Documente Academic
Documente Profesional
Documente Cultură
Pen
of
the
Handwriting Study Gives
Powerful Insight Into the
Minds of Killers, Celebrities
Fateful
Decisions
Officers Often Must Make
Life-and-Death Decisions
in a Fraction of a Second
DVD
Destruction
Critical Evidence
Stored on DVDs
Could be in Danger
JOIN TODAY!
(800) 592-1399
www.acfei.com
Letter to the Editor
FORENSIC
The Official Peer-Reviewed Journal of The American College of Forensic Examiners
EXAMINER
VOLUME 17 • NUMBER 4 • Winter 2008
The American College of Forensic Examiners International (ACFEI) does not endorse, guarantee, or warrant the credentials, work, or opin-
®
ions of any individual member. Membership in ACFEI does not constitute the grant of a license or other licensing authority by or on behalf
of the organization as to a member’s qualifications, abilities, or expertise. The publications and activities of ACFEI are solely for informative
and educational purposes with respect to its members. The opinions and views expressed by the authors, publishers, or presenters are their
sole and separate views and opinions and do not necessarily reflect those of ACFEI, nor does ACFEI adopt such opinions or views as its own.
The American College of Forensic Examiners International disclaims and does not assume any responsibility or liability with respect to the
opinions, views, and factual statements of such authors, publishers, or presenters, nor with respect to any actions, qualifications, or represen-
tations of its members or subscriber’s efforts in connection with the application or use of any information, suggestions, or recommendations
made by ACFEI or any of its boards, committees, publications, resources, or activities thereof.
Feature Articles
How to Submit:
Whether you wish to submit an article for peer review, a fascinating case or forensic case profile, or
an article on a current issue in the field of forensics, send your writing electronically (either in the
40 body of an email or as an attachment) to editor@acfei.com. Or, send in your writing on a disc or
CD to Editor, Association Headquarters, 2750 E. Sunshine, Springfield, MO 65804.
12 ACFEI News
38 Book Reviews
34
FORENSIC EXAMINER ®
2008 Editorial Advisory Board
Publisher:
Louay Al-Alousi, MB, ChB, PhD, FRCPath, Philip Kaushall, PhD, DABFE, DABPS, FACFEI
Robert L. O’Block, MDiv, PhD, PsyD, DMin,
FRCP(Glasg), FACFEI, DMJPath, DABFM, Eric Kreuter, PhD, CPA, CMA, CFM, DABFA,
DD (Hon) (rloblock@aol.com) FACFEI
FFFFLM
Editor in Chief: Nicholas G. Apostolou, DBA, DABFA, CPA, Ronald G. Lanfranchi, DC, PhD, DABFE,
John Lechliter (editor@acfei.com) Cr.FA DABFM, DABLEE, CMI-IV, FACFEI
Larry Barksdale, BS, MA Richard Levenson, Jr., PsyD, DABFE, DABPS,
Executive Art Director: E. Robert Bertolli, OD, FACFEI, CHS-V, CMI-V FACFEI
Brandon Alms (brandon@acfei.com) Kenneth E. Blackstone, BA, MS, CFC, DABFE Monique Levermore, PhD, FACFEI, DABPS
David T. Boyd, DBA, CPA, CMA, CFM, Cr.FA Jonathon Lipman, PhD, FACFEI, DABFE,
Associate Editor: Jules Brayman, CPA, CVA, CFD, DABFA, DABPS, DABFM
Amber Ennis (amber@acfei.com) FACFEI Judith Logue, PhD, FACFEI, DABFSW, DABPS,
John Brick, PhD, MA, DABFE, DABFM, DABFE, DABFM
Assistant Editor: FACFEI Jennie Martin-Gall, CMI-I
Logan Forester (logan@acfei.com) Richard C. Brooks, PhD, CGFM, DABFE Mike Meacham, PhD, LCSW, DABFSW, FACFEI
Steve Cain, MFS, DABFE, DABRE, FACFEI , David Miller, DDS, FACFEI, DABFE, DABFM,
Advertising: MF-SQD, DABLEE DABFD
John Lechliter (john@acfei.com) Dennis L. Caputo, MS, DABFET, REM, CEP, John V. Nyfeler, CHS-III
(800) 592-1399, ext. 174 CHMM, QEP, FACFEI Jacques Ama Okonji, PhD, FACFEI, DABFE,
Donald Geoffrey Carter, PE, DABFET DABPS
David F. Ciampi, PhD, FACFEI, DABPS Norva Elaine Osborne, OD, CMI-III
Leanne Courtney, BSN, DABFN, DABFE Terrence O’Shaughnessy, DDS, FACFEI,
ACFEI Executive Advisory Board Larry Crumbley, PhD, CPA, DABFE, Cr.FA DABFD, DABFE, DABFM
Jean L. Curtit, BS, DC George Palermo, MD, FACFEI, DABFE,
Andrew Neal Dentino, MD, FACFEI, DABFE, DABFM
Chair: DABFM Ronald J. Panunto, PE, CFC
David E. Rosengard, RPh, MD, PhD, MPH, Francisco J. Diaz, MD Larry H. Pastor, MD, FACFEI, DABFE, DABFM
FACFEI, CMI-V, CHS-V, DABFE, DABFM, James A. DiGabriele, DPS, CPA, CFSA, DABFA, Theodore G. Phelps, CPA, DABFA
DABECI, FACA, FAPA, MTAPA, FAAIM Cr.FA, CVA, FACFEI Marc Rabinoff, EdD, FACFEI, DABFE, CFC
John Shelby DuPont Jr., DDS, DABFD Harold F. Risk, PhD, DABPS, FACFEI
Vice Chair: Scott Fairgrieve, Hons. BSc, MPhil, PhD, FAAFS Susan P. Robbins, PhD, LCSW, DABFSW
Edmund D. Fenton, DBA, CPA, CMA, Cr.FA Jane R. Rosen-Grandon, PhD, DABFC, FACFEI
Michael Fitting Karagiozis, DO, MBA, CMI-V Per Freitag, PhD, MD, FACFEI, DABFE, Douglas Ruben, PhD, FACFEI, DABFE,
DABFM DABFM, DABPS
John H. Bridges III, DSc (Hon), CHS-V, Nicholas Giardino, ScD, FACFEI, DABFE J. Bradley Sargent, CPA, CFS, Cr.FA, DABFA,
CHMM, CSHM, DABCHS, FACFEI David H. Glusman, CPA, DABFA, CFS, Cr.FA, FACFEI
Jamie J. Ferrell, BSN, RN, CFN, CMI-III FACFEI William Sawyer, PhD, FACFEI, DABFE,
Douglas E. Fountain, PhD, LCSW, DABFE, Karen L. Gold, PysD, FACFEI, DABPS DABFM
Ron Grassi, DC, MS, FACFEI, DABFM, DABFE Victoria Schiffler, RN, DABFN, FACFEI
DABFSW James Greenstone, EdD, JD, FACFEI, DABFE, John V. Scialli, MD, DABFE, DABFM
Raymond F. Hanbury, PhD, FACFEI, DABPS, DABFM, DABECI, CMI-I, CHS-III Howard A. Shaw, MD, DABFM, FACFEI
DABFE, CHS-III, ABPP Roy C. Grzesiak, PhD, PC Henry A. Spiller, MS, DABFE, FACFEI
Lee Heath, DABLEE, CHS-V Richard C. W. Hall, FACFEI, DABFM, DABFE, Marilyn Stagno, PsyD, DABFE, DABFM, DABPS
Brian L. Karasic, DMD, MScFin, FACFEI, MD, FAPA, FAPM, FACPsych Richard I. Sternberg, PhD, DABPS
DABFD, DABFM, DABFE Raymond F. Hanbury, PhD, ABPP, FACFEI, James R. Stone, MD, MBA, CHS-III, DABFE,
DABFE, DABPS, CHS-III DABFM, FACFEI
Michael G. Kessler, Cr.FA, CICA, FACFEI, James Hanley III, MD, DABFM, FACFEI Johann F. Szautner, PE, PLS, FACFEI, DABFET
DABFA, DABFE Nelson Hendler, MD, DABFM William A. Tobin, MA, DABFET, DABLEE,
Marilyn J. Nolan, MS, FACFEI, DABFC, David L. Holmes, EdD, FACFEI, DABFE, FACFEI
DABCIP DABPS Robert Tovar, BS, MA, DABFE, DABPS, CHS-III
Thomas J. Owen, BA, FACFEI, DABRE, Leo L. Holzenthal Jr., PE, DABFET, FACFEI Brett C. Trowbirdge, PhD, JD, DABPS, FACFEI
DABFE, CHS-V Linda Hopkins, PhD, CFC, DABPS, DABRE Jeff Victoroff, MD, DABFE, DABFM
Edward J. Hyman, PhD, FACFEI, DABFE, Patricia Ann Wallace, PhD, FACFEI, DABFE,
Vincent B. Van Hasselt, PhD, DABCIP, DABFM, DABPS DABFM, CFC
DABLEE, CFC Zafar M. Iqbal, PhD, FACFEI, DABFE, DABFM Raymond Webster, PhD, FACFEI, DABFE,
Ben Venktash, DABFET, DABFE, CHSP, REA, Nursine S. Jackson, MSN, RN, DABFN DABFM
FRSH(UK), FIET(UK) Paul Jerry, MA, DAPA, DABFC Dean A. Wideman, MSc, MBA, CFC, CMI-III,
Scott A. Johnson, MA, DABPS, DAACCE DABFE
The Forensic Examiner® (ISSN 1084-5569) is published quarterly by The American College of Forensic Examiners International, Inc. (ACFEI). Annual membership for a year in the
American College of Forensic Examiners International is $165. Abstracts of articles published in The Forensic Examiner® appear in National Criminal Justice Reference Service,
Cambridge Scientific Abstracts, Criminal Justice Abstracts, Gale Group Publishing’s InfoTrac Database, e-psyche database, and psycINFO database. Periodicals Postage Paid at
Springfield, Missouri, and additional mailing offices. © Copyright 2008 by the American College of Forensic Examiners International. All rights reserved. No part of this work can
be distributed or otherwise used without the express permission of the American College of Forensic Examiners International. The views expressed in The Forensic Examiner® are
those of the authors and may not reflect the official policies of the American College of Forensic Examiners International.
CONTACT US:
Publication, editorial, and advertising offices of ACFEI, 2750 East Sunshine Street, Springfield, MO 65804. Phone: (800) 592- 1399, Fax: (417) 881- 4702,
E-mail: editor@acfei.com. Subscription changes should be sent to ACFEI, 2750 East Sunshine, Springfield, MO 65804.
POSTMASTER:
Send address changes to American College of Forensic Examiners International, 2750 East Sunshine Street, Springfield, MO 65804.
Visit www.ChemInsight.org/fe
or call ACS at 800-227-5558 and ask for
ChemInsight for more information today!
Online Education Expert Offers Advice
The Forensic Examiner® recently interviewed course needs to impart or develop in the stu- loadable pod-cast lectures to simulated, online
Nanette Philibert, PhD, who has served as an dent; the learning styles of the audience; and classroom environments with avatar professors
online education consultant for the American available technology. and students will become the norm.
College of Forensic Examiners Institute. What makes a good online training Who benefits the most from online
Dr. Philibert, a faculty member of the Robert course? training courses?
W. Plaster School of Business Administration A good course is one that facilitates the ac- The time-challenged professional, the orga-
at Missouri Southern State University, is an quisition of the desired outcomes. Simply nization trying to minimize travel expenses,
expert on online education. put, a good course is one that helps students and the individual seeking development for
learn what they need to learn. Additionally, professional growth and promotion all benefit
What issues have you addressed in your a good course is one that maintains currency from online educational opportunities.
consulting work with the ACFEI? in the field of knowledge, which is constantly What should students look for in online
I met with the ACFEI staff to discuss pro- updated to include new trends and issues in training programs?
cess improvements for their training devel- its particular field of knowledge. Both students and organizations should seek af-
opment efforts. What are the/ advantages/disadvantages fordable learning opportunities with proven out-
What have been the trends for online of online courses compared to live class- comes. They should invest their time and money
training courses? room settings? in courses that provide the learning opportunities
The trend in online education is to offer multi- Individuals differ in their learning styles. and results needed for their specific, needed pro-
media-based courses designed to address the Online courses aren’t for everyone—some fessional growth and development. They should
learning needs of time-challenged professionals. individuals learn better in a classroom set- look for well-developed, up-to-date, cutting-edge
Online training has taken the old correspon- ting. Also, not everyone is computer literate programs that utilize technology that assist the stu-
dence school approach and replaced it with rich, or has access to technology. dents in the learning process but don’t dominate
interactive, responsive learning forums, which What will the future hold for online it. They should review the course goals and objec-
are comparable to brick-and-mortar venues. education? tives to ensure that the course is designed to meet
What is important to consider when cre- The future is wide open for online education. their needs. They should seek recommendations
ating online training courses? Technology is cheaper and more accessible than from colleagues in their field who have found suc-
The knowledge, skills, and abilities that the it was 10 years ago. Everything from down- cessful experiences via online training. n
NOW
AVAILA Forensic nurses are often the
BL
ONLIN E: bridge that spans medicine and
VERSIOE
N justice. They tend to needs of
victims and help gather and protect
the evidence that can lead to a
conviction and ultimate justice.
ATTENTION ACFEI MEMBERS: Journal-Learning CEs are now FREE when taken online. Visit www.acfei.com.
For each exam passed with a grade of 70% or above, a certificate of completion for 1.0 continuing educa-
tion credit will be mailed. Please allow at least 2 weeks to receive your certificate. The participants who do
not pass the exam are notified and will have a second opportunity to complete the exam. Any questions,
grievances or comments can be directed to the CE Department at (800) 592-1399, fax (417) 881-4702, or
e-mail: cedept@acfei.com. Continuing education credits for participation in this activity may not apply toward
license renewal in all states. It is the responsibility of each participant to verify the requirements of his/her state
licensing board(s). Continuing education activities printed in the journals will not be issued any refund.
PREREQUISITES: none
ABSTRACT
Extremist groups use the Internet for many reasons: to disseminate propaganda and spread disinformation; to recruit and train volunteers; to solicit funds from sympathizers; to gather data from open
sources; to plan and coordinate attacks; to maintain communications—many of them encrypted—between members of a single terrorist group as well as with members of other terrorist groups; to pro-
vide tutorials on building and planting explosive devices; and to publicize their acts of violence and ultimately enhance the perceived image of their great strength. This article uses examples gathered from
public sources to examine how the Internet is used to facilitate the radicalization of extremist groups, and it offers options for implementing an effective response.
POST CE TEST QUESTIONS (Answer the following questions after reading the article)
1 Many of the benefits provided by the Internet can be used by terrorists to support their agendas and expand 4 Which of the following statements is not true?
radicalization. Which of the following is not one of those benefits? a. Over the past decade, the number of terrorist Web sites has increased significantly
a. Fast transmission of multimedia information b. Pentagon analysts monitor terrorist Web sites, including those of more than 40 designated foreign terrorist
b. Lack of censorship or regulation organizations
c. Expensive development and maintenance of a Web presence c. Radicalizing messages and operational instructions can be communicated through e-mail as well as via Web
d. Ease of access sites
e. Large number of widely dispersed users d. To date, most Islamic hacking operations have been aimed at Web sites maintained by the U.S. government
and Web sites associated with U.S. defense and financial systems
2 Terrorists use the Internet to: e. The cyber attacks launched so far have been well-organized, but ineffective
a. Disseminate training manuals and tutorials and distribute video and audio broadcasts produced by terrorist-
run media production companies 5 Citizen Dialogues, the Digital Outreach Team, and the Counterterrorism Communications Center are part of
b. Recruit volunteers to participate in electronic attacks and coordinate cyber attacks the:
c. Distribute encryption software and solicit funds from sympathizers a. U.S. Department of State
d. Publicize beheadings and other atrocities b. U.S. Department of Justice
e. All of the above c. U.S. Department of the Treasury
d. U.S. Department of Homeland Security
3 Extremist messages promoted in video games are targeted to youths as young as: e. U.S. Department of Defense
a. 2 years of age
b. 7 years of age 5 Which of the following would not be an effective way to counter terrorist information operations?
c. 12 years of age a. Implement online multimedia information campaigns to combat extremist propaganda
d. 15 years of age b. Help allied governments launch their online multimedia counter-narratives to combat violent extremism
e. 25 years of age c. Actively encourage cross-cultural dialog
d. Launch Denial of Service attacks to shut down all terrorist Web sites and demand that terrorists stop encrypt-
ing their communications
e. Promote interagency initiatives that are designed to undermine ideological support for terrorism
EVALUATION: Circle one (1=Poor 2=Below Average 3=Average 4=Above Average 5=Excellent) PAYMENT INFORMATION: $15 per test (FREE ONLINE)
If you require special accommodations to participate in accordance with the Name: State License #:
Americans with Disabilities Act, please contact the CE Department at (800)
Phone Number: Member ID #:
592-1399.
Address: City:
1. Information was relevant and applicable. 12345
2. Learning objective 1 was met. 12345 State: Zip: E-mail:
3. Learning objective 2 was met. 12345 Credit Card #
4. Learning objective 3 was met. 12345
5. You were satisfied with the article. 12345 Circle one: check enclosed MasterCard Visa American Express
6. ADA instructions were adequate. 12345
7. The author’s knowledge, expertise, and clarity were appropriate. 12345 Name on card: Exp. Date:
8. Article was fair, balanced, and free of commercial bias. 12345 Signature Date
9. The article was appropriate to your education, experience, and 12345
licensure level. Statement of completion: I attest to having completed the CE activity. Please send the completed form, along with your
10. Instructional materials were useful. 12345 payment of $15 for each test taken. Fax: (417) 881-4702, or mail the forms to ACFEI Continuing Education, 2750 E.
Sunshine, Springfield, MO 65804. If you have questions, please call (417) 881-3818 or toll free at (800) 592-1399.
xtremist groups use the Internet for many reasons: to disseminate propaganda and spread dis-
information; to recruit and train volunteers; to solicit funds from sympathizers; to gather data
from open sources; to plan and coordinate attacks; to maintain communications—many of
them encrypted—between members of a single terrorist group as well as with members of other
terrorist groups; to provide tutorials on building and planting explosive devices; and to publicize their
acts of violence and ultimately enhance the perceived image of their great strength. This article uses
examples gathered from public sources to examine how the Internet is used to facilitate the radicaliza-
tion of extremist groups, and offers options for implementing an effective response.
“The Internet has dramatically expanded the ability of Radical groups to recruit, train,
motivate, and coordinate terrorists over vast distances without direct contact.”
Disseminating propaganda All messages are carefully worded and translated into
and recruiting supporters targeted languages, including Arabic, Turkish, and
Over the past decade, the number of terrorist Russian (Porth, 2006).
Web sites has grown from less than 100 to more In a statement made by Susan Collins
than 5,000 (Kaplan, 2006). According to the (R-Maine):
Assistant Secretary of Defense for International
Security Affairs, the sites are being used to cre- The Internet has dramatically expanded the
ate speeches, graphics, training manuals, slides, ability of radical groups to recruit, train, moti-
blogs, and Web casts, all for propaganda pur- vate, and coordinate terrorists over vast distanc-
poses (Porth, 2006). The sites offer tutorials on es without direct contact. Terrorist can consult
building bombs, sneaking into Iraq, setting im- Web sites to learn techniques for shooting down
provised explosive devices (IEDs), and killing helicopters, watch videos of hostage beheadings,
U.S. soldiers, and are used to host videos and read letters left by suicide bombers, or listen to
messages to expand recruitment and fundrais- messages from militant leaders. And, even if
ing efforts. Some even offer video games where there were no Web sites, the Internet would still
users as young as 7 years of age can pretend to allow radicalizing messages as well as operational
be warriors killing U.S. soldiers (Kaplan, 2006). instructions to be passed along by e-mail. (U.S.
Pentagon analysts monitor terrorist Web sites, Senate Committee on Homeland Security &
including those of designated foreign terrorist Governmental Affairs, 2007).
organizations (Table 1) and their sympathizers
and supporters (Kaplan, 2006). Gathering data and planning attacks
Extremist groups routinely use the Internet to Last year, British military intelligence disclosed that
spread misinformation and false rumors, hoping to terrorists were using aerial footage displayed by
reach disaffected youth, and to enlist sympathizers and Google Earth to plan their attacks against British
financial supporters. Video and audio broadcasts are bases in Basra. In raids conducted on the homes
produced by terrorist-run media production companies, of insurgents in early January 2007, the military
and Islamic extremist messages are promoted in video found printouts of satellite photographs showing
W :
NO ABLE
AIL E
AV ONLINION
S
VER
®
Log on to www.acfei.com/crfa for details.
Call (800) 592-1399 to talk to member services.
Act now to start enjoying the benefits of certification.
Register Today! Call Toll-free (800) 592-1399 or visit www.acfei.com/ssi for more details.
CMI
CERTIFIED MEDICAL INVESTIGATOR ,
CMI PROGRAM
A B C D E
F G H I J
K L M N O
P Q R S
N. ACFEI men’s polo shirt (tan, sizes: S to XXXL)—$48 Credit Card Number Exp. Date
O. ACFEI women’s dress shirt (blue, sizes: S to XXL)—$55
P. ACFEI men’s dress shirt (gray, sizes: S to XXXL; XLT & XXLT)—$55 Signature
Q. ACFEI lapel pin—$5
Shipping Costs:
R. ACFEI jotterpad—$5 1 item: $7.50, 2 items: $8.75, 3 items: $10.25, 4 items: $11.75, 5 items: $13.25, 6 items:
S. ACFEI padfolio—$20 $14.75, 7 items: $16.50, 8 items: $18.25, 9 items: $20.00, 10 items:$21.75, Add $1.75 for
each additional item. Overnight: additional $25.00. International orders: additional $25.00
ÓÇxäÊ
°Ê-ÕÃ
i]Ê-«À}wi`]Ê"ÊÈxnä{ÊUÊ*
i\Ênää®Ê{ÓÎÇÎÇÊUÊ>Ý\Ê{£Ç®Ênn£{ÇäÓÊUÊÜÜÜ°>Vvi°V
They found two recent newspapers in the been trying to break up with him and he’d himself rethinking his notions about motive,
hollow, apparently used as seats on the wet been fiercely resistant. noting the tragedy in someone’s life of one
grass the previous evening, and a cluster of Arrested for murder, he went to trial. false step, fueled by overwhelming emotional
a dozen burnt matches, as if someone was There, Fanning offered a confession, show- intensity. “Murder is murder … yet there are
searching for something in the dark. Two ing that whatever violence had occurred had cases in which one feels that a line of demar-
expensive fountain pens were also found, been outside his consciousness—he had sim- cation may be drawn.”
one of them missing its clip. Not far away ply reacted from desperation. In fact, a medi- Superintendent George Lawlor had a stel-
was a purse, stashed under a bush, which cal examination indicated a physical anomaly lar career, working long hours for the Garda
provided the victim’s name, Kay Boyne, a that his defense used to buttress his apparent and incorporating every scientific innovation
38-year-old widow. Inside was a desperate insanity: Fanning’s heart and liver were trans- about which he learned. He offered advice
love letter from someone named John, and posed—each was where the other should have freely to others who asked, and when he died
her boyfriend turned out to be John Fanning been. Two medical experts testified that this in January 1961, he was consulting on a case
(who claimed to be her unofficial fiancée). congenital defect was associated with men- for an inspector general from India. Despite
Fanning admitted that he had been with tal deficiency. The prosecutor had a difficult his apparent obscurity, Lawlor deserves rec-
Kay the evening before, but he said that a car- time proving there had been an intent to kill ognition as an early role model for an entire
load of her friends had picked her up, leaving and the defense countered that since Fanning police force and an eminent advocate for the
him to find his own way home. He claimed worked as a chemist’s assistant, he could eas- use of science in law enforcement.
he stopped at a pub and had then found a ily have poisoned Kay if he had intended her
ride with a friend. Nevertheless, questions to harm. The homicide appeared to have been References
his coworkers turned up an interesting item: a tragic over-reaction. Reddy, T. (1991). The murder file: An Irish detective’s
Fanning had recently confided to one woman After an hour and a half of deliberation, casebook. Dublin: Gill & Macmillan.
that he might commit suicide. His drink at the jury found Fanning guilty but recom- Reddy, T. (2005). Murder will out. Dublin: Gill &
the pub also proved to have been fabricated, mended mercy, as there was no evidence of Macmillan.
but physical evidence tying him to the mur- malice aforethought. He received death, but Thorwald, J. (1964). The century of the detective. New
der was lacking. this was later commuted to life. Lawlor found York: Harcourt, Brace & World. n
Then, through interviews, it became clear
that both pens from the murder site had re-
cently been in Fanning’s possession: the broken
one belonged to him (he had the clip) and he About the Author
had borrowed the other pen from a co-work- Katherine Ramsland, PhD, CMI-V, has published 33
er the day before the murder. A recognizable books, including True Stories of CSI and Beating the
pen missing from Boyne’s handbag was found Devil’s Game: A History of Forensic Science and Criminal
in a pocket of Fanning’s shirt, hanging at his Investigation. Dr. Ramsland is an associate professor of fo-
house. When Fanning was searched, detec- rensic psychology at DeSales University in Pennsylvania and
tives found a number of recent scratches on has been a member of the American College of Forensic
several areas of his body, as if from a struggle, Examiners since 1998.
as well as bloodstains on his trousers. Then a
stash of letters indicated that Kay Boyne had
Imagine that America had no system of post- We will stigmatize everyone who doesn’t meet
secondary education, and you were a member of the goal. We will call the goal a “BA.”
a task force assigned to create one from scratch. You would conclude that your colleague
One of your colleagues submits this proposal: was cruel, not to say insane. But that’s the
First, we will set up a single goal to represent system we have in place.
educational success, which will take 4 years to Finding a better way should be easy. The
achieve no matter what is being taught. We BA acquired its current inflated status by ac-
will attach an economic reward to it that sel- cident. Advanced skills for people with brains
dom has anything to do with what has been really did get more valuable over the course
learned. We will urge large numbers of people of the twentieth century, but the acquisition
who do not possess adequate ability to try to of those skills got conflated with the existing
achieve the goal, wait until they have spent a lot system of colleges, which had evolved the BA
of time and money, and then deny it to them. for completely different purposes.
1 2 3 4
4 Easy Ways ONLINE FAX PHONE MAIL
www.acfei.com (417) 881-4702 (800) 592-1399 2750 E. Sunshine
to Register: Springfield, MO 65804
Address
Special Services: ❑ Please check here if you require special accommodations to participate in accordance with the Americans with Disabilities Act. Attach a
written description of your needs.
Leann Long
Contact John Lechliter at (800) 592-1399 for
Editor in Chief
more information.
(800)Association
592-1399 Headquarters: Office: (417) 881-3818 Winter 2008 THE FORENSIC EXAMINER 37
2750 East Sunshine Direct: (417) 823-2517
Springfield, MO 65804
Books by ACFEI Members
and gleaning useful information about suspected cled name; final n creates a barrier be-
tween self and the world.
Handwriting analysis is a comparatively quick analyses are admittedly brief and are not intended
method of peering into a subject’s mind and is es- to be exhaustive studies. However, additional pro-
s Although still self-protective (partially
pecially useful in detecting devious and potentially files that are interactive and more in-depth are avail- encircled name) Jackson has declared him-
dangerous or risky behavior. The following samples able at http://www.trialrun.com/id4u/profiles.html. self a star by the final burst of fireworks.
illustrate this method of predicting and tracking be- Handwriting, being closely tied to one’s brain
havior, revealing how the writer/suspect was feel- and emotional responses, illustrates a person’s state
ing at the time of the writing, as well as showing of mind at the moment pen is placed to paper.
long-term behavioral patterns. As moods and circumstances change, so the writ-
This dynamic method was developed and test- ing will change, often subtly, but sometimes more
ed over a period of 10 years by the authors of dramatically. This calls for the evaluation of more
this article, graphologist Kimon Iannetta and Dr. than one sample of writing for added accuracy
James Craine, head of Neuropsychology Services and insight, whenever possible. This also permits
Department at Hawaii State the analyst to consider the writing
Hospital in Kaneohe, Hawaii. over a period of time, which can
The basics regarding risk evalua- add further clues to the investiga-
tion through handwriting are pre- tion process or contribute to bet-
sented here. However, readers are ter understanding of crimes after
encouraged to consider Iannetta’s the fact.
Danger Between the Lines, a re-
source manual pertaining specifi- Michael Jackson
cally to the evaluation of risk and The handwriting of Michael
violence potential that resulted Jackson is clearly reflective of ex-
from the Hawaii study. To help treme changes over many years.
flesh out a useful profile of any Among the obvious benefits of
subject, it is also recommended s Peculiar mood shift. graphological assessment is that s Eccentric, exaggerated signature at the
that readers use the full set of 124 Forensic Profiling the subject need not be present when the exami- time of marriage to Lisa Marie Presley.
Cards (some of which are illustrated here), which nation takes place and, in fact, does not even have Taken from the marriage license, the unat-
tractive signature looks like a jellyfish, re-
include all of the danger signs as well as the facili- to participate in any testing procedure. There is, vealing his need to hide or conceal, and
tators and inhibitors to dangerousness identified therefore, little chance that the material to be ex- covers much of the page, showing egotism
and feelings of grandiosity.
by the study. Also recommended is Hayes’ Between amined will be consciously or deliberately altered
the Lines, which covers a full range of graphological in hopes of creating a certain result. Drawbacks
material outside the criminal context. include limited samples of writing—perhaps writ-
Profiles of subjects presented herein are designed ten under adverse conditions—or the evaluation of
to illustrate specific handwriting indicators and how written material produced after a crime has already
they can manifest in individuals’ behavior. The been committed. The competence of the analyst
Broken letters
The writing of criminals sometimes contains bro- s Sirhan Sirhan, who assassinated Robert F. Kennedy in 1968.
(800) 592-1399
423-9737 Fall 2008 THE FORENSIC EXAMINER 43
Winter
tenced but released from prison after serving only
19 months. In 1983 he beat, raped and strangled a
young woman in a savage attack, and struck again
15 months later, leaving another victim strangled.
The seemingly innocuous words of Kipp’s writing
sample might appeal to some young lady seeking
the perfect, well established partner, but the slow-
ly written, artificial handwriting screams danger.
Although the writing is clearly designed to impress,
the bizarre lower loops show contorted, angry views
and attitudes related to sexual fantasy. The personal
pronoun I is angular and hooked, revealing intense
anger closely connected to his self-image. Clubbed
writing strokes that plunge heavily downward show
brutality and relentless urges, especially when com-
bined with heavy pressure, an indication of deep-
seated emotions and lasting thoughts and feelings.
s Psychological Implications: The personal
pronoun ‘I’ is directly connected to the in-
These claws are evident in the handwriting of Odd, disconnected formations (for example, the f ’s)
dividual’s self-image. Distortions of this let- Beth Friedman, a 54-year-old Florida school reveal forbidden thoughts and desires, all carefully
ter suggest in one’s self-concept. The writer teacher convicted of having improper sexu- hidden by near perfect midzone letter forms and
has an odd, unique, or distorted self-image
(according to the individual shape, size, al relations with one of her male students over an exactly straight baseline which together consti-
etc. of the letter) and may exhibit compul- an extended period of time. Underhanded be- tute a façade constructed to make an impression.
sive behavior patterns. This may indicate
talents and unique abilities (when accom- havior is suggested in the claw-like lower loops Kipp has few social boundaries and, given his lack
panied by positive indicators) or patho- that are repeated in the personal pronoun of social skills, his victims were generally taken by
logical obsessions (when accompanied by
negative indications). Philosophies and/
I. As noted above, distortion of this letter indicates surprise in places such as dark parking lots. His
or behavior may be altered to serve the a poorly developed sense of self, particularly when murders were especially brutal.
writer’s own emotional needs. combined with the childish nature of her writing
indicative of a mentality that is not much more Eric Rudolph, Olympic Park Bomber
advanced than that of her students. Wide distanc- Eric Rudolph, who committed a series of bomb-
es between words portray emotional isolation and ings across the southern United States in the 1990s
difficulty forming intimate relations. that killed three and injured at least 150 others, also
writes distorted lower zone structures. Rudolph was
connected with the Christian Identity movement: a
militant, racist, and anti-Semitic organization. He
declared that his bombings were part of a guerril-
la campaign against abortion, which he described
as “the homosexual agenda.” The distorted lower
loops of Rudolph’s writing pull strongly to the left,
representative of the past and, more specifically,
s A mugshot of Charles Ng mother. The script is highly connected, which
denotes one whose thoughts are compulsive and
Martin James Kipp, rapist & killer unbroken—once started on an idea or plan, there
Distorted lower zone formations are seen in the was no turning back. Rigidly braced initial strokes
writing of rapist and serial killer Martin James reveal deep-seated resentment—unresolved anger
Kipp, above. Kipp was the son of a prostitute who from the distant past—while ground-in dots (af-
abandoned him at the age of 22 months. He was ter “planet” and “mother”) denote explosive anger.
adopted by relatives and raised by an alcoholic “fa- Down-slanted cross bars such as those in “task,”
ther” who often beat him in public. Kipp joined “most,” and “significant” show a need to domi-
the Marine Corps, where he won divisional hon- nate and control while retraced upper loops sug-
ors in boxing. In 1981 he was accused of abducting gest restrictive, narrow morals. The smallness of
and raping a woman and, rather than face charges, the writing lends focus and concentration, as do
s A mugshot of Eric Rudolph went AWOL. He was eventually captured and sen- the relatively well placed i dots. Disappointment or
ten said she “loved them to death”) and an elderly probably felt there was no other way out than to
person who had been placed in her care. Her kill- eliminate her children from her troubled life.
ing method of choice was, as she called it, “smo-
theration” in response to voices chanting, “Kill the
baby” after which she simply reported that the child
had “stopped breathing.” Distorted ethics (twisted
upper zone forms) and odd ideas (bizarre letters
such as g in “everything” and “anything”) are seen
along with poor self-worth (disrupted personal
pronoun I, low t crosses, and primarily midzone
script). Ground-in dots denote anger and obsessive
thinking. Essentially midzone writing with unde- O.J. Simpson
s A mugshot of Aileen Wuornos
veloped upper loops implies a limited outlook and Orenthal J. Simpson, known as “O.J.” or “The Juice”
no sense of ultimate consequences. is one of the most famous running backs in American
football history, and was winner of the Heisman
trophy. In 1995, Simpson was acquitted in crimi-
nal court of the double murder of his wife, Nicole
Brown Simpson, and Ronald Goldman. In 1997, he
was found liable for their deaths in civil court, but
to date has not paid the judgment. In 2007, he was
arrested and charged with making an armed attack
Susan Smith, who drowned her two sons for an incident involving his efforts to recover sports
Susan Smith seat-belted her two young sons memorabilia he regarded as “stolen.” A jury convicted
into her car and pushed it into a lake where they Simpson on all charges and he was awaiting sentenc-
drowned, after which she claimed they were kid- ing at the time of this article’s publication. s A mugshot of Christine Falling
The CHS program has earned its reputation as the premier group dedicated
to providing certification, training, and continuing education to profession-
als across the nation who are committed to improving homeland security. We
boast a total commitment to our country’s safety, an extraordinary knowledge
base, and an in-place organizational structure that delivers the highest-quali-
ty certification and continuing education opportunities in homeland security.
ATTENTION ACFEI MEMBERS: Journal-Learning CEs are now FREE when taken online. Visit www.acfei.com.
For each exam passed with a grade of 70% or above, a certificate of completion for 1.0 continuing educa-
tion credit will be mailed. Please allow at least 2 weeks to receive your certificate. The participants who do
not pass the exam are notified and will have a second opportunity to complete the exam. Any questions,
grievances or comments can be directed to the CE Department at (800) 592-1399, fax (417) 881-4702, or
e-mail: cedept@acfei.com. Continuing education credits for participation in this activity may not apply toward
license renewal in all states. It is the responsibility of each participant to verify the requirements of his/her state
licensing board(s). Continuing education activities printed in the journals will not be issued any refund.
ABSTRACT
In recent research, we found that eyewitness memory and interpretation of crime scenes were less effective than anticipated. However, conditions which enhanced the feature-intensive processing of crime
scenes tended to facilitate or improve both memory and interpretation. In the present study, abilities to evaluate potential hazard and appropriate police response to armed assailants were addressed under
idealized laboratory conditions. Using methods established in previous work, and in consultation with experienced police field training officers, we developed scenes of situations involving armed assailants
confronting victims. Using these scenes, it was shown that the majority of civilian respondents demonstrated very low capacity for distinguishing weapons from innocuous objects in context, even under
ideal viewing conditions. However, respondents were in general personally willing to fire on what appeared to be an armed perpetrator, even if that “perpetrator” was holding a power tool rather than an
actual weapon. In contrast, the vast majority of respondents was unwilling to accept a shooting response to the same situations on the part of police, even when the situations in question were rated by
experienced police officers as absolutely requiring a shooting response to prevent loss of life. Results are considered in terms of the Gestalt/Feature-Intensive processing theory of cognition, and in terms
of the ramifications of these findings for jury and public perceptions of officer involved shootings.
POST CE TEST QUESTIONS (Answer the following questions after reading the article)
1. Bartlett showed that mental representations: 4. About ____% of college-student respondents felt that police officers, in situations crafted to
a. Remain static, but are nearly perfect records of reality. require a shooting response 100% of the time, should fire.
b. Remain static, but may exhibit diminished accuracy. a. 100%
c. Are significantly reconfigured and changed with time. b. 84-87%
d. May be relied on to represent reality under conditions of stress. c. 11%
d. 0%
2. We would anticipate the ability to distinguish weapons from other objects to:
a. Improve under real-world, dynamic field conditions. 5. What reasons did respondents give for suggesting that officers should not fire?
b. Deteriorate under real-world, dynamic field conditions. a. Elaborate systems of rules of engagement.
c. Be identical across all conditions. b. Need to assume or understand perpetrator motives.
d. Be related to honesty and integrity on the part of police officers. c. If they did fire, they should shoot an arm or leg to reduce harm.
d. All of these.
3. In a controlled experiment, under idealized circumstances, college-student respondents on
average confused a power screwdriver with a pistol:
a. Most of the time.
b. Less than 50% of the time.
c. Approximately 11% of the time.
d. Virtually never.
EVALUATION: Circle one (1=Poor 2=Below Average 3=Average 4=Above Average 5=Excellent) PAYMENT INFORMATION: $15 per test (FREE ONLINE)
If you require special accommodations to participate in accordance with the Name: State License #:
Americans with Disabilities Act, please contact the CE Department at (800)
Phone Number: Member ID #:
592-1399.
Address: City:
1. Information was relevant and applicable. 12345
2. Learning objective 1 was met. 12345 State: Zip: E-mail:
3. Learning objective 2 was met. 12345 Credit Card #
4. Learning objective 3 was met. 12345
5. You were satisfied with the article. 12345 Circle one: check enclosed MasterCard Visa American Express
6. ADA instructions were adequate. 12345
7. The author’s knowledge, expertise, and clarity were appropriate. 12345 Name on card: Exp. Date:
8. Article was fair, balanced, and free of commercial bias. 12345 Signature Date
9. The article was appropriate to your education, experience, and 12345
licensure level. Statement of completion: I attest to having completed the CE activity. Please send the completed form, along with your
10. Instructional materials were useful. 12345 payment of $15 for each test taken. Fax: (417) 881-4702, or mail the forms to ACFEI Continuing Education, 2750 E.
Sunshine, Springfield, MO 65804. If you have questions, please call (417) 881-3818 or toll free at (800) 592-1399.
Shoot NOT
To or to
SHOOT:
Response and
By Matthew J. Sharps and Adam B. Hess
n recent research, we found that eyewitness memory and interpretation of crime scenes were less
effective than anticipated. However, conditions that enhanced the feature-intensive processing
of crime scenes tended to facilitate or improve both memory and interpretation. In the present
Interpretation study, abilities to evaluate potential hazard and appropriate police response to armed assailants
were addressed under idealized laboratory conditions. Using methods established in previous
work, and in consultation with experienced police field training officers, we developed scenes of
of Response situations involving armed assailants confronting victims. Using these scenes, it was shown that
the majority of civilian respondents demonstrated very low capacity for distinguishing weapons
to Armed from innocuous objects in context, even under ideal viewing conditions. However, respondents were
in general personally willing to fire on what appeared to be an armed perpetrator, even if that “perpe-
trator” held a power tool rather than an actual weapon. In contrast, the vast majority of respondents
Assailants was unwilling to accept a shooting response to the same situations on the part of police, even when
the situations in question were rated by experienced police officers as absolutely requiring a shooting
response to prevent loss of life. Results are considered in terms of the Gestalt/Feature-Intensive pro-
cessing theory of cognition, and in terms of the ramifications of these findings for jury and public per-
ceptions of officer involved shootings.
When a police officer confronts an armed sus- under conditions of darkness or semidarkness. In
pect, the officer’s choice of response must be made addition, as is also the case in eyewitness identifi-
swiftly. Frequently, such decisions must be made cation situations, a given suspect’s weapon may be
in less than a second. During that time, many occluded or partially occluded by suspect cloth-
factors in the scene must be evaluated: the sus- ing, posture, or structures behind which the sus-
pect’s motions; where the weapon is aimed; the pect may have taken cover (e.g., Narby, Cutler, &
presence of other people, including other poten- Penrod, 1996; Sharps, Barber, Stahl, & Villegas,
tial suspects, and whether or not they are in the 2003). All of these factors contribute to the dif-
officer’s probable field of fire; and other potential ficulty inherent in the rapid and pervasive cogni-
sources of hazard, to self, to others, and to the sus- tive processing involved.
pect, in the immediate environment (e.g., Gelles, In view of these extensive processing demands, er-
2006; Montejano, 2004; Tietjen, 2004; Moore, rors in perception or cognitive processing are likely to
2006). This type of rapid cognitive processing is be relatively frequent. In situations involving deadly
frequently required of law enforcement officers force, such errors may of course result in tragedy.
ATTENTION ACFEI MEMBERS: Journal-Learning CEs are now FREE when taken online. Visit www.acfei.com.
For each exam passed with a grade of 70% or above, a certificate of completion for 1.0 continuing educa-
tion credit will be mailed. Please allow at least 2 weeks to receive your certificate. The participants who do
not pass the exam are notified and will have a second opportunity to complete the exam. Any questions,
grievances or comments can be directed to the CE Department at (800) 592-1399, fax (417) 881-4702, or
e-mail: cedept@acfei.com. Continuing education credits for participation in this activity may not apply toward
license renewal in all states. It is the responsibility of each participant to verify the requirements of his/her state
licensing board(s). Continuing education activities printed in the journals will not be issued any refund.
ABSTRACT
This article examines multiple sources of suggestive bias that may taint evidence obtained from forensic interviews with eyewitnesses and victims of crime. We present several research paradigms used to
identify what constitutes undue suggestion, as well as the manner in which suggestive cues can be communicated and accepted by the witness as fact. Procedures that have been adopted as potential law
enforcement tools to enhance eyewitness recall, such as forensic hypnosis and the cognitive interview, are submitted to special scrutiny and relevant cautions are raised. Finally, we provide specific recom-
mendations to minimize suggestion in the investigative interview that are intended to expand upon current “good practice” guidelines.
POST CE TEST QUESTIONS (Answer the following questions after reading the article)
1. The term, “demand characteristics”: 4. According to the article, the current version of the cognitive interview:
a. refers to fundamental biological motives (e.g., hunger, thirst, threat, etc.) a. remains vulnerable to sources of suggestive bias in its use of imaginative and
b. refers to one of the mnemonic components of the cognitive interview visualization strategies
c. refers to social cues that may be used to infer another person’s intentions b. has little in common with the forensic use hypnosis
d. refers to the ritual used by a hypnotist to induce the condition of hypnosis c. has been adopted and utilized faithfully, according to protocol, by law
enforcement agencies worldwide
2. Which of the following would probably operate least as a demand d. None of the above
characteristic in a law enforcement investigative situation?
a. a polygraph instrument 5. Among the recommendations for minimizing suggestive bias during
b. a detective’s badge investigative interviews, the authors endorse:
c. videotaping equipment a. developing a positive rapport and establishing a collaborative, rather than a
d. a conference room table confrontative or antagonistic, relationship with the witness.
b. encouraging straightforward repeated attempts by the witness to try hard to
3. The notion that hypnosis can be used to aid the retrieval of accurate memories: remember.
a. was suggested by the early clinical work of Breuer and Freud. c. avoidance of any instructions to imagine or visualize events relevant to the
b. was generally discredited by researchers specializing in hypnosis and memory during the crime or the witness’s personal experiences.
latter decades of the 20th century. d. electronic recording (preferably audiovisual) of the full proceedings of the
c. remains the basis of controversy concerning the reliability of hypnotically elicited testimony investigative interview.
in U.S. courts and their counterparts in other countries. e. All of the above
d. All of the above
EVALUATION: Circle one (1=Poor 2=Below Average 3=Average 4=Above Average 5=Excellent) PAYMENT INFORMATION: $15 per test (FREE ONLINE)
If you require special accommodations to participate in accordance with the Name: State License #:
Americans with Disabilities Act, please contact the CE Department at (800)
Phone Number: Member ID #:
592-1399.
Address: City:
1. Information was relevant and applicable. 12345
2. Learning objective 1 was met. 12345 State: Zip: E-mail:
3. Learning objective 2 was met. 12345 Credit Card #
4. Learning objective 3 was met. 12345
5. You were satisfied with the article. 12345 Circle one: check enclosed MasterCard Visa American Express
6. ADA instructions were adequate. 12345
7. The author’s knowledge, expertise, and clarity were appropriate. 12345 Name on card: Exp. Date:
8. Article was fair, balanced, and free of commercial bias. 12345 Signature Date
9. The article was appropriate to your education, experience, and 12345
licensure level. Statement of completion: I attest to having completed the CE activity. Please send the completed form, along with your
10. Instructional materials were useful. 12345 payment of $15 for each test taken. Fax: (417) 881-4702, or mail the forms to ACFEI Continuing Education, 2750 E.
Sunshine, Springfield, MO 65804. If you have questions, please call (417) 881-3818 or toll free at (800) 592-1399.
his article examines multiple sources of suggestive bias that may taint evidence obtained
from forensic interviews with eyewitnesses and victims of crime. We present several re-
search paradigms used to identify what constitutes undue suggestion, as well as the manner
in which suggestive cues can be communicated and accepted by the witness as fact. Procedures
that have been adopted as potential law enforcement tools to enhance eyewitness recall, such as
forensic hypnosis and the cognitive interview, are submitted to special scrutiny and relevant cau-
tions are raised. Finally, we provide specific recommendations to minimize suggestion in the in-
vestigative interview that are intended to expand upon current “good practice” guidelines.
One cornerstone of our justice system is the eye- Unfortunately, the complications of suggestive bias
witness report. Unfortunately, the substance and on the products of human memory are not so neatly
reliability of the report, conveyed in interviews resolved.
and later in court, may be a direct function of The theoretical perspective advanced in this article
the amount of undue suggestion that arises dur- developed from several decades of our laboratory’s
ing the investigative interview process. Therefore, research into a variety of investigative techniques.
any scientific data that might establish a base for One of these, hypnosis, receives special attention
more careful investigative in- because its hallmark feature is
terviewing in order to avoid an increase in responsiveness
undue bias is of considerable to suggestion on the part of the
relevance to law enforcement hypnotized individual. Such
and the legal community. situationally enhanced suggest-
Throughout this article we ibility, coupled with one’s native
attempt to provide evidence capacity to respond to hypno-
of the pervasive nature of sug- sis, allows hypnotized persons
gestion in everyday experience. to modify their subjective ex-
Even in medical science, sug- periences in accordance with
gestion is taken into account the hypnotist’s instructions.
when evaluating the effective- This can lead to often remark-
ness of new treatments. The able positive outcomes, such as
classic “double-blind, place- the suppression of pain during
bo-controlled study” was de- childbirth or dental procedures,
veloped to isolate the specific but it is also responsible for in-
benefits of the treatment itself stances of memory contamina-
from those benefits that accrue tion and belief in false recollec-
from a hopeful patient’s confi- tions, which can pose a serious
dence in his or her doctor as threat to the very foundation of
well as from the doctor’s belief the justice system.
in the efficacy of the prescribed treatment. A simple, In order to identify what is unique about hyp-
elegant research strategy emerged: The treatment, nosis, scientists long ago recognized the need to
say a medication in the form of a pink pill, would understand the role of suggestion in normal, ev-
be administered to a random half of the patients eryday human interactions. Among the impor-
enrolled in the study, while the remaining patients tant lessons learned from this effort is that sug-
received an identically appearing pink pill that was gestion is ubiquitous in the social environment
actually inert (i.e., placebo). Not even the prescrib- and that it doesn’t need to be intentional to have
ing doctor knows whether the patient is receiving an impact. Even in the absence of explicit cues
the actual medication or placebo. Therefore, the provided by the parties, people attempt intuitive-
expectations of patients and their doctors for im- ly to infer the motives behind another’s words or
provement of symptoms would be roughly equiva- behavior. Martin Orne, who founded our labo-
lent regardless of whether the patients were receiving ratory in the 1960s, coined the term “demand
the actual treatment or the placebo. This essentially characteristics” to describe the aggregate of ele-
nullifies the influence of optimism, hope, and sug- ments in a social situation that provide informa-
gestion on the outcome, thereby permitting a clearer tion a person can use to draw inferences about
picture of the intrinsic efficacy of the medication. someone else’s intentions.
www.homelandcombatives.com
www.acfei.com • (800) 592-1399 Call Today to Purchase Your Copy at a Special Introductory Price (800) 592-1399
Attn: Chaplains
Benefits
• Membership in • Opportunities
the American to join a strong,
Psychotherapy unified group of
ATTENTION ACFEI MEMBERS: Journal-Learning CEs are now FREE when taken online. Visit www.acfei.com.
For each exam passed with a grade of 70% or above, a certificate of completion for 1.0 continuing educa-
tion credit will be mailed. Please allow at least 2 weeks to receive your certificate. The participants who do
not pass the exam are notified and will have a second opportunity to complete the exam. Any questions,
grievances or comments can be directed to the CE Department at (800) 592-1399, fax (417) 881-4702,
or e-mail: cedept@acfei.com. Continuing education credits for participation in this activity may not apply to-
ward license renewal in all states. It is the responsibility of each participant to verify the requirements of his/her
state licensing board(s). Continuing education activities printed in the journals will not be issued any refund.
ABSTRACT
With technology increasing, so is the number of formats of a DVD, which when produced on a home computer results in defective DVDs. DVDs are normally derived from some form of digital tape
media and the tape media are sometimes not totally devoid of any defects. One problem in particular is the lag of audio and video synchronization, which could be corrupted on DV tape and may be con-
taminated during playback. Forensically, DVDs and their different formats must be analyzed with more effective data recovery software to remain admissible as reliable tape evidence.
POST CE TEST QUESTIONS (Answer the following questions after reading the article)
4. What is the primary audio coding for DVDs?
1. What is the most popular format of DVD today? a. WAV
a. DVD-RW b. CDA
b. DVD-R c. MP3
c. DVD-RAM d. QuickTime
d. DVD+R
5. What are the primary codecs employed in DVD production?
2. What are characteristics of a bad DVD? a. Real Audio
a. Lip sync problems b. Real Video
b. Missing frames c. Sorenson
c. Continuous video d. MPEG-2
d. Correct timing and sync
3. What are the contributing factors of poor audio/video sync problems? 6. The best cable to use when transferring audio and video data to a DVD:
a. Damaged or defective DVD disks a. Composite
b. Use of internal capture card b. Component
c. Use of external capture card c. IEEE 1394-Firewire
d. Optimized hard drive d. S-Video
EVALUATION: Circle one (1=Poor 2=Below Average 3=Average 4=Above Average 5=Excellent) PAYMENT INFORMATION: $15 per test (FREE ONLINE)
If you require special accommodations to participate in accordance with Name: State License #:
the Americans with Disabilities Act, please contact the CE Department at
Phone Number: Member ID #:
(800)-592-1399.
Address: City:
1. Information was relevant and applicable. 12345
2. Learning objective 1 was met. 12345 State: Zip: E-mail:
3. Learning objective 2 was met. 12345 Credit Card #
4. Learning objective 3 was met. 12345
5. You were satisfied with the article. 12345 Circle one: check enclosed MasterCard Visa American Express
6. ADA instructions were adequate. 12345
7. The author’s knowledge, expertise, and clarity were appropriate. 12345 Name on card: Exp. Date:
8. Article was fair, balanced, and free of commercial bias. 12345 Signature Date
9. The article was appropriate to your education, experience, and 12345
licensure level. Statement of completion: I attest to having completed the CE activity. Please send the completed form, along with your
10. Instructional materials were useful. 12345 payment of $15 for each test taken. Fax: (417) 881-4702, or mail the forms to ACFEI Continuing Education, 2750 E.
Sunshine, Springfield, MO 65804. If you have questions, please call (417) 881-3818 or toll free at (800) 592-1399.
CORRUPTED
DVDs:
An Emerging Forensic Problem That May Constitute Untrustworthy Evidence
There has been an increasingly larger amount of country codes that preclude nationwide playback
submitted DVDs as evidence both to litigation capability, copy protection issues, and out-of-sync
firms and ultimately to forensic labs. Quite often audio and video components of a DVD. There
the submitter from the law firm provides a DVD also are incompatible DVD disks that cannot be
that is obviously corrupted and contains visible played back on different DVD recorders and im-
artifacts such as color banding, blockiness, blur- proper usage of DVD authoring systems that to-
riness, missing detail, and other suspicious visual gether result in corrupted DVDs’ features, which
events that are not consistent with a normal DVD. would add to their untrustworthiness as forensic
As individuals are increasingly creating their own evidence.
DVDs (using their home computer and inappro- Modern day DVDs hold about two hours of
priate DVD software and burner hardware), there high-quality video, but in early 2002, Japanese
is increasing corruption and degradation on sub- DVD manufacturers adjusted the nature of their
mitted DVDs. Corrupted CDs made on defective playback laser beam, which had a narrower focus,
hardware and software can result in unreliable evi- and expanded the DVD capacity from 4.7 GB to
dence (audio or video). This was documented in 27 GB. Double-sided disks will hold about 50 GBs
an earlier published paper (Cain, 2004). of storage capability. Unfortunately, the blue laser
This paper will attempt to document the more drives are not automatically backward-compatible
fundamental causes and factors for poor DVD with DVD drives, and manufacturers will have to
production and what forensic artifacts are nor- develop a new type of playback system for these
mally associated with defective DVD manufac- larger DVDs.
turing. Attention will also be focused on poor- DVD is data-compressed technology that essen-
ly made DVD-Videos and the disadvantages of tially matches broadcast quality, but normally plays
DVD, especially concerning different manufac- back at a standard DVD rate of MPEG-2 Video
turer recording and playback units, regional or (Motion Expert Group No. 2).
to qualify this coding system, which guarantees de- Technical Aspects of DVD Production
livery of the original recording over a number of dif- Digital video is comprised of a series of dots called
ferent carriers and computing platforms. pixels—each holding a different color value. For
DVD, each grid of 720 squares by 578 squares
Displaying DVD Video represents a still image called a frame. It takes
Video clips are normally displayed in two differ- 30 frames to convey motion. For DVD audio,
ent methods: interlaced scan or progressive scan. the resulting sound is comprised of both inten-
Progressive scan is normally seen in computer mon- sity and frequency information. For DVD, these
itors and digital TVs. They display all horizontal numbers are “sampled” over 48,000 times a sec-
lines of the picture at one time. Interlaced scan ond, which is far superior than its analog counter-
normally uses standard television formats and dis- part. With digital signal processing, about 13%
plays only half of the horizontal lines at a time. It of the digital information before modulation is
relies on earlier TV technology to blend the two extra information, which is used for error correc-
different video fields together to create what appears tion. As the data is read from the disk, the error
to be a single picture. DVDs are designed to be correction data is separated and checked against
interlace-scan displays, but if the original video for- the remaining information. If it doesn’t match,
mat consists of a movie, it is highly recommended the error correction codecs are used to correct
that a progressive scan DVD player be purchased the situation.
that will play back the movie at the appropriate A codec is an abbreviation for compressor/de-com-
frame rate and resolution. pressor, or encode/decode, depending upon its purpose.
Essentially all video compression technology involves
DVD Production Basics the encoding of the initial compressed file and then
Essentially all DVD production involves three steps: subsequent decoding for remote viewing. Familiar
Content Creation, Menu Creation, and Linking codecs include MPEG-1, MPEG-2, MP-3, MPEG-
Menus to the appropriate content data. 4, Real audio, Real video, Sorenson, and Microsoft
After previewing the audio, video, and other con- Windows Media video and audio. Most codecs involve
tent materials to ensure they are being played back two different types of compression to achieve their tar-
as planned, it is necessary to compress the video files get data rates including intra-frame compression and
to MPEG-2 format in rendering the final DVD. inter-frame compression, which are techniques used
Computers do have the potential to produce to remove redundancies between frames.
better video than desktop video players by using
progressive display and higher scan rates, but many Digital Audio Coding
PC systems fail to reproduce the picture quality as DVD uses three different types of audio coding
a home player connected to a quality TV, where including MPEG-1, which has three compression
the PC decoder cards or the VGA cards must have techniques. MPEG-2 digital audio compression
a TV output. The quality of the video provided adds multiple channels and is backward compat-
by a PC depends in large part on the decoder’s ca- ible with MPEG-1 decoders. The primary audio
pabilities, the graphics card, the TV encoder chip, coding for DVD manufacturer is Dolby digital,
and other factors. In most cases a PC-based DVD which provides up to 5.1 channels of discrete audio
burner connected to a progressive-scan monitor or data. Dolby digital uses a frequency transform and
video projector instead of a standard TV will usu- groups the resulting values into frequency bands of
ally produce better quality video. varying widths to match the critical bands of hu-
There can be serious compatibility problems man hearing. More than 50 million Dolby digital
with recordable DVD formats. For example, many decoders are now situated throughout the United