 2750 East Sunshine, Springfield, MO 65804. Or Fax to: 417-881-4702. Or go online to
www.acfei.com and take the test for FREE.

For each exam passed with a grade of 70% or above, a certificate of completion for 1.0 continuing educa-
tion credit will be mailed. Please allow at least 2 weeks to receive your certificate. The participants who do
not pass the exam are notified and will have a second opportunity to complete the exam. Any questions,
grievances or comments can be directed to the CE Department at (800) 592-1399, fax (417) 881-4702,
or e-mail: cedept@acfei.com. Continuing education credits for participation in this activity may not apply to-
ward license renewal in all states. It is the responsibility of each participant to verify the requirements of his/her
state licensing board(s). Continuing education activities printed in the journals will not be issued any refund.

LEARNING OBJECTIVES KEY WORDS: defective, DVD, CD, editing, format


After studying this article, participants should be better able to do the following:
TARGET AUDIENCE: forensic consultants, law officers, attor-
neys, computer forensics consultants, court officials
1. Identify the formats of DVDs and list their differences.
2. Name the characteristics of a defective DVD.
3. Explain how corrupted DVDs may be excluded as reliable digital evidence. PROGRAM LEVEL: update

DISCLOSURE: The author operates a polygraph business.


PREREQUISITES: none

ABSTRACT
With technology increasing, so is the number of formats of a DVD, which when produced on a home computer results in defective DVDs. DVDs are normally derived from some form of digital tape
media and the tape media are sometimes not totally devoid of any defects. One problem in particular is the lag of audio and video synchronization, which could be corrupted on DV tape and may be con-
taminated during playback. Forensically, DVDs and their different formats must be analyzed with more effective data recovery software to remain admissible as reliable tape evidence.

POST CE TEST QUESTIONS (Answer the following questions after reading the article)
4. What is the primary audio coding for DVDs?
1. What is the most popular format of DVD today? a. WAV
a. DVD-RW b. CDA
b. DVD-R c. MP3
c. DVD-RAM d. QuickTime
d. DVD+R
5. What are the primary codecs employed in DVD production?
2. What are characteristics of a bad DVD? a. Real Audio
a. Lip sync problems b. Real Video
b. Missing frames c. Sorenson
c. Continuous video d. MPEG-2
d. Correct timing and sync

3. What are the contributing factors of poor audio/video sync problems? 6. The best cable to use when transferring audio and video data to a DVD:
a. Damaged or defective DVD disks a. Composite
b. Use of internal capture card b. Component
c. Use of external capture card c. IEEE 1394-Firewire
d. Optimized hard drive d. S-Video

EVALUATION: Circle one (1=Poor 2=Below Average 3=Average 4=Above Average 5=Excellent) PAYMENT INFORMATION: $15 per test (FREE ONLINE)
If you require special accommodations to participate in accordance with Name: State License #:
the Americans with Disabilities Act, please contact the CE Department at
Phone Number: Member ID #:
(800)-592-1399.
Address: City:
1. Information was relevant and applicable. 12345
2. Learning objective 1 was met. 12345 State: Zip: E-mail:
3. Learning objective 2 was met. 12345 Credit Card #
4. Learning objective 3 was met. 12345
5. You were satisfied with the article. 12345 Circle one: check enclosed MasterCard Visa American Express
6. ADA instructions were adequate. 12345
7. The author’s knowledge, expertise, and clarity were appropriate. 12345 Name on card: Exp. Date:
8. Article was fair, balanced, and free of commercial bias. 12345 Signature Date
9. The article was appropriate to your education, experience, and 12345
licensure level. Statement of completion: I attest to having completed the CE activity. Please send the completed form, along with your
10. Instructional materials were useful. 12345 payment of $15 for each test taken. Fax: (417) 881-4702, or mail the forms to ACFEI Continuing Education, 2750 E.
Sunshine, Springfield, MO 65804. If you have questions, please call (417) 881-3818 or toll free at (800) 592-1399.

(800) 592-1399 Winter 2008 THE FORENSIC EXAMINER 77


CE Article: (ACFEI) 1 CE credit for this article

CORRUPTED

DVDs:
An Emerging Forensic Problem That May Constitute Untrustworthy Evidence

By Steve Cain, MFS,


FACFEI, DABRE, ith technology increasing, so is the number of formats of a DVD, which when
DABLEE produced on a home computer results in defective DVDs. DVDs are normally
derived from some form of digital tape media, and the tape media are some-
times not totally devoid of any defects. One problem in particular is the lag of audio and
video synchronization, which could be corrupted on DV tape and may be contaminated
during playback. Forensically, DVDs and their different formats must be analyzed with
more effective data recovery software to remain admissible as reliable tape evidence.

There has been an increasingly larger amount of country codes that preclude nationwide playback
submitted DVDs as evidence both to litigation capability, copy protection issues, and out-of-sync
firms and ultimately to forensic labs. Quite often audio and video components of a DVD. There
the submitter from the law firm provides a DVD also are incompatible DVD disks that cannot be
that is obviously corrupted and contains visible played back on different DVD recorders and im-
artifacts such as color banding, blockiness, blur- proper usage of DVD authoring systems that to-
riness, missing detail, and other suspicious visual gether result in corrupted DVDs’ features, which
events that are not consistent with a normal DVD. would add to their untrustworthiness as forensic
As individuals are increasingly creating their own evidence.
DVDs (using their home computer and inappro- Modern day DVDs hold about two hours of
priate DVD software and burner hardware), there high-quality video, but in early 2002, Japanese
is increasing corruption and degradation on sub- DVD manufacturers adjusted the nature of their
mitted DVDs. Corrupted CDs made on defective playback laser beam, which had a narrower focus,
hardware and software can result in unreliable evi- and expanded the DVD capacity from 4.7 GB to
dence (audio or video). This was documented in 27 GB. Double-sided disks will hold about 50 GBs
an earlier published paper (Cain, 2004). of storage capability. Unfortunately, the blue laser
This paper will attempt to document the more drives are not automatically backward-compatible
fundamental causes and factors for poor DVD with DVD drives, and manufacturers will have to
production and what forensic artifacts are nor- develop a new type of playback system for these
mally associated with defective DVD manufac- larger DVDs.
turing. Attention will also be focused on poor- DVD is data-compressed technology that essen-
ly made DVD-Videos and the disadvantages of tially matches broadcast quality, but normally plays
DVD, especially concerning different manufac- back at a standard DVD rate of MPEG-2 Video
turer recording and playback units, regional or (Motion Expert Group No. 2).

78 THE FORENSIC EXAMINER Winter 2008 www.acfei.com


E
BLE
DA
,
BRE
DA
,
EI
CF
FA
,
FS
, M
CAIN
BY STEVE

(800) 592-1399 Winter 2008 THE FORENSIC EXAMINER 79


Unfortunately, DVDs have become more com-
plex as the authoring tools improve, so there are
more engineering flaws within the DVD player
mechanism to include firmware upgrades in both
the software and hardware. Problems can also exist
during playback because of damaged or defective
disks, and defective players—more than 100 dif-
ferent DVD players—that are unable to play back
certain types of DVDs. (Taylor, 2004)

Different DVD Formats


As of 2005, there were 144 possible variations of
the DVD format, which produced 24 different
physical format variations. The first standard DVD
format was DVD-R which stands for DVD record-
able. The DVD-R can hold 4.7 GB on each side
of the disk for a total of 9.4 GB of data on a dou-
ble-sided disk. DVD-R subsequently became one
of the most popular formats because you could re-
cord a disk that had been used in a standard DVD
player. On the rewritable side, the standard is called
DVD-RW. These disks can also store 4.7 GB, but
unfortunately not all DVD players can read DVD-
RWs. Two more recent DVD standards including
DVDR and DVDRW have become available and
are cheaper to manufacture and may or may not be
playable on stand alone DVD players or computer
drives. There are also approximately a dozen new
DVD hybrids that combine features on one or more
of the earlier formats. Despite the many differences
between writable DVD formats, they do have simi-
lar capabilities and perform a similar job recording
data. One of the primary physical incompatibilities
between the DVD recording formats is that some
are designed for video, one for audio data, and one
for “streaming” such as from a camcorder or a digi-
tal video receiver. None of these recording file for-
mats are readable by standard DVD video or audio
players. Synchronization problems are also found
where a “lip sync” breakdown occurs as the audio
lags somewhat behind the video.
These problems are often caused during film
production or editing or involve the improper
matching of audio and video tracks and the DVD
encoding-authoring process (Taylor, 2006).
Today it is estimated that there are more than
100 million DVD players or recorders within the
United States. To permit different DVD recorders
to copy DVD disks without copyright protection
violations, different hardware and software devices
were developed in the late 1990s. The foremost
piece of hardware is the IEEE1394/Firewire con-
nector, which transfers audio and video data be-
tween a multitude of DVD products including
computers and digital cameras (Taylor, 2006).
Much of the submitted DVD disks’ evidence
involves audio and video data that has not been
manufactured on an optimized computer or a DVD
s Author, Steve Cain
burner to include poor authoring software. A lack

80 THE FORENSIC EXAMINER Winter 2008 www.acfei.com


of DVD calibration tests exist that would ver- ture defects include “drop outs” or “band- 1. Improper sync in audio/video encoding
ify there are no defects on either the physical ing” (a sign of tape damage or head clog- or DVD-video formatting.
layer of the disk or within the content itself. ging). The most noticeable spatial artifacts 2. Poor sync during film production or ed-
The majority of evidence disks involve the are “feathering” or “mosquito noise,” which iting.
capture of analog or digital videotape infor- involve diagonally fine detail corruption. 3. Loose sync tolerance in the player.
mation, which may or may not be transferred These are compression-induced errors usu- 4. Delay in the external decoder receiver.
to a computer before the DVD is ultimately ally seen around sharp-edged text, and they Unfortunately, because DV was designed
manufactured. show up as pixel noise within eight pixels of as a consumer format, unlocked audio was
Whether the capture device is an analog the edge detail. Spatial quilting artifacts can allowed to exist as a cost-saving measure
or digital camcorder or a large scale CCTV also be observed on certain diagonal lines, where the internal audio clock is somewhat
surveillance system, it is essential the cap- typically long straight edges about 20 degrees imprecise and up to plus or minus 25 audio
tured analog and digital involves optimum off of the horizontal axis. samples can be written to tape in an impre-
data rates, resolution, frame rate, audio for- Sometimes it’s possible to notice the quilt- cise manner. Normally the unlocked audio
mat rate, and efficient capture cards for A/D ing artifacts while panning slowly across a should not drift for too long a period of time
conversion purposes. Dropped or missing particular scene. Motion blocking occurs before it does sync up with the video signal.
frames can occur when the capture computer when the two fields in a frame are too dif- The way the audio is recorded depends upon
is incapable of storing the video to disk data ferent for the DV codec to compress them the type of DVD burner employed in pro-
fast enough. The capture software often re- together. Motion blocking is best observed ducing the sound. The standard sampling
peats the last successfully captured frame on in a static scene shot through which objects rates are 32 KHz or two channels of 16 bit
a multitude of occasions, which can cause in- are moving or in the immediate vicinity of each of 48 KHz quality. The audio is inter-
terruptions in the video stream. Another im- the moving object. Dropouts may appear as leaved with the video and both are recorded
portant consideration for effective hard drive small signal block errors or as multiple blocks by the two rotating video heads. Along with
capture is to defragment the computer hard depending upon the nature of the degrada- the audio/video and other sub-code data,
drive through an appropriate Windows tool tion (Puhovski, 2000). there exists small guard bands in DV tape
such as disk defragmenter or disk optimizer production, which includes “header” infor-
(Ozer, 2003). Unlocked Audio or Poorly mation—basically a data packet and further
Synced Video with Audio includes SYMPTE time code, user bits, scene
Artifacts and Other There have been numerous reports of “lip markers, camera location, etc. DV tape also
Editing Annoyances sync” problems where the audio lags behind contains sufficient “header” data that would
DVDs are normally derived from some form the video or sometimes precedes the video. result in possible corruption during playback
of digital tape media including DV consumer There have been numerous problems report- if the sub-code data is improperly encoded on
digital mini DV tape or broadcast digital tape ed in the past with a variety of Pioneer and the tape (Puhovski, 2000). MLP is an auto
format such as DV PRO or DV CAM, D1, Sony models to include some PC decoder coding scheme using proprietary technology
D2, D3, D4, etc. These digital tape formats cards. The contributing factors to the sync developed by Meridian Audio and Associates.
are sometimes not totally devoid of any de- problems include: This lossy data reduction coding method op-
fects. There are a number erates by discarding information that is less
of artifacts and other pic- important to the listener. In effect, MLP
ture defects that are part of coding distributes the audio data more effi-
the digital recording world ciently into small data rates for transmission
and usually come in three and carries it in a protected environment
varieties, “mosquito noise,” along with its associated data. Previously
“quilting,” and “mo- the highest quality sound came from
tion blocking.” Linear PCM coding. As this for-
Other pic- mat does not require master-
ing or playback to be en-
tirely lossless, the MLP
system was developed
as a true lossless sys-
tem. The original
data is delivered
bit-for-bit at
playback. The
sound data is
therefore trans-
mitted in exactly
the same format as
the producer intend-
ed. No elaborate lis-
tening tests are required

(800) 592-1399 Winter 2008 THE FORENSIC EXAMINER 81


of the writable formats are fully compatible with
each other or even with existing drives and players.
Some later DVD versions that have a multi-logo are
guaranteed to read additional DVD formats while
a DVD multi-recorder can record using all three
formats. Those individuals experiencing problems
playing DVDs on their computer should get up-
dated software. Incompatible drivers are the biggest
cause of playback problems ranging from freeze-
up to error messages to region code problems. It is
recommended that you obtain tech support from
the Web site of your equipment manufacturer and
obtain the latest drivers for your graphics adaptor,
audio card, and DVD decoder.

to qualify this coding system, which guarantees de- Technical Aspects of DVD Production
livery of the original recording over a number of dif- Digital video is comprised of a series of dots called
ferent carriers and computing platforms. pixels—each holding a different color value. For
DVD, each grid of 720 squares by 578 squares
Displaying DVD Video represents a still image called a frame. It takes
Video clips are normally displayed in two differ- 30 frames to convey motion. For DVD audio,
ent methods: interlaced scan or progressive scan. the resulting sound is comprised of both inten-
Progressive scan is normally seen in computer mon- sity and frequency information. For DVD, these
itors and digital TVs. They display all horizontal numbers are “sampled” over 48,000 times a sec-
lines of the picture at one time. Interlaced scan ond, which is far superior than its analog counter-
normally uses standard television formats and dis- part. With digital signal processing, about 13%
plays only half of the horizontal lines at a time. It of the digital information before modulation is
relies on earlier TV technology to blend the two extra information, which is used for error correc-
different video fields together to create what appears tion. As the data is read from the disk, the error
to be a single picture. DVDs are designed to be correction data is separated and checked against
interlace-scan displays, but if the original video for- the remaining information. If it doesn’t match,
mat consists of a movie, it is highly recommended the error correction codecs are used to correct
that a progressive scan DVD player be purchased the situation.
that will play back the movie at the appropriate A codec is an abbreviation for compressor/de-com-
frame rate and resolution. pressor, or encode/decode, depending upon its purpose.
Essentially all video compression technology involves
DVD Production Basics the encoding of the initial compressed file and then
Essentially all DVD production involves three steps: subsequent decoding for remote viewing. Familiar
Content Creation, Menu Creation, and Linking codecs include MPEG-1, MPEG-2, MP-3, MPEG-
Menus to the appropriate content data. 4, Real audio, Real video, Sorenson, and Microsoft
After previewing the audio, video, and other con- Windows Media video and audio. Most codecs involve
tent materials to ensure they are being played back two different types of compression to achieve their tar-
as planned, it is necessary to compress the video files get data rates including intra-frame compression and
to MPEG-2 format in rendering the final DVD. inter-frame compression, which are techniques used
Computers do have the potential to produce to remove redundancies between frames.
better video than desktop video players by using
progressive display and higher scan rates, but many Digital Audio Coding
PC systems fail to reproduce the picture quality as DVD uses three different types of audio coding
a home player connected to a quality TV, where including MPEG-1, which has three compression
the PC decoder cards or the VGA cards must have techniques. MPEG-2 digital audio compression
a TV output. The quality of the video provided adds multiple channels and is backward compat-
by a PC depends in large part on the decoder’s ca- ible with MPEG-1 decoders. The primary audio
pabilities, the graphics card, the TV encoder chip, coding for DVD manufacturer is Dolby digital,
and other factors. In most cases a PC-based DVD which provides up to 5.1 channels of discrete audio
burner connected to a progressive-scan monitor or data. Dolby digital uses a frequency transform and
video projector instead of a standard TV will usu- groups the resulting values into frequency bands of
ally produce better quality video. varying widths to match the critical bands of hu-
There can be serious compatibility problems man hearing. More than 50 million Dolby digital
with recordable DVD formats. For example, many decoders are now situated throughout the United

82 THE FORENSIC EXAMINER Winter 2008 www.acfei.com


States compared to almost no MPEG-2 au- a similar make and model instrument for
dio decoders. playback of the questioned DVD recording.
As many of the corrupt or edited DVD play-
DVD Internet Resource Sites back anomalies are readily discernible dur-
Top DVD info sites include: ing a visual and aural review of the DVD,
1. Robert’s DVD (www.robertsdvd.com) suspicious record events may be identifiable
2. DVD PHD (www.dvdphd.com) through appropriate CD-DVD diagnostic
3.The Digital Bits (www.thedigitalbits. software. For example, CD-DVD Diagnostic
com) is a useful program that recovers data from
4. DVD File (www.dvdfile.com) unreadable, scratched, corrupt, or defective
5. DVD Review (www.dvdreview.com) CDs and DVDs. This particular program
6. Chad Fogg’s DVD Technical Notes (www. provides sector examinations, checks disk
tapeexpert.com/pdf/corrupteddvd.pdf ) memory, and checks point issues. It also lo-
7. DVD White papers from Sonic Solutions cates files that have been dropped from the
(www.tapeexpert.com/pdf/corrupteddvd.pdf ) directory structure, and the examination pro-
8. Tristan’s MPEG Pointers and Resources. cess is done automatically when errors are de-
(www.mpeg.org) tected in the directory structure.
A device manufactured by Data
DVD Testing/Verification Services Duplication Ltd. called FDA-100 is an au-
Testing/Verification Services include: tomatic forensic disk reader/analyzer, which References
1. CD Associates (714-733-8580) provides hardware solutions to corrupted Cain, S. (2004). CD copies of taped audio recording:
2. Intellikey Labs in Burbank, CA (818- DVDs. This device also analyzes disk and A poor forensic alternative for attorneys. The Forensic
953-9116) data information and allows for multiple ex- Examiner, 13(2), 38-42.
3. Sonic Solutions (www.sonic.com), which aminations without rescanning. It also dis- Cain, S. (2005). Forensic examination of CCTV digi-
provides diagnostic tools for Windows plays sectors and searches the disk surface tal VTR surveillance recording equipment. The Forensic
4. Testronic Labs in Burbank, CA (818- for corrupted data. It is able to recover the Examiner, 14(4), 47-49.
845-3223) original time stamp information when the EnCase Forensic, (2006). EnCase Forensic. Retrieved
5. WAMO, URL of www.ivyhill-wms. disk was mastered. October 14, 2008, from Guidance Software Web site:
com. An additional software program is provided http://www.guidancesoftware.com/products/ef_index.
EnCase Forensic gives you additional by InfinaDyne in the Chicago area and in- asp
software to conduct thorough and conclu- cludes a thorough examination of the DVD, Ozer, J. (2004). Guide to digital video. Indianapolis,
sive computer examinations. This system which may take anywhere from a few seconds IN: Wiley Publishing Inc.
provides information on the investiga- to hours depending on how the disk was re- Puhovski, N. (2000). Standing committee for new
tion and documentation of many in-house corded or if there were any errors returned technology. Retrieved from http://www.161.58.124.223/
crimes, including child pornography, do- while reading it. As errors are detected, a dia- archives/DV-Report
mestic violence, harassment, narcotics, etc. log is made to identify each suspicious sector. Taylor, J. (2004). Everything you ever wanted to
without omitting valuable computer evi- Analysis results are presented in three of the know about DVDs. Columbus, OH: Magraw-Hill-Tab
dence or waiting on back-logged labs. This more common formats for writing a DVD, Electronics.
system was developed by criminal forensic ISO-9660, Joliet, and UDF disks. InfinaDyne Taylor, J., Johnson, M., & Crawford, C. (2006). DVD
experts and is accepted by courts through- also provides periodic classes and is tailored for demystified. Columbus, OH: Magraw-Hill. n
out the world. EnCase allows investigators professionals in data recovery, forensics, and
to manage large volumes of computer evi- law enforcement.
dence by viewing all relevant files, and in- The need for more effective DVD data re- Earn CE Credit
cluding “deleted files,” file slack, and unal- covery and forensic analysis will continue and To earn CE credit, complete the exam for this
article on page 77 or complete the exam on-
located space. Once in, the files are created may affect the admissibility and reliability of line at www.acfei.com (select “Online CE”).
and the examiner can search and analyze DVD evidence disks (Cain, 2005).
multiple drives or other media simultane-
ously, using keyword searches, hash analy-
sis, file specific filters, and multiple filters. About the Author
(EnCase Forensics, 2006)
Steve Cain, MFS, MFSQD, DABFE, FACFEI, DABLEE,
Suggested Forensic DABRE, served 22 years as both a Special Agent and fo-
Examination Techniques rensic specialist with U.S. Secret Service and IRS National
A duplicate either on hard drive or on a suit- Crime Laboratories before founding Forensic Tape Analysis
able DVD should be made as soon as the (FTA) in Burlington, Wisconsin. A majority of his business
original evidence DVD has arrived. If play- concerns the identification of questioned voice recording or
back or compatibility problems arise during issues relating to audio or videotape recording authenticity
the playback, it may be necessary to obtain, or corrupted CDs and DVDs. He is a Fellow of the ACFEI.
if not the original DVD burner, then at least

(800) 592-1399 Winter 2008 THE FORENSIC EXAMINER 83


“What a sincere honor and privilege it
is to be a part of this professional
organization. I appreciate the quality
of the ACFEI Conferences and love
renewing friendships. Thank you for
the opportunity to present, and I look
forward to submitting an abstract for
2009.”
—Dianne T. Ditmer, MS, RN, DABFN, CFN

84 THE FORENSIC EXAMINER Winter 2008 www.acfei.com


rs,
membe
Dear
ional
2 0 0 8 Nat Diego
The
n c e i n San uccess!
e s
Confer cular rs
s a specta F E I membe
wa o f AC u t i -
eds bea
Hundr gether in a ce the
t o a n
came o adv scienc
e.
l s e t ting t e n s i c
fu for nd
rs of ’t atte
f rontie s who didn any
er m
Memb out on the ion-
misse d f o r pr fess g.
o
niti e s workin to
opportu h and net
wt n now
al gro s h o u ld pla ference.
Everyo
ne 9 Con
d t h e 200 to seeing
atten ard egas!
k forw Las V
We lo o t year in
ex
you n

“I’ve been a member of ACFEI for 2 years,


and I’ve attended 2 conferences. I find the
conferences most complete, very comprehensive,
and very informative. I enjoyed every minute of
this year’s conference, and I look forward to
the one in Las Vegas next year!”
—James Wilson, Jr.

(800) 592-1399 Winter 2008 THE FORENSIC EXAMINER 85


Falsely Accused

Falsely Accused: The Case of Ronald Gene Taylor


After his release, Taylor relocated to
Atlanta, Georgia, where his mother, Dorothy
Henderson, waited for him. “He always said
that he was innocent, and I kept the faith that
one day it would come through that it was
not him,” she said “… We have suffered so
much, but soon, now, when I can hug him
and know that he is free, we will have peace”
(Tolson & Khanna, 2007).
Taylor later married and started his own
lawn care business. In a phone interview
with an Associated Press reporter, Taylor
shared, “It’s been hard to get restarted. …
Little things, like filling out a job application
or renting an apartment are hard when you
have to say you are a convicted felon. Now,
I am officially a free man. I am so relieved”
(Associated Press, 2008a).
After 12 years in prison for the wrongful
conviction, Taylor may collect up to $50,000
s Barry Scheck, founder of the Innocence Project, played a key role in winning the exoneration of Ronald Gene Taylor. for each year he spent in prison—more than
KRT PHOTOGRAPH BY HILDA M. PEREZ/ORLANDO SENTINEL $600,000, should he decide not to sue the
Houston Police Department (Associated
It is now believed that on May 28, 1993, in her room during the rape, so she couldn’t Press, 2008b).
Roosevelt Carroll—a man with a history of see her attacker. She said that she did feel the A founder of the Innocence Project, Barry
violent sex crimes—raped a Houston woman shape of his facial features, neck, and body Scheck, is aware of the bigger implications
in her home. Carroll is currently in a Texas during the attack. Ten days later, she altered of Taylor’s case: “The Ronald Taylor case
prison, serving a 15-year sentence for failing her statement, adding details including the ought to be a galvanizing example of what
to register as a sex offender. He hasn’t been fact that the perpetrator was about 6 feet tall has to be done to correct the historical in-
tried for the rape and won’t be tried, because and that his ears “stuck out a little,” and while justices that have occurred because of the
he didn’t become a suspect until after the watching the line-up, she suddenly remem- Houston crime lab. … There has got to be
statute of limitations had passed. The police bered that her attacker was missing a front an expeditious way to go through these cases
stopped looking for him after they falsely ac- tooth—as was Taylor (“Ronald Gene”). and determine whether more testing is pos-
cused an innocent man for the crime Carroll Although the victim remembered the rapist sible and appropriate. That sort of vetting
is suspected of committing (Associated Press, ejaculating, the serologist reported that there requires expertise, competence and an in-
2008a). was no semen on the victim’s clothing or bed frastructure to do that” (Tolson & Khanna,
This man—Ronald Gene Taylor—was sheets—believing there was no biological 2007).
tried for the rape, found guilty, and served material to test. DNA testing was not con-
12 of the 60-year sentence before DNA evi- ducted, despite the requests of Taylor’s law- References
dence found that he was innocent. Taylor yers (“Ronald Gene”). Taylor was convicted Associated Press. (2008a, June 20). Ex-Texas inmate
was exonerated in January of this year, and and sentenced to 60 years—no one listened cleared in rape case officially pardoned. USA Today. Re-
his pardon was signed on June 13. He has when he insisted on his innocence. trieved September 16, 2008, from http://www.usatoday.
become yet another victim of a criminal jus- The Innocence Project began investigat- com/news/nation/2008-06-20-texas-inmate_N.htm
tice system, that, when it errs, both punishes ing the case in 1998 after a request from Associated Press. (2008b, June 20). Governor par-
the innocent and rewards the guilty. Taylor’s stepfather. During this same time, dons Houston man convicted of rape. ABC 7 News.
The location of Taylor’s residence, less than the Houston Police Department came into Retrieved September 16, 2008, from http://www.kvia.
a mile from the crime scene, put him under the limelight as a forensics scandal led to com/Global/story .asp?S=8532369&nav=
suspicion for the rape, and he was brought in questions about thousands of convictions. Ronald Gene Taylor. (2008, September 16). Innocence
to participate in a police line-up. The line-up Taylor’s case was among them, and, in 2006, Project. Retrieved September 16, 2008 from http://www.
was videotaped and shown to the victim at DNA testing was ordered on the evidence innocenceproject.org/Content/1124.php
her home. There were no attorneys or rep- from his case (Tolson & Khanna, 2007). The Tolson, M., & Khanna, R. (2007, October 4). Man
resentatives for Taylor present at her viewing new tests found biological material to sam- exonerated 14 years after rape conviction: Mix-up on
(“Ronald Gene,” 2008). ple, proved Taylor’s innocence, and pointed DNA deals HPD lab another blow. Houston Chronicle.
The victim identified Taylor as the rapist, to the guilt of Roosevelt Carroll, who would Retrieved September 16, 2008, from http://truthinjus-
although she reported that it had been dark never be tried (Tolson & Khanna). tice.org/ronald-taylor.htm n

86 THE FORENSIC EXAMINER Winter 2008 www.acfei.com


American College of Forensic Examiners International
2750 E. Sunshine
Springfield, MO 65804

To Register: Call Toll-Free (800) 592-1399 or visit www.acfei.com

S-ar putea să vă placă și