Académique Documents
Professionnel Documents
Culture Documents
Crime www.forensicmag.com
Scene
Staging
A Mysterious
Police Death
INSIDE:
U The Black Dahlia
U Encrypted Cell Phones
U Forensic Palynology
2016 Promega Corporation. All rights reserved. 27572897
Vol. 13 | No. 2 JUNE 2016
Editorial Director
6
Bea Riemschneider
Analyzing Unknown Human Remains: bea.riemschneider@advantagemedia.com
Cold Missing Persons Case
Bruce Budowle, Ph.D., and Angie Ambers, Ph.D. Editor
Sean Allocca
8
sean.allocca@advantagemedia.com
The Dangers of Hidden Apps on Forensic Investigations
Cindy Murphy ADVERTISING/SALES
NEW ENGLAND
10
Crime Scene Staging: A Mysterious Police Death CJ Chirico
Vernon Geberth 973-920-7112
cj.chirico@advantagemedia.com
14
One-Step Fluorescent Fuming MID-ATLANTIC/MIDWEST
Arlene Nelson
Jeremy Malinge, Ph.D.
973-920-7189
15
arlene.nelson@advantagemedia.com
DNA CONNECTION
MIDWEST
Utilizing DNA Evidence Decades after Pitchfork Jolly Patel
Chris Asplen 973-920-7743
16
jolly.patel@advantagemedia.com
Forensic Palynology: Tracking the Near Invisible WEST
Seth Augenstein Cindi Richardson
973-920-7680
18
FORENSIC PATHOLOGIST: EXPERT WITNESS cindi.richardson@advantagemedia.com
Mind Your Manners: Where Death Certication Ends SOUTHWEST
and Prevention Begins Bill Little
973-920-7688
Judy Melinek
bill.little@advantagemedia.com
22
800-290-5460 or Reprints@theYGSgroup.com
DIGITAL FORENSIC INSIDER
Encrypted Cell Phones CUSTOMER SERVICE
John J. Barbara For subscription related matters contact Omeda
Customer Service: 847-559-7560 or abm@omeda.com
24 WHO SAYS?
Crime Scene Vehicles: Choosing the Right Vehicle for the Job
Dick Warrington and Owen McDonnell
List Rentals
Infogroup Targeting Solutions
Senior Account Manager, Bart Piccirillo,
402-836-6283; bart.piccirillo@infogroup.com
Senior Account Manager, Michael Costantino
Printed in USA: Every attempt is made to ensure the accuracy of the information contained herein, however Advantage Business Media and its employees Beth Campbell
cannot accept responsibility for the correctness of information supplied, advertisements, or opinions expressed. Copyright 2016 Advantage Business CCO
Media. All rights reserved.
T
he White House recently reminded us that our nd the resources to mount full investigations. Those
rape-kit problem is going nowhere fast. Four expenditures can cost much more than the testing it-
hundred thousand kits and counting stacked self. Ramit Plushnick-Masti, of the Houston Forensic
on evidence-room shelves are potentially hoarding Science Center, said nding the funding was a major
powerful DNA evidence that could lock up dangerous stumbling block. Youre not only providing for the
sexual predators nationwide. Sounds straightforward cost of testing the kits, she said, but the cost of hav-
enoughpay to test the kits, enter the DNA proles ing the resources internally to take cases to the next
into CODIS, and investigate the hits. But, like most level and thats where there was a lot of expense.
things in life, the problem is in the funding. What we do know is that testing the backlog keeps
The Obama administration recently announced criminals off the streets. A court in Ohio sentenced
a grant program to fund testing and improve inves- serial rapist Dwayne Wilson to life last year. Al-
tigations. Last years Sexual Assault Kit Initiative ready a known pedophile, Wilson was convicted of
awarded $41 million to 20 juris- seven counts of rape after his DNA
dictions, which was a well-needed The real cost matched rape kit evidence relating
shot in the arm. The 2016 SAKI to assaults on four women in Cleve-
program will award $45 million. is in the legwork. land in the 1990s. The judge called
But as the years pass and the Wilson the worst of the worst. The
problem continues to grow, how much will Americas most shocking part of the story: when Wilson was
rape-kit problem cost? initially indicted, he was just days away from being
Last year, the City of Houston announced a $6 released from prison, where he was serving ve years
million initiative to test all its kits dating back to for sexual battery. Evidence from a decades-old rape
the 1980s. The city only paid $453 per kit, which is kit prevented a convicted pedophile from walking
a basement-bottom price (most experts estimate the back onto the same streets where he physically forced
cost of testing a kit at over $1,000). At that price, women and young girls into his car and raped them at
testing the nations backlog would cost around $180 knifepoint.
million, well within the governments $600 million While we dont know what the ultimate cost of
authorized in the Debbie Smith Act through 2019. testing all Americas rape kits will be, we do know
But, the real problem is in the legwork. Once the that it saves lives. What we may never knowand
results are in, labs still have to examine and analyze the true value of these programsis how many inno-
the results. Then, law enforcement agencies have to cent women and children have already been saved.
On theWEB
www.forensicmag.com
Featured in DFI
@@@
Four Ways the FBI May Have Unlocked the iPhone
according to a public search on federal spending, the Israeli-based cyber-security company Cellebrite has offered services
to dozens of federal agenciesfrom the Justice Department, to the DOE, to the Forest Service.
F
xxxxxx
T
he adoption of next-generation sequencing (NGS) technology in the
forensic industry is in its infancy, but its ability to garner more actionable
information, particularly in compromised samples, is undeniable. Better
described as massively parallel sequencing (MPS), the technology was intro-
duced in the 21st century and has fundamentally revolutionized how biological
systems could be studied with unprecedented throughput, scalability and speed.
Important discoveries already have been made in many elds, in which, it is
applied. For the forensics community in particular, MPS offers a highly comple-
mentary tool to Capillary Electrophoresis (CE) that is helping scientists in the
eld delve deeper into genetic information and nd answers to very challenging
questions.
CE sequencing and MPS are similar in that both methods rely on a DNA
polymerase to drive incorporation of deoxyribonucleotide triphosphates into Bruce Budowle is director of
a DNA template strand in the sequential cycles of DNA synthesis. During CE the University of North Texas
sequencing, nucleotides are identied by uorophore excitation, while nucleo- Health Science Centers Insti-
tute of Investigative Genetics.
tide incorporation during MPS is measured by chemical- or uoresence-based
detection methods. The complementary nature of both systems lies in the com-
bination of data generated by each.
Forensic scientists use CE to rapidly and cost-effectively test a validated set of short-tandem repeat (STR)
markers by determining differences in DNA fragment lengths. MPS takes it a step further by, in addition to
length information, providing STR sequence information and genotyping single nucleotide polymorphisms
(SNPs) within the repeat marker sites. Also SNPs at other places within the genome can provide identity,
ancestry and phenotypic information about the sample. While applying MPS to forensics may be perceived as
taking a longer time to obtain a result, it can provide more genetic data from challenging or degraded samples
and, on a per marker basis, in actuality is quite cost-competitive.
H
idden apps are growing in popularity. While initially marketed
as a way for teens to hide videos, photos, forbidden apps, and
text messages from the watchful eyes of parents, the use of
hidden apps is quickly expanding. Hidden apps are increasingly used
for criminal activity. At the local level, they can be used as a tool to
facilitate drug transactions, sexual assaults, up-skirt photos, as well
as data exltration and theft. On a much larger and more dangerous
international scale, these apps can be used for recruitment purposes
by ISIS and other terrorist groups. Because hidden apps are becom-
ing more common sources of evidentiary data in criminal cases, it is
essential that forensic investigators take the time to learn about them.
Otherwise, key evidence could be missed.
When it comes to hidden apps, awareness is critical. Forensic exam-
iners must know these apps exist and how to nd them. While there Cindy Murphy works for the City
of Madison, Wisc. Police Depart-
are many hidden apps on the market today, new ones are introduced ment.
virtually every day. A quick Internet search is an excellent way to stay
current on whats available and trending in the world of hidden apps. Along with knowledge of whats
out there, examiners must know how apps and data are being hidden to ensure they are not over-
looked.
O
n a clear September morning, Lt. Charles Joseph Gliniewicz was found shot to death in a heavily
wooded area off a gravel side street in Fox Lake, Ill., a small suburb of Chicago. Minutes earlier,
Gliniewicz had radioed from his unit that three suspicious male subjects were observed near an
abandoned cement plant that abutted a swamp. Gliniewicz reported over the radio that the group had
taken off toward the swamp.
At 8:05 A.M., responding ofcers spotted Gliniewiczs unmarked unit, and entered the overgrown
woods. The ofcers heard what they believed to be a single, mufed gunshot. They proceeded cautiously
along the pathway until they reached a clearing 200 feet into the woods. There was Gliniewiczs body, face
down. Along with his pepper spray, his holster was empty and his weapon was missing. They rolled his
body over and checked for a pulse.
The Lake County, Ill. Sheriffs Ofce arrived and declared the case an active-shooter event, and a
homicide investigation with on-scene command. The responding ofcers were advised to use cautionthe
offenders could still be in the area. A loose perimeter was established approximately 1.5 hours into the
incident, and a 2.5-mile secure perimeter was established around the entire wooded and swamp area. The
two-month long investigation into the shooting death of Charles Gliniewicz was about to begin.
Autopsy Results
An autopsy was performed at 7:05 p.m., on September 1. The pathologist noted a bullet perforation over
the left chest two inches below the upper collar. This perforation corresponded to the approximate loca-
tion of the gunshot entrance wound. The approximate angle of downward pathway was 40 degrees. Further
examination indicated a bullet perforation through the cell phone attached to right side of vest with
impact injuries. The cause of death: a penetrating gunshot wound to the chest.
The pathologist, Dr. Manuel Montez, met with members of the Lake County Task Force and the FBI.
He provided a theory based on the angle of the wound: the offender(s) had disarmed Gliniewicz and
placed him on his knees. Gliniewicz may have possibly attempted to lunge at his attackers, thus explaining
the extreme angle of the shot under his bullet-proof vest.
Active Investigation
The investigation was still being conducted as an active homicide. An extensive search of the area elim-
inated any active shooters, and the task force, headed by Commander George Filenko, turned toward the
Victimology
The most signicant factor to consider in a death investigation is victimologythe collection and as-
sessment of all signicant information as it relates to the victim and the victims lifestyle. This includes:
personality, employment, education, friends, habits, hobbies, marital status, relationships, dating history,
sexuality, reputation, criminal record, history with alcohol or drugs, physical condition, neighborhood, and
others. These attributes all help investigators ascertain motives, suspects and risk factors.
In the digital age, cell phones, credit cards, and electronic toll systems, like EZ Pass, now play an
important role in ascertaining victimology. There is also electronic surveillance in many public places for
security reasons. The investigative question is: Who was the victim and what was going on in his or her
life at the time of their murder?
Reconstruction
Pathology and laboratory analysis indicated that Gliniewicz shot himself twice with own H&K .40-caliber
weapon. The rst shot was self-inicted into his cell phone and vest approximately 175 feet from the death
shot. Later analysis revealed that Gliniewicz was standing when he self-inicted the second shot. Gliniew-
icz wedged the muzzle of his gun under the left side of his bullet proof vest and red the fatal shot into his
chest. He dropped his weapon and walked several feet falling face rst where he was discovered. Gliniewicz
appeared to have a high threshold for pain. The pathologist indicated that his wound would have permit-
ted him to live up to 2 minutes.
Advanced ballistic testing with the use of ultra-violet photographic equipment conducted by the North-
ern Illinois Regional Crime Lab conrmed that both gunshots were red in close range. Gunshot residue
was found in the interior of Gliniewiczs bullet proof vest cover when the second fatal round was red,
which indicated that the gun was placed underneath the vest cover when the fatal shot was red. It was
theorized that Gliniewicz had staged the scene to make it appear that he had chased the three men into
the woods or was forced into the woods, where he lost control of his weapon as he fought them using his
pepper spray, and baton during the struggle.
The three-subject scenario was based on a theory that because he was t and tactically trained he was
able to fend off one opponent, possibly two, but three attacking together would be more then even he
could handle. Gliniewicz wanted to create a scenario, in which, he bravely struggled against three oppo-
nents and succumbed to his injuries during a valiant battle. After a three-hour fact nding meeting with
members of the FBI, ATF, Illinois State Police, and others, investigators established that the evidence
supported a conclusion that Gliniewicz had staged his suicide to look like a homicide.
Vernon J. Geberth is a retired Lieutenant-Commander with the New York City Police Department, and the
author of the highly inuential book, Practical Homicide Investigations.
A
mong the existing protocols used by law enforcements around the world for ngermarks develop-
ment, ethyl cyanoacrylate fumigation is well adapted to reveal latent marks on non-porous or some
semi-porous surfaces covering potential evidences. In practice, the object of interest is placed into a
fuming chamber in which hygrometry is set at 80 percent. Cyanoacrylate is then heated up to 120 C (250 F)
leading to its vaporization in the conned volume of the chamber. The latent traces, consisting of bodily uids,
contain nucleophiles which may act as polymerization initiators to form a white polymer picturing the marks.
However, in the case of white or multicolored surfaces, a second development step is often required to enhance
the contrast between the marks and its support. Conventional methods often involve a dye staining process to
produce uorescent marks. Such post-treatment is usually time-consuming, requires additional expensive safety
equipment like fume hoods and drying cabinets, and chemical wastes management.
In 2011, a partnership between an emerging French company and the National Center for Academic
Research created a one-step development for latent marks, directly yellow uorescent (560nm) under
conventional forensic lighting. The challenge was to design a new emissive molecule light enough to
vaporize at the same temperature as the cyanoacrylate. Indeed, since the early 80s, many scientic efforts
were devoted to the improvement of cyanoacrylate fuming protocols in order to obtain direct uorescent
ngerprints.1 Many strategies were attempted to chemically modify the cyanoacrylate itself. However,
the solutions either required high fumigation temperatures or a specic heating apparatus, in some cases
producing highly toxic hydrogen cyanide gas.
To circumvent these technological issues, the consortium worked conjointly to develop a new emissive mol-
ecule that can be mixed with the cyanoacrylate and be vaporized at low temperatures. There are many known
emissive molecules but almost all of them were too heavy to be vaporized at 120 C (250 F). Thanks to the
expertise of CNRS, a novel emissive molecule, exhibiting a strong yellow uorescence was synthesized.2 As it
stands, the uorophore can be easily mixed with the cyanoacrylate and be vaporized at 120 C (250 F). Before
reaching the market, many tests were performed by forensic forces all around France, and since 2015, all the
French forensic forces are using the technology on every day caseworks. The traditional process involving both
fumigation and coloration steps has been abandoned. Indeed, since the dye vaporizes with the cyanoacrylate,
the subsequent polymer bers picturing the latent are directly uorescent with a high resolution. While the
coloration step was sometimes providing poor resolution (coloration of both the print and its support) and was
damaging the evidence (washing with solvent required), this new fuming technology affords reproductive results
rapidly without altering the evidence.
The new uorescent cyanoacrylate formulation allows direct fumigation at low temperature, meaning that
no modication of pre-existing fuming chamber is necessary. In addition, the intrinsic properties of the chosen
emissive molecule, allows prints visualization under a wide range of light source (325 nm and 470 to 530 nm)
already used by forensic technicians worldwide. Finally, the selected dye is fully compatible with DNA, mean-
ing that both papillary and genetic identications are possible on a single latent mark. For the rst time in the
forensic history, it is now possible to fume an entire room or vehicle and observe uorescent marks with forensic
lightings allowing new perspectives and saving time: just like watching CSI TV show!
References
1. Ramotowski, R. in Lee and Gaensslens Advances in Fingerprint Technology, 3rd ed., Ramotovski, R., 2013
2. Prete, C., L. Galmiche, et al. Lumicyano: A new uorescent cyanoacrylate for a one-step luminescent latent ngermark devel-
opment. Forensic Science International, 104-112, 2013
Jeremy Malinge holds a Ph.D. in Chemical Physics and is the R&D Manager at Crime Scene Technology.
T
he news that convicted murderer Colin But, while we should appreciate the relative light-
Pitchfork was denied parole was shocking. Not ening-like speed with which we have leveraged the
that he was denied, but that he was still alive. benefits of DNA in a criminal justice system de-
Certainly, the rst case in history that utilized DNA signed to move slowly, we should also recognize how
evidence in a forensic context had to be a very long far we have to go. Four hundred thousand untested
time ago. In truth, Pitchfork was put away 28 years ago. rape kits nationwide? Seriously? It shouldnt be news
Back then, there wasnt a single offender DNA database that the Grim Sleeper was convicted with famil-
in the world. Now, they are standard in over 50 coun- ial DNA analysis. It should be standard operating
tries and expanding almost on a daily basis. Weve gone procedure.
through RFLP, Castro and the admissibility wars, Bu- Somewhat ironically Ive spent the week in
dowle and Lander and Nature Magazine, NRC I (and II), Manila, the Philippines with forensic DNA pioneer
Dotson and Bloodsworth, and Simpson. We are even George Sensabaugh speaking to law and forensic
looking at the reality of performing DNA analysis in 90 science students about the impact that DNA has had
minutes in police stations. DNA databases have been on criminal justice systems since its introduction. In
used to help convict serial killer Lonnie Franklin Jr., other words, none of my audience was alive for the
known as the Grim Sleeper, using familial testing, and Pitchfork conviction, and many werent even around
have also been used to exonerate 300 innocent people when O.J. Simpson was declared not guilty. As I
and counting in the US alone. looked at the picture of Pitchfork on my PowerPoint
On this odd recognition of the Pitchfork con- slide, and talked about all the future applications of
viction, its important to realize that the changes DNA technology that were contained in that one
brought about by the integration of DNA technology case, it struck me that our next responsibility is to
into the worlds criminal justice systems have been keep the next generation of forensic scientists, pros-
systemic. Statutes of limitations have been altered ecutors and defense attorneys inspired. Newness and
and even eliminated to allow for more exonerations novelty were great motivators for the scientists and
and to crack cold cases. The passage of legislation to attorneys responsible for DNAs seismic impact over
create DNA databases has created one of our more the last two decades. But DNA has been around long
effective crime fighting tools. But, the broadest im- enough now for Colin pitchfork to qualify for, and be
pact of DNA technology has been conceptual. denied, parole.
What started as a better piece of evidence has As a new generation of scientists and lawyers
become a better understanding of the weaknesses in integrate into criminal justice systems throughout
our system. Our concepts of quality forensic science, the world, its important to ensure that they are not
reliable evidence and trustworthy convictions have just good scientists and lawyers. As emphasized at
changed dramatically. Ultimately, thats a very good our conference in Manila, science in the service of
change. I would even argue that our sense of respon- society, must remain the core message of our educa-
sibility to that system has changed. We can do more tional efforts.
to protect the wrongly accused and the innocent vic-
tim, therefore we have the responsibility to do more. Chris Asplen is the attorney in charge of the Life
While original claims of DNA-based exonerations Sciences practice at Hill Wallack, LLP, and works with
were met with skepticism and automatic objection, the US Department of State and the United Nations as a
prosecutors now take a more thoughtful approach. legal expert.
W
hen the little girl known as Baby Doe was found in a plastic bag on a Massachusetts beach, investi-
gators had to keep their geographical possibilities open on the case. The girl could have been from
F
xxxxxx
virtually anywhere in North Americaor even beyond.
But it was the painstaking work of Andrew Laurence, a forensic pollen expert, that centered the
search in the local region. Some of the trace spores on the girls clothes and blanket showed the partic-
ular mix of oaks and pines and other ora native to Massachusetts. In fact, it even identied an exotic
cedar which further narrowed the search. The girl was later identied as Bella Bond, and her mother
and her mothers boyfriend are now awaiting trial on murder charges, partly on the microscopic detec-
tive work of Laurence.
Palynology gathered headlines from the public in the months since the high-prole breakthrough. This
week Laurence, program analyst for U.S. Customs and Border Protection, Laboratories and Scientic Ser-
vices Directorate, also helped make revelations on a 1981 cold case in Ohio, in the hopes the microscopic
evidence could crack the decades-old murder.
But theres just one catch: Laurence is pretty much a one-man band in American palynology. Only he and
his mentor Vaughn Bryant are trained to do the delicate forensic workand Bryant is often subsumed in his
academic responsibilities at Texas A&M University.
Basically, if anyone wants an analysis done, its me or Vaughn, Laurence told Forensic Magazine in an
exclusive interview. I have a fairly large backlog right now.
About 1,000 trained palynologists are working in the world right now. But the vast majority are employed
in the oil industry, since they are a vital resource to tell drillers how far back they are in time at certain depths
as they pursue fossil fuels, according to Laurence.
Only ve worldwide are currently pursuing forensic work.
Part of the difculty is the exacting combination of disciplines the work relies on. Geography, archaeology,
geology, climatology, and basic chemistry all go into the labor-intensive work.
T
he police pick up a 45-year-old man, a robbery natural? The man had been immobilized and showed
convict, for speeding. The arrest is a parole signs of injury on his legs from the restraint straps, so
violation. The man has a history of smoking is this death an accident? But, waithis immobiliza-
and substance abuse, and is obese. On his third day tion was forced. He had been restrained and injured
back in jail, he refuses to cooperate during a routine at the hands of the guards. This prisoners death
search of his cell. The corrections ofcers address should be a homicide. How about undetermined? Sui-
this behavior problem by strapping the man into cide is the only manner of death we would categori-
a restraint chair for cally discount.
several hours until he Medical examiners and coroners agonize over
calms down. After he manner of death all the time, and for good reason.
is released, he immedi- The cause of death, the disease or injury leading to
ately starts a ght with the lethal event, may be patently clear, but its the
another inmate. Once manner of death that the family hears and that the
again the guards strap press pounces on. Call an in-custody death such as
him into the restraint this one a homicide, and the media will immediately
chair, for several more pronounce that the police killed the inmate, even
hours, until he is if the corrections ofcers were only following their
compliant. The man training and jail protocol. Call an in-custody death
goes back in the chair accident or natural, and you might be accused of a
twice more over the cover up. Call it undetermined (a way of saying the
course of the next death doesnt fully categorize into one manner or an-
four days. After the other) and no one is happy: You get branded as either
Dr. Judy Melinek is a forensic nal time, he stands unscientic or indecisive. Or, both.
pathologist and does autopsies upand then, without
for the Alameda County Sheriff
a word, collapses. Hes
Coroners ofce in California.
lying on the oor of
What is manner of death?
The manner of death is a required part of the death
the jail, unconscious. He is not breathing. The guards
certicate, a system of classication most often used
initiate CPR immediately, but after a few minutes the
for data analysis in the realms of public health and
man is still not breathing and no longer has a pulse.
academic research. Every time you read an article
The guards continue CPR until paramedics arrive ten
that contains information about the ways people
minutes after the mans collapse. The medics declare
die, or compares types of deaths across geographic
him dead.
regions, the researchers likely started their analysis
The forensic pathologist conducting the autopsy
with publicly available death certicate data, sorted
nds that the man has a large saddle pulmonary
by manner of death.
embolus and blood clots in both legs associated with
But manner of death has a social function as well,
the strap marks from the restraint chair. The cause of
because, like it or not, we attach different moral
death is clearpulmonary embolus. Whats the man-
value to different ways of dying, even when the
ner, though? A blood clot traveled from the mans
mechanism is the same. In my experience, families
legs to his lungs. Obese smokers commonly develop
who have lost a loved one to a drug overdose dont
dangerous blood clots, so should this be certied as
object to the determination that the cause of death
JUNE 2016
ColdCase Dolly Stolze
CHRONICLES
The Black Dahlia: The Murder of Elizabeth Short
T
he murder of the Elizabeth Short, better known as The mother called the
the Black Dahlia, is the most infamous unsolved police and dispatch alerted
murder in Los Angeles history. She was a beautiful patrol units in the area over
heroine of a real-life lm noir that ended with her brutal the radio. Because newspaper
murder. For decades, detectives and journalists investigated reporters also listened to the
the slaying of Elizabeth Short and put forward their own police radio bands, journal-
theories about the identity of the murderer. The FBI le ists from the Los Angeles
on the Black Dahlia murder is probably one of the best Examiner were the rst people
resources of the early days of the investigation.1 on the scene. According to
Elizabeths body was discovered on January 15, 1947 in an FBI memo dated February
a vacant lot in a residential neighborhood and the FBI 20, 1947, the press arrived at
became involved the very next day. But the Bureaus role the scene before police, took Dolly Stolze is a researcher
was purely to provide assistance to the LAPD for things pictures of the unidentied and editor at Strange
like analyzing evidence and checking the backgrounds body, and handled some of Remains, a blog site that spe-
of suspects. The FBIs le is not an all-inclusive resource the evidence. cializes in forensic science,
on the murder investigation, which it admits, because it Harry Hansen and Finis bioarchaeology and bizarre
history.
doesnt have nearly has much detail as the LAPD les. Brown were the lead LAPD
But it does shed light on the investigation, evidence, and detectives assigned to the case. When Hansen and Brown
suspects.2 arrived at the scene they quickly determined that the un-
The le contains internal communication within the identied woman had been killed and drained of her blood
FBI regarding the case, letters from random people to J. Ed- somewhere else and dumped in the lot.
gar Hoover with tips about the killer and the case, reports
on forensic evidence, and newspaper clippings. Autopsy and Evidence Collection
On January 16, 1947 assistant chief deputy medical
Last Days and Discovery examiner of Los Angeles, County Frederick Newbarr
Elizabeth was born on July 29, 1924 in Boston, Mass. In performed the autopsy on what was still a Jane Doe.
January of 1943, she moved to Santa Barbara and applied Newbarr determined that her cause of death was
for a job at the Post Exchange at Camp Cooke, an Air hemorrhage and shock due to concussion of the brain
Force Base, where she provided her ngerprints as a routine and lacerations of the face. Also, despite disappearing a
part of the application process. On September 23rd of that week prior, she had been dead been dead about twelve
year Elizabeth was arrested by the Santa Barbara Police for hours, thats probably why the date of death on the
underage drinking and sent home to Massachusetts.1 death certicate is listed as January 14th or 15th.1
Short moved back to Southern California in July of The unidentied woman had three deep abrasions over
1946, and, for the next six months, she moved between Los her right eye and had small pieces of esh incised from her
Angeles, Long Beach, and San Diego. She was last seen body. Most notably the corners of her mouth had been cut
alive on January 9, 1947 by Robert Red Manley, a man three inches while she was alive. Also, her body had been
she had once dated, dropped her off at the Biltmore Hotel.1 cleanly bisected post-mortem between the second and
The morning of January 15, 1947 a mother walked with third lumbar vertebrae. None of the internal organs were
her daughter across a vacant lot on Norton Avenue near damaged except for where the intestines were severed.1
39th Street when she noticed the form of a woman in the The body was scrubbed so thoroughly that the autopsy
grass near the sidewalk. At rst she thought she was looking surgeons found bristles from a brush on the chest and
at a mannequin but, as she walked closer, discovered that among the internal organs. These bristles were submitted
it was the body of woman who had been cut in half at the to the FBI for analysis. The FBIs report on the bristles
waist.2 didnt note anything distinctive about the bristles. They
forensic insider
John J. Barbara
N
ational and international headlines were made text form, the encrypted data will remain unread-
recently when the U.S. Government served able and unusable. Another form of encryption is
Apple with a court order to assist the FBI Asymmetric encryption. It uses two different keys,
in cracking the passcode on an iPhone used by San one to encrypt the data and another one to decrypt
Bernardino shooter Syed Farook. This appears to be a it and is often referred to as public key encryption.
reasonable request as it concerns matters of national Users generally make the encryption key public,
security. However, the request may exceed the author- but keep the decryption key private. Thus, anyone
ity of the All Writs Act of 1789 and conict directly can send an email or file encrypted with the public
with the Fourth Amendments search and seizure key, but only the recipient can decrypt it using the
protections which extend to police searches of places private decryption key.
and items (i.e. cell phones) in which an individual has
a legitimate expectation of privacy. Encryption is cen- iPhone Encryption Basics
tral to the discussion as it involves an individuals right Apple has integrated encryption into the hardware
to privacy vs. the needs of law enforcement to conduct and rmware of their iPhones. The iOS uses a dedicated
a criminal investigation. AES 256 bit cryptographic engine in conjunction with
a SHA-1 cryptographic hash function which resides
Encryption Basics between the main system memory and the ash storage.
The purpose of encryption is to secure sensitive infor- Every iPhone also includes a Unique IDentier (an
mation from being readily accessed by an unauthorized AES 256-bit key fused into the application processor)
user. Encryption is essentially a mathematical transfor- which causes the data to become cryptographically
mation which uses a program called an algorithm or linked to a specic iPhone. It cannot be tampered
cipher to transform accessible data or information such with, bypassed, accessed by any software or rmware,
as an email or photograph (plaintext) into an unin- and is not recorded anywhere. Data les are associated
telligible code (ciphertext) which cannot be read or with specic classes, each supporting different levels
understood by normal means. After being transformed, of accessibility. Each classs encryption and decryption
a cryptographic key (a long string of data) works like operations are based upon a complex key hierarchy: the
a password to protect the data or information. The UID and passcode, class keys, le system keys, and per-
plaintext appears as random meaningless gibberish le keys. Per-le keys encrypt the les and the class key
and does not reveal anything about the content of the functions along with the per-le keys and are stored in
original data. Once encrypted, no person (or machine) the le metadata. File system keys encrypt the metadata
can discern anything about the content of the original and the UID and passcode serve to protect the class key.
data by reading its encrypted form.
Encryption is a reversible transformation. Each Cell Phone Data and Information
encryption and decryption function requires a Whenever a text message is sent, a photograph
cryptographic key (a string of binary digits used as uploaded to a social media account, or a mapping pro-
an input to encryption and decryption functions). gram is used, much of the data migrates to the comput-
To decode the encrypted data and render it back to ers owned by cell phone providers. However, not many
plaintext that can be easily understood, both the en- people realize that information is also being stored on
cryption and decryption functions must use the same the cell phone itself.
cryptographic key. This is referred to as Symmetric
key encryption. There is no other way to read the s Text Messages
ciphertext. If for some reason the ciphertext cannot Text messages transmitted from one phone to another
be reversed back to its original unencrypted plain- pass through the computer systems of the providers who
A
ccess to the appropriate equipment is key to vans, box trucks, or old ambulances. All of these vehi-
processing a crime scene. A good crime scene kit cles have the benet of providing extra storage space. By
is an obvious rst step. But you also need to think adding shelves and other storage containers, you can make
beyond the basics. What other equipment will you need? it easier to keep your equipment and the evidence you
How will you ensure that equipment is available when you gather organized and well-protected. Ambulances are often
need it? A crime scene vehicle provides a convenient way an especially good choice for a crime scene vehicle because
to store and transport essential equipment, allowing you they already have built-in containers that can be retro-
to process evidence at the scene. Choosing the right crime tted to your needs. Ambulances, box vans, and box trucks
scene vehicle will depends on your needs. also have the advantage of being large enough to walk
The simplest and cheapest solution to the problem of around in comfortably. These vans and trucks may also be
storing and transporting equipment is to load everything equipped with their own generators, lighting systems, and
into the trunk of a patrol car. Many agencies in areas with work stations.
low crime rates and tight budgets rely on this solution. Being able to move comfortably inside your vehicle can
In general, it works neespecially when youre talking be a huge advantage. Depending on just how much room
about the basic equipment that every crime scene in- you have to maneuver, you may be able to le reports,
vestigator should bring to every scene. Supplies such as: send data, and process your evidence right at the scene.
ngerprint and photographic equipment, blood collection Performing these tasks at the scene can save you time
and evidence packaging supplies, casting and impression and help with your investigation, especially when youre
equipment, biohazard kits, and miscellaneous measuring dealing with major crimes.
devices, labels, cutting tools, and ashlights. The next step up from retrotting an existing vehicle is
Relying on the trunk of a patrol car has some obvious purchasing a customized mobile crime scene lab. The two
drawbacks. First, its difcult to keep equipment organized. basic types of labs are a container style that needs to be
In addition, patrol cars have limited space; you may run delivered to the scene, and a motorized style that can be
into a problem if a scene requires special equipment. For driven to the site. Once the container is delivered by the
example, items such as extra lighting sources, large tents, semi-trailer to the scene, it takes about 45 minutes to set it
and privacy screens wont t into the trunk. You will need up. Motorized vehicles, on the other hand, are built on a
access to a larger vehicle to get those items to the scene. bus or RV-type platform and do not require any additional
Because of these problems, many agencies opt to set-up time. Most labs will likely contain their own genera-
purchase a separate vehicle to handle their crime scene tor, water supply, fuming chamber, copy stand for photog-
investigation equipment. Examples include panel or box raphy, computer work stations, portable lighting sources,
and additional stations for processing items for ngerprints.
Take the time to think about both your current needs and
Advertiser Index your future needs.
Finding the right mobile crime scene vehicle for your
Labconco Corporation ............................................... 26 agency is a complicated task. It involves looking carefully
www.labconco.com at your cases, your expertise, and your budget. Once you
gure out the right way to balance the need for storage
Life Technologies...................................................... 28 space and work space, then you can decide what vehicle or
www.thermosher.com combination of vehicles will help you get the job done.
Promega Corporation ...................................... 2, 25, 27 Dick Warrington is retired from the Shawnee County Sheriffs
www.promega.com Department in Topeka, Kan. where he spent 25 years in law
enforcement. He is now a training instructor for the Lynn
Peavey Company. dwarrington@peaveycorp.com
LAST SAMPLE!!
Sign up for the e-newsletter to discover all the delightful details that make
Spectrum a CE worth waiting for. www.promega.com/Spectrum2016
make is elementary.
t .JDSPQSPDFTTPSDPOUSPMMFEQSPHSBNNJOHGPSWFSTBUJMJUZ
crime-solving
BOEQSPUPDPMnFYJCJMJUZ
t%JHJUBMQBSBNFUFSGFFECBDLGPSIJHIFTURVBMJUZ
DPOTJTUFOUSFTVMUT
easier?
t 4VQFSJPSNBUFSJBMTPGDPOTUSVDUJPOGPSEVSBCJMJUZBOEFBTF
PGPQFSBUJPO
'PSNPSFJOGPSNBUJPO
DBMM800.821.5525PSWJTJU
www.labconco.com/forensics
Elementary.
Protector
Evidence Drying
NEW!
Cabinet CApture BT
Fuming
Chamber
CApture
Portable Fuming
System
Protector Downdraft
Powder Station
XXXMBCDPODPDPN
f
Hear about the latest developments in forensic
DNA at ISHI 27, the largest symposium to focus
on DNA typing for human identication. Network
with forensic scientists from around the world, and
advance your understanding of the current and
future state of the eld.
Solutions include:
Quantiler Trio DNA Quantication Kit for simultaneous quantitative and
qualitative sample assessment to streamline workow and decision making
GlobalFiler PCR Amplication Kit for high sensitivity and discrimination
with 6-dye, 24-locus technology
Yler Plus PCR Amplication Kit for high discriminatory power due to
7 rapidly mutating Y-STRs
Unless stated otherwise in the individual product labeling, products listed are For Research, Forensic, or Paternity
Use Only. Not for use in diagnostic procedures. 2015 Thermo Fisher Scientic Inc. All rights reserved. All trademarks
are the property of Thermo Fisher Scientic and its subsidiaries unless otherwise specied. CO018805 0915