Vous êtes sur la page 1sur 28

On the Scene and In the Lab

Vol.13 | No.2 JUNE 2016

Crime www.forensicmag.com

Scene
Staging
A Mysterious
Police Death

INSIDE:
U The Black Dahlia
U Encrypted Cell Phones
U Forensic Palynology
2016 Promega Corporation. All rights reserved. 27572897
Vol. 13 | No. 2 JUNE 2016

features General Manager


Albert Guffanti

4 FROM THE EDITOR


The Hidden Cost of the Rape-Kit Backlog
Sean Allocca
973-920-7048
albert.guffanti@advantagemedia.com

Editorial Director

6
Bea Riemschneider
Analyzing Unknown Human Remains: bea.riemschneider@advantagemedia.com
Cold Missing Persons Case
Bruce Budowle, Ph.D., and Angie Ambers, Ph.D. Editor
Sean Allocca

8
sean.allocca@advantagemedia.com
The Dangers of Hidden Apps on Forensic Investigations
Cindy Murphy ADVERTISING/SALES
NEW ENGLAND

10
Crime Scene Staging: A Mysterious Police Death CJ Chirico
Vernon Geberth 973-920-7112
cj.chirico@advantagemedia.com

14
One-Step Fluorescent Fuming MID-ATLANTIC/MIDWEST
Arlene Nelson
Jeremy Malinge, Ph.D.
973-920-7189

15
arlene.nelson@advantagemedia.com
DNA CONNECTION
MIDWEST
Utilizing DNA Evidence Decades after Pitchfork Jolly Patel
Chris Asplen 973-920-7743

16
jolly.patel@advantagemedia.com
Forensic Palynology: Tracking the Near Invisible WEST
Seth Augenstein Cindi Richardson
973-920-7680

18
FORENSIC PATHOLOGIST: EXPERT WITNESS cindi.richardson@advantagemedia.com
Mind Your Manners: Where Death Certication Ends SOUTHWEST
and Prevention Begins Bill Little
973-920-7688
Judy Melinek
bill.little@advantagemedia.com

20 COLD CASE CHRONICLES


The Black Dahlia: The Murder of Elizabeth Short
Dolly Stolze
REPRINTS/EPRINTS
For reprints and permissions,
contact The YGS Group

22
800-290-5460 or Reprints@theYGSgroup.com
DIGITAL FORENSIC INSIDER
Encrypted Cell Phones CUSTOMER SERVICE
John J. Barbara For subscription related matters contact Omeda
Customer Service: 847-559-7560 or abm@omeda.com

24 WHO SAYS?
Crime Scene Vehicles: Choosing the Right Vehicle for the Job
Dick Warrington and Owen McDonnell
List Rentals
Infogroup Targeting Solutions
Senior Account Manager, Bart Piccirillo,
402-836-6283; bart.piccirillo@infogroup.com
Senior Account Manager, Michael Costantino

departments 402-863-6266; michael.costantino@infogroup.com

5 On the Web 24 Advertiser Index


ADVANTAGE BUSINESS MEDIA, LLC
Forensic Magazine (ISSN #1553-6262, USPS #023-655), is published four times a year in Mar, Jun, Sept, & Dec by Advantage Business Media, 100 100 Enterprise Drive, Suite 600
Enterprise Drive, Suite 600, Box 912, Rockaway, NJ 07866-0912. No part of this publication may be reproduced in any form without prior written permis- Rockaway, NJ 07866-0912
sion of the publisher. Opinions expressed in articles are those of the authors and do not necessarily reect those of Advantage Business Media. Phone: 973-920-7000; Fax: 973-920-7541
Periodicals Mail postage paid at Rockaway, NJ 07866 and at additional mailing ofces. POSTMASTER: Send address changes/cancellations to Foren- Jim Lonergan
sic Magazine, P.O. Box 3574, Northbrook, IL 60065-3574, 847-559-7560, Fax: 847-291-4816, email: abfor@omeda.com. Publications Mail Agreement CEO
No. 41336030. Return undeliverable Canadian addresses to: Imex/Pitney Bowes, P.O. Box 1632, Windsor Ontario N9A 7C9.
Subscriptions are free to qualied individuals. Non-qualied subscription rates per year are: USA $70, Canada, Mexico & Foreign $100, single copy USA
Terry Freeburg
$17.50, single copy Canada, Mexico & Foreign $25, prepaid in USA funds drawn on a USA branch bank.
COO/CFO

Printed in USA: Every attempt is made to ensure the accuracy of the information contained herein, however Advantage Business Media and its employees Beth Campbell
cannot accept responsibility for the correctness of information supplied, advertisements, or opinions expressed. Copyright 2016 Advantage Business CCO
Media. All rights reserved.

JUNE 2016 Forensic Magazine | www.forensicmag.com 3


editor
from the

The Hidden Cost


of the Rape-Kit Backlog
sean.allocca@advantagemedia.com
Sean Allocca

T
he White House recently reminded us that our nd the resources to mount full investigations. Those
rape-kit problem is going nowhere fast. Four expenditures can cost much more than the testing it-
hundred thousand kits and counting stacked self. Ramit Plushnick-Masti, of the Houston Forensic
on evidence-room shelves are potentially hoarding Science Center, said nding the funding was a major
powerful DNA evidence that could lock up dangerous stumbling block. Youre not only providing for the
sexual predators nationwide. Sounds straightforward cost of testing the kits, she said, but the cost of hav-
enoughpay to test the kits, enter the DNA proles ing the resources internally to take cases to the next
into CODIS, and investigate the hits. But, like most level and thats where there was a lot of expense.
things in life, the problem is in the funding. What we do know is that testing the backlog keeps
The Obama administration recently announced criminals off the streets. A court in Ohio sentenced
a grant program to fund testing and improve inves- serial rapist Dwayne Wilson to life last year. Al-
tigations. Last years Sexual Assault Kit Initiative ready a known pedophile, Wilson was convicted of
awarded $41 million to 20 juris- seven counts of rape after his DNA
dictions, which was a well-needed The real cost matched rape kit evidence relating
shot in the arm. The 2016 SAKI to assaults on four women in Cleve-
program will award $45 million. is in the legwork. land in the 1990s. The judge called
But as the years pass and the Wilson the worst of the worst. The
problem continues to grow, how much will Americas most shocking part of the story: when Wilson was
rape-kit problem cost? initially indicted, he was just days away from being
Last year, the City of Houston announced a $6 released from prison, where he was serving ve years
million initiative to test all its kits dating back to for sexual battery. Evidence from a decades-old rape
the 1980s. The city only paid $453 per kit, which is kit prevented a convicted pedophile from walking
a basement-bottom price (most experts estimate the back onto the same streets where he physically forced
cost of testing a kit at over $1,000). At that price, women and young girls into his car and raped them at
testing the nations backlog would cost around $180 knifepoint.
million, well within the governments $600 million While we dont know what the ultimate cost of
authorized in the Debbie Smith Act through 2019. testing all Americas rape kits will be, we do know
But, the real problem is in the legwork. Once the that it saves lives. What we may never knowand
results are in, labs still have to examine and analyze the true value of these programsis how many inno-
the results. Then, law enforcement agencies have to cent women and children have already been saved.

4 Forensic Magazine | www.forensicmag.com JUNE 2016


Forensic Magazine Trending News
Does CODIS Contain Untapped Bones of King Erik IX Analyzed,
Ancestry Information 850 Years Later
The FBIs Combined DNA Index System has No historical records
collected millions of genetic proles from remain of the king, and
criminals, unknown offenders, missing per- patron saint of Stock-
sons, and unidentied human remains. But, is there a whole lot holm, whose likeness still
more information present in the proles than previously believed? adorns the Stockholm
coat of arms. But, what
Floaters May Decompose in Deep Water Faster Than can modern science reveal about the alleged
Previously Thought remains of one Swedens most celebrated
Bodies found in water are generally martyrs?
thought to be better preserved, due to
slower decomposition rates. But new Disgraced Lab Analyst Was High
research on pig carcasses indicates that
deeper, more oxygen-rich water can sig-
Almost Daily
Instead of testing drug
nicantly speed up breakdown processes.
evidence that came into
FBI Warns About Altered Fingerprints the lab, a former Mas-
In a study last year, the FBI identied 412 sachusetts crime lab
records in the Integrated Automated Finger- analyst not only ingest-
print Identication System which showed ed them, she admitted
deliberate print alteration. The biggest to smoking crack before a state police accred-
number of altered prints appeared to be by itation inspection, and even went so far as to
people who had extensive criminal records manufacture crack cocaine in the lab for her
and multiple law enforcement encounters. own personal use.

On theWEB
www.forensicmag.com

Featured in DFI
@@@
Four Ways the FBI May Have Unlocked the iPhone
according to a public search on federal spending, the Israeli-based cyber-security company Cellebrite has offered services
to dozens of federal agenciesfrom the Justice Department, to the DOE, to the Forest Service.

Panama Papers: How Investigators Searched 2.6 Terabytes of Data


The Panama Papers held some of the most incriminating evidence into an alleged international tax-evasion scheme ever
uncoveredsome 150 politicians, and close associates, have been linked to hundreds of thousands of offshore shell com-
panies, reportedly used as tax havens to shield billions of dollars.

Read these articles and the rest of Forensic Magazine here:


www.forensicmag.com

Join the conversation on

JUNE 2016 Forensic Magazine | www.forensicmag.com 5


feature
Analyzing Unknown
Human Remains:
Cold Missing Persons Case
Xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

Bruce Budowle, Ph.D., and Angie Ambers, Ph.D.


Byline

F
xxxxxx

T
he adoption of next-generation sequencing (NGS) technology in the
forensic industry is in its infancy, but its ability to garner more actionable
information, particularly in compromised samples, is undeniable. Better
described as massively parallel sequencing (MPS), the technology was intro-
duced in the 21st century and has fundamentally revolutionized how biological
systems could be studied with unprecedented throughput, scalability and speed.
Important discoveries already have been made in many elds, in which, it is
applied. For the forensics community in particular, MPS offers a highly comple-
mentary tool to Capillary Electrophoresis (CE) that is helping scientists in the
eld delve deeper into genetic information and nd answers to very challenging
questions.
CE sequencing and MPS are similar in that both methods rely on a DNA
polymerase to drive incorporation of deoxyribonucleotide triphosphates into Bruce Budowle is director of
a DNA template strand in the sequential cycles of DNA synthesis. During CE the University of North Texas
sequencing, nucleotides are identied by uorophore excitation, while nucleo- Health Science Centers Insti-
tute of Investigative Genetics.
tide incorporation during MPS is measured by chemical- or uoresence-based
detection methods. The complementary nature of both systems lies in the com-
bination of data generated by each.
Forensic scientists use CE to rapidly and cost-effectively test a validated set of short-tandem repeat (STR)
markers by determining differences in DNA fragment lengths. MPS takes it a step further by, in addition to
length information, providing STR sequence information and genotyping single nucleotide polymorphisms
(SNPs) within the repeat marker sites. Also SNPs at other places within the genome can provide identity,
ancestry and phenotypic information about the sample. While applying MPS to forensics may be perceived as
taking a longer time to obtain a result, it can provide more genetic data from challenging or degraded samples
and, on a per marker basis, in actuality is quite cost-competitive.

Mining for Clues from Unknown Human Remains


An example of these powerful technologies in action involves the case of unidentied human remains dis-
covered in the small South Dakota town of Deadwood. Established in 1876, Deadwood was a primitive gold
mining camp inhabited by thousands of pioneers, including historical gures such as James Butler Wild Bill
Hickok, Seth Bullock, and Martha Jane Calamity Jane Cannary.
Little is left from the towns lawless frontier days, but a recent study using CE and MPS technology has provided
new insight into one former resident from that era who construction workers unearthed in 2012 while building a
retaining wall near the citys original cemetery site.
Using ancestry informative and phenotype markers, Y-STRs, and mitochondrial DNA analyses, scientists
from the Institute of Applied Genetics at the University of North Texas Health Science Center were able to
pull substantially more information from the unidentied, 140-year-old human skeleton than possible by tra-
ditional CE analyses. Prior to applying MPS, anthropological insights and a few lineage genetic markers were

6 Forensic Magazine | www.forensicmag.com JUNE 2016


the only available points of reference for the former helped positively identify Williamsons remains. Using
Deadwood resident. These techniques were able to orthogonal methods for human identication may
determine that the person was a male and likely of reduce such errors early on. If it had been available,
European descent. MPS technology could have been that additional tool
By sequencing the samples, however, the research to help solve the mystery much earlier, and relatively
team could now paint a more vivid picture of what quickly, with its ability to type more markers.
this person once looked like. In addition to revealing It is clear that MPS is moving the needle in every
his gender and ethnicity, the MPS data also sug- eld it reaches. Similar to the critical advances MPS
gested the man likely had light red hair and brown is affording science to better understand cancer, in-
eyes. Remarkably, the team was able to generate the fectious disease, and even biodiversity, the technol-
data and reach their conclusion in just a few days. ogy has real potential to revolutionize public safety
and the way we approach criminal investigations. Its
Benets use in compelling forensics research studies around
Indeed, MPSs ability to unearth a wealth of data the globe already is demonstrating how it could be
to supplement our elds gold standard methods has applied in real-world cases. European countries like
signicant potential to help solve modern-day crime Denmark have validated the technology, and are
as it moves from research to a validated technol- currently using it for routine ancestry and human
ogy. The tool has been proving its utility since its identity case work. The Netherlands also has imple-
debut more than a decade ago, and there are many mented a similar MPS program to help solve crimes
examples in which its ability to read data from highly in that country, while the U.S. Armed Forces DNA
degraded samples could have been instrumental to Identication Laboratory has begun using MPS to
help solve cases, including a two-decades-old missing help identify unknown remains from past wars. Time
person investigation in particular. will tell how quickly MPS will be widely adopted as
Donna Williamson was a 19-year-old woman from a validated tool for routine forensics in the United
North Richland Hills, Texas, who disappeared in States, but the insightful research being generated
August 1982. Her remains were found 11 years later today offers compelling reason for its use in crime
on the side of a highway, but identity could not be labs everywhere.
established due to the degraded state of the bones
and the limited technology available at the time. Bruce Budowle, Ph.D. is director of the University of
The physical examination only revealed the remains North Texas Health Science Centers Institute of In-
were likely female and provided approximate age vestigative Genetics and Professor of the Department of
and height. Unfortunately, in this case, human error Molecular and Medical Genetics. He is a renowned expert
may have delayed identication since it was later in forensic genetics and counterterrorism, primarily in
determined that investigators were comparing teeth identication of victims from mass disasters and microbial
taken from the right jaw to dental records of the left forensics. Prior to joining the UNT Health Science Cen-
mandible. Williamsons case would remain unsolved ter, Budowle spent 26 years as a scientist for the Federal
for another decade until DNA databasing in Texas Bureau of Investigation (FBI) Laboratory Division.
came online.
By comparing DNA samples provided by Wil- Angie Ambers received her Ph.D. in molecular
liamsons family members with CE sequencing data biology with an emphasis in forensic genetics and human
recovered from her degraded samples, scientists were identication. Her research has involved investigation of
able to determine that there was a 95.21 percent methods for improving autosomal and Y-STR typing of
probability that the unidentied remains belonged degraded and low copy DNA. Currently Dr. Ambers is
to Williamson. While not quite enough to positively a postdoctoral fellow at the IAG (specializing in skeletal
identify her by DNA alone, investigators decided to remains analyses) and an adjunct professor at UNT,
re-examine dental records, which revealed the error in where she teaches Forensic Molecular Biology to students
the original investigation. This cross-referencing effort in the FEPAC-accredited forensic science program.

JUNE 2016 Forensic Magazine | www.forensicmag.com 7


feature
The Dangers of Hidden Apps
on Forensic Investigations
Cindy Murphy

H
idden apps are growing in popularity. While initially marketed
as a way for teens to hide videos, photos, forbidden apps, and
text messages from the watchful eyes of parents, the use of
hidden apps is quickly expanding. Hidden apps are increasingly used
for criminal activity. At the local level, they can be used as a tool to
facilitate drug transactions, sexual assaults, up-skirt photos, as well
as data exltration and theft. On a much larger and more dangerous
international scale, these apps can be used for recruitment purposes
by ISIS and other terrorist groups. Because hidden apps are becom-
ing more common sources of evidentiary data in criminal cases, it is
essential that forensic investigators take the time to learn about them.
Otherwise, key evidence could be missed.
When it comes to hidden apps, awareness is critical. Forensic exam-
iners must know these apps exist and how to nd them. While there Cindy Murphy works for the City
of Madison, Wisc. Police Depart-
are many hidden apps on the market today, new ones are introduced ment.
virtually every day. A quick Internet search is an excellent way to stay
current on whats available and trending in the world of hidden apps. Along with knowledge of whats
out there, examiners must know how apps and data are being hidden to ensure they are not over-
looked.

Types of Hidden Apps


There are three main ways to hide apps. Some users manipulate their phones to hide things in places
where they dont belong. Others use apps that are designed to hide other apps inside. Then there are
ofcial hidden apps (also known as decoy apps), which appear to do one thing while they are actu-
ally designed to do something else.
One of the most popular hidden apps is the calculator appSpyCalc and Smart Hide Calcula-
tor are two examples. These apps are fully functioning calculators with a twist. Once a password is
entered, a new interface appears that allows users to access and store pictures, videos, documents or
les that are otherwise hidden to someone reviewing data on the phone. Audio Manager is another
popular hidden app, which as its name suggests, disguises itself as an audio manager that can be used
to turn volumes up and down (ringer, alarm and other volumes). If a user presses and holds the Audio
Manager title the actual hidden app, Hide It Pro, will appear.
The Best Secret Folder app hides the fact that an app is installed on the phone. At rst glance the
folder looks innocuous, even empty depending on how it is congured. However, with the right com-
bination the user can access apps that are hidden within the folder. Similar apps like Vaulty or Hide
It allow the user to dump other apps into the folder which then disappear to the unsuspecting eye.
The apps re-appear after pressing a particular area on the screen or putting in a PIN number.
A less technical, but commonly seen way to hide apps is for the user to create folders or nests of
folders on their phone that appear to be harmless, and then to store data they wish to hide within
that folder. They may even install an application that allows them to change an apps icon so that it
appears to be a different app on the phone.

8 Forensic Magazine | www.forensicmag.com JUNE 2016


Hidden apps reinforce a valuable lesson in The Good News
the world of forensics, just because you dont Getting results from hidden apps is not impos-
see something initially, doesnt mean nothing is sible, but it is potentially more time consuming.
there. While it is not realistic to expect examin- If there is a hidden app installed on a device,
ers to stay current on each and every app, know- chances are the data associated with that app,
ing they exist and might be installed is essential. which was intentionally hidden, could be very
During an investigation it is wise to consider relevant to an investigation.
a hidden app might be in use, which means a While a forensic tool may allow an examiner
deeper dive is necessary. to extract and access hidden data, it is not always
obvious how to work with that data. Courses are
Examining the Data available that teach examiners how to dig deeper.
When parsing data from mobile devices, forensic Learning how to work with various types of data
tools are a good starting point. However, alone, and to use additional tools to attack the problem
they are no longer enough. In comparison to can be the key to unraveling the puzzle. This is
more common apps like Facebook and Twitter, where vendor-specic training tends to fall short.
mobile forensic tools are unlikely to automatical- Vendor training is good for learning about the
ly nd and parse data from hidden apps. These capabilities of a specic tool, however broader
apps can also store their data in slightly differ- awareness is needed because no one tool supports
ent ways. They may store data in locations that every phone or every app. Furthermore, to validate
are unexpected or they may use encryption or the ndings from one tool requires the use of other
encoding. This can affect a forensic tools ability tools. To get the most comprehensive and accurate
to correctly parse data even if the tool is able view of data extracted from a device, and to vali-
to obtain the data associated with the app. As date ndings, examiners need to use multiple tools.
a result, examiners must dig deeper. They have One of the biggest benets of taking a vendor-
to go through the le systems, dig through the neutral mobile forensics training is that they dont
databases and do deeper forensics work to nd shy away from expressing and teaching what a tool
information, decode it, and manually parse it. is unable to do or doesnt do well. Instead, these
Without knowledge of how hidden apps poten- training courses offer advice on how to use a variety
tially encode or store data, information may be of tools to supplement each other, and get the
missed. For example, if a forensic tool successful- job done as quickly, accurately, and efciently as
ly pulls data from a hidden app, the data may not possibledespite the shortcomings of any individ-
be in human readable format. For examiners who ual mobile forensic tool. Historically when dealing
solely rely on what they see, it is easy to overlook with mobile devices, basic forensic knowledge was
this information or assume that it is not readable. enough. However, with hidden apps, that is no
Therefore, it is important that examiners not longer the case. With greater awareness of what
only know what they are looking for, they must apps exist and the proper education and training,
also know how to nd data and how to transform valuable case data can be extracted. Staying current
it into a readable format. and knowing where to look is the ultimate key.
Furthermore, some hidden apps claim they
use encryption when they actually use different Cindy Murphy works for the City of Madison,
combinations or multiple levels of encoding to Wisc. Police Department. She is a certied forensic
mask an examiners ability to see things in plain examiner and earned her masters degree in Forensic
text. Unbeknownst to the user, who assumes the Computing and Cybercrime from University Col-
content is unreadable to others, knowledgeable lege, Dublin. She is also a courseware co-author and
examiners can access, decode and view this infor- Advanced Mobile Device Forensics instructor for the
mation. SANS Institute.

JUNE 2016 Forensic Magazine | www.forensicmag.com 9


coverstory
Crime Scene Staging
A Mysterious Police Death
Vernon Geberth

O
n a clear September morning, Lt. Charles Joseph Gliniewicz was found shot to death in a heavily
wooded area off a gravel side street in Fox Lake, Ill., a small suburb of Chicago. Minutes earlier,
Gliniewicz had radioed from his unit that three suspicious male subjects were observed near an
abandoned cement plant that abutted a swamp. Gliniewicz reported over the radio that the group had
taken off toward the swamp.

During Dispatch: Do you need a second unit?


Gliniewicz: 10-4. Go ahead and start.

At 8:05 A.M., responding ofcers spotted Gliniewiczs unmarked unit, and entered the overgrown
woods. The ofcers heard what they believed to be a single, mufed gunshot. They proceeded cautiously
along the pathway until they reached a clearing 200 feet into the woods. There was Gliniewiczs body, face
down. Along with his pepper spray, his holster was empty and his weapon was missing. They rolled his
body over and checked for a pulse.
The Lake County, Ill. Sheriffs Ofce arrived and declared the case an active-shooter event, and a
homicide investigation with on-scene command. The responding ofcers were advised to use cautionthe
offenders could still be in the area. A loose perimeter was established approximately 1.5 hours into the
incident, and a 2.5-mile secure perimeter was established around the entire wooded and swamp area. The
two-month long investigation into the shooting death of Charles Gliniewicz was about to begin.

Securing the Crime Scene


In the hours that followed Gliniewiczs death, over 400 local, state and federal ofcers conducted a massive
manhunt for the alleged shooter or shooters. There were 48 K-9 teams from different jurisdictions in the
search, and ve air craft that including four helicopters and one xed wing aircraft. The terrain was so
thick that the searching ofcers could barely see one another. Dozens of state and federal agents joined the
local police, and a no-y zone was established. Schools were locked down; commuter trains screeched to a
halt. The small town of Fox Lake looked like a warzone.
The Lake County Major Crime Task Force took control of the scene, but they could not allow the
evidence response technicians (ERT) access to the crime scene for several hours. Because of the possibility
that an active shooter was still in the area, the team was eventually escorted to the scene by a tactical unit.
The terrain made the search tedious and time-consuming. However, the ERT teams were able to trace the
steps of Gliniewicz from his vehicle to where he was found. Each area of interest identied by orange cones
or markers began to suggest Gliniewicz was confronted by assailants and a struggle ensued:
s His pepper spray had been activated near the top of the path.
s A police baton was found lying in the brush.
s Sunglasses lying in the brush perhaps lost during a struggle.
s A spent shell casing was eventually matched to his H&K .40 caliber semi-auto weapon.
The ERTs then processed the location where Gliniewiczs body was found. Before bagging Gliniewiczs
hands for transport a eld test for gun-shot residue was done. A systematic search of the area surrounding
the body revealed that Gliniewiczs gun was found tossed into the underbrush.

Crime Scene Staging


Staging a scene occurs when the perpetrator purposely alters the crime scene to mislead the authorities
and/or redirect the investigation. Staging is a conscious criminal action on the part of an offender to
thwart an investigation.1
10 Forensic Magazine | wwww.forensicmag.com JUNE 2016
Crime scene staging events hap-
pen in all jurisdictions all across the
United States, and seem to be in-
creasing as people learn more about
the processes of death investigations through
the media, true crime books, television mystery
shows, and movies.1 In many staged crime scenes,
the staging tends to be overdone, or is inconsistent
with the events and initial statements.
Most offenders arent familiar with the workings
of a crime scene, or know differences between a
burglary, rape, robbery, homicide, accident or suicide
scene. They have an idea of how the scene may ap-
pear from television or the movies, and believe they
can recreate those depictions. However, upon closer
scrutiny by criminal investigators, along with the ap-
Figure 1A reconstruction of the crime scene in plication of forensic techniques, the staging becomes
Fox Lake, Ill. readily apparent.

Equivocal Death Investigations


This case was a classic equivocal death investigation (EDI). EDIs are inquiries that are open to interpre-
tation. The facts may be purposefully vague, or misleading. The death is suspicious or questionable based
upon what is presented to the authorities. These deaths may resemble homicides or suicides, accidents or
naturals. But whats important is that these require further investigation, and cannot be concluded without
understanding the victimology, and the circumstances surrounding the event.1
There are 10 protocols for investigative strategies to help understand the crime scene. Investigators must
take each factor to its ultimate conclusion:
1. Assess the victimology of the deceased.
2. Evaluate the types of injuries and wounds of the victim in connection with the types of weapon
employed.
3. Conduct necessary forensic examinations to establish and ascertain the facts.
4. Conduct an examination of the weapon for latent and ballistic evidence.
5. Evaluate the behavior of the victim and suspects.
6. Establish a prole of the victim through interviews with friends and relatives.
7. Reconstruct and evaluate the event.
8. Compare investigative ndings with the medico-legal autopsy and confer with the medical examiner.
9. Corroborate statements with evidential facts.
10. Conduct and process all death investigations as if they were homicide cases.

Autopsy Results
An autopsy was performed at 7:05 p.m., on September 1. The pathologist noted a bullet perforation over
the left chest two inches below the upper collar. This perforation corresponded to the approximate loca-
tion of the gunshot entrance wound. The approximate angle of downward pathway was 40 degrees. Further
examination indicated a bullet perforation through the cell phone attached to right side of vest with
impact injuries. The cause of death: a penetrating gunshot wound to the chest.
The pathologist, Dr. Manuel Montez, met with members of the Lake County Task Force and the FBI.
He provided a theory based on the angle of the wound: the offender(s) had disarmed Gliniewicz and
placed him on his knees. Gliniewicz may have possibly attempted to lunge at his attackers, thus explaining
the extreme angle of the shot under his bullet-proof vest.

Active Investigation
The investigation was still being conducted as an active homicide. An extensive search of the area elim-
inated any active shooters, and the task force, headed by Commander George Filenko, turned toward the

JUNE 2016 Forensic Magazine | wwww.forensicmag.com 11


coverstory
investigation. They located the three
individuals matching the description
based on area videos. These videos
had been collected by investigators
from businesses, private homes and
private dash cameras. All three were
identied, and all three had solid
alibis.
The day before the shooting, a
GPS system was installed in Gliniew-
iczs car computer. Information from
GPS indicated that Gliniewicz had
stopped at a local gas station and pur- Figure 2A diagram of the gunshot wounds.
chased two packs of cigarettespart
of his regular routine. He then drove
to the cement plant. His vehicle was parked for approximately 25 minutes before he called dispatch about
the three suspicious subjects.
Early on in the investigation there were some differences of opinion between the police and the coro-
ners ofce as to the manner of death. Emotions at the Fox Lake Police Department, and the community as
a whole, were running high, following the death of one of their own. There was also a lot of media pressure
on both the coroner and the Task Force commander to release information and quell mounting rumors.
A week after Gliniewiczs death, there was a rumor that he had been shot in the back in an execution.
Coroner Thomas Rudd squelched that rumor stating that Gliniewicz had suffered a catastrophic gunshot
wound of the chest. He also stated the death had not yet been determined, and could possibly be a homi-
cide, suicide, accident, or natural. The press jumped on the word suicide. Meanwhile leaks from alleged
inside sources continued to plague the investigation.

Victimology
The most signicant factor to consider in a death investigation is victimologythe collection and as-
sessment of all signicant information as it relates to the victim and the victims lifestyle. This includes:
personality, employment, education, friends, habits, hobbies, marital status, relationships, dating history,
sexuality, reputation, criminal record, history with alcohol or drugs, physical condition, neighborhood, and
others. These attributes all help investigators ascertain motives, suspects and risk factors.
In the digital age, cell phones, credit cards, and electronic toll systems, like EZ Pass, now play an
important role in ascertaining victimology. There is also electronic surveillance in many public places for
security reasons. The investigative question is: Who was the victim and what was going on in his or her
life at the time of their murder?

Jekyll and Hyde


The Task Force requested and initiated numerous subpoenas for Gliniewiczs credit cards, personal bank
accounts and the bank accounts for the Explorers Club, a youth mentoring program run by Gliniewicz
through the Fox Lake Police Department. It was quickly discovered that Gliniewicz had a Jekyll and Hyde
personality, which Commander George Filenko described as Gliniewiczs two personas. The public persona
was GI Joe the community hero, whom everyone seemingly loved. But, the real persona was a criminal
with a badge. The Task Force learned:
s Gliniewicz was stealing money from the Explorer fund, and taking extravagant vacations to
Hawaii with his wife.
s He was involved in adulterous affairs and accessed adult sites known for locating prostitutes.
s His personal record indicated he had been sued in federal court by a female subordinate for forcing
her to have sexual relations with him on and off duty.
s He facilitated a sham marriage between his son, who was serving in the military, and one of
Gliniewiczs female companions, to get money and provide the female with insurance for her and
her children.
s He had on at least two occasions forged a signature to acquire military style equipment.

12 Forensic Magazine | wwww.forensicmag.com JUNE 2016


The Cyber Investigation by the FBI
Gliniewiczs personal phone was located on his body and submitted to the FBI cyber lab for
extensive analysis. This process took several weeks. Eventually 6,500 pages of deleted mes-
sages were recovered by analysts from the phone. The messages were extremely incriminat-
ing and eluded to the theft of funds and money laundering.
The combination of his incriminating text messages and a forensic audit of his accounts
began to show a pattern of criminal activity. In March, 2015 a new village administrator had been hired
and immediately began a village wide inventory audit. Gliniewicz became concerned. Interestingly, one of
the deleted messages made reference to possibly setting up the new village administratoreven contem-
plating her murder.

Reconstruction
Pathology and laboratory analysis indicated that Gliniewicz shot himself twice with own H&K .40-caliber
weapon. The rst shot was self-inicted into his cell phone and vest approximately 175 feet from the death
shot. Later analysis revealed that Gliniewicz was standing when he self-inicted the second shot. Gliniew-
icz wedged the muzzle of his gun under the left side of his bullet proof vest and red the fatal shot into his
chest. He dropped his weapon and walked several feet falling face rst where he was discovered. Gliniewicz
appeared to have a high threshold for pain. The pathologist indicated that his wound would have permit-
ted him to live up to 2 minutes.
Advanced ballistic testing with the use of ultra-violet photographic equipment conducted by the North-
ern Illinois Regional Crime Lab conrmed that both gunshots were red in close range. Gunshot residue
was found in the interior of Gliniewiczs bullet proof vest cover when the second fatal round was red,
which indicated that the gun was placed underneath the vest cover when the fatal shot was red. It was
theorized that Gliniewicz had staged the scene to make it appear that he had chased the three men into
the woods or was forced into the woods, where he lost control of his weapon as he fought them using his
pepper spray, and baton during the struggle.
The three-subject scenario was based on a theory that because he was t and tactically trained he was
able to fend off one opponent, possibly two, but three attacking together would be more then even he
could handle. Gliniewicz wanted to create a scenario, in which, he bravely struggled against three oppo-
nents and succumbed to his injuries during a valiant battle. After a three-hour fact nding meeting with
members of the FBI, ATF, Illinois State Police, and others, investigators established that the evidence
supported a conclusion that Gliniewicz had staged his suicide to look like a homicide.

Interview with Commander George Filenko


I interviewed Commander Filenko who advised me that this two-month long investigation determined
conclusively that Lieutenant Joseph Gliniewicz intentionally committed suicide and left a staged trail of
police equipment consisting of pepper spray, a baton and his personal glasses at the crime scene to mislead
rst responders and investigators to believe that this was a homicide. It was learned through investigation
that Gliniewicz was familiar with this area. Gliniewicz, who had signicant experience in staging mock
crime scenes had conducted exercises at this location for his Explorer group.
The FBI Behavioral Analysis Unit had concurred that this was a staged scene in part because there
were no signs of Gliniewicz being dragged after the initial shot and no physical signs that he had fought for
his life. Commander Filenko said. We have also concluded that Gliniewicz strategically aimed the rst
of two shots from his own weapon at the lower abdominal area striking his cellular phone and bullet proof
vest which absorbed most of the impact of the rst shot.
The funeral for Lt. Joe Gliniewicz, drew thousands of mourners, including hundreds of police ofcers
from all over the country, before the nal results of the death investigation were completed. Commander
Filenko said that this cowardly act represented the ultimate betrayal of what it means to be an ofcer.
But, thanks to his work, and the tireless efforts of dozens of forensic experts and hundreds of police ofcers
from the federal, state and local levels, the truth about this astonishing case was ultimately uncovered.

Vernon J. Geberth is a retired Lieutenant-Commander with the New York City Police Department, and the
author of the highly inuential book, Practical Homicide Investigations.

Illustrations courtesy of Medical Legal Art Illustration www.doereport.com


JUNE 2016 Forensic Magazine | wwww.forensicmag.com 13
feature
One-Step Fluorescent Fuming
Jeremy Malinge, Ph.D.

A
mong the existing protocols used by law enforcements around the world for ngermarks develop-
ment, ethyl cyanoacrylate fumigation is well adapted to reveal latent marks on non-porous or some
semi-porous surfaces covering potential evidences. In practice, the object of interest is placed into a
fuming chamber in which hygrometry is set at 80 percent. Cyanoacrylate is then heated up to 120 C (250 F)
leading to its vaporization in the conned volume of the chamber. The latent traces, consisting of bodily uids,
contain nucleophiles which may act as polymerization initiators to form a white polymer picturing the marks.
However, in the case of white or multicolored surfaces, a second development step is often required to enhance
the contrast between the marks and its support. Conventional methods often involve a dye staining process to
produce uorescent marks. Such post-treatment is usually time-consuming, requires additional expensive safety
equipment like fume hoods and drying cabinets, and chemical wastes management.
In 2011, a partnership between an emerging French company and the National Center for Academic
Research created a one-step development for latent marks, directly yellow uorescent (560nm) under
conventional forensic lighting. The challenge was to design a new emissive molecule light enough to
vaporize at the same temperature as the cyanoacrylate. Indeed, since the early 80s, many scientic efforts
were devoted to the improvement of cyanoacrylate fuming protocols in order to obtain direct uorescent
ngerprints.1 Many strategies were attempted to chemically modify the cyanoacrylate itself. However,
the solutions either required high fumigation temperatures or a specic heating apparatus, in some cases
producing highly toxic hydrogen cyanide gas.
To circumvent these technological issues, the consortium worked conjointly to develop a new emissive mol-
ecule that can be mixed with the cyanoacrylate and be vaporized at low temperatures. There are many known
emissive molecules but almost all of them were too heavy to be vaporized at 120 C (250 F). Thanks to the
expertise of CNRS, a novel emissive molecule, exhibiting a strong yellow uorescence was synthesized.2 As it
stands, the uorophore can be easily mixed with the cyanoacrylate and be vaporized at 120 C (250 F). Before
reaching the market, many tests were performed by forensic forces all around France, and since 2015, all the
French forensic forces are using the technology on every day caseworks. The traditional process involving both
fumigation and coloration steps has been abandoned. Indeed, since the dye vaporizes with the cyanoacrylate,
the subsequent polymer bers picturing the latent are directly uorescent with a high resolution. While the
coloration step was sometimes providing poor resolution (coloration of both the print and its support) and was
damaging the evidence (washing with solvent required), this new fuming technology affords reproductive results
rapidly without altering the evidence.
The new uorescent cyanoacrylate formulation allows direct fumigation at low temperature, meaning that
no modication of pre-existing fuming chamber is necessary. In addition, the intrinsic properties of the chosen
emissive molecule, allows prints visualization under a wide range of light source (325 nm and 470 to 530 nm)
already used by forensic technicians worldwide. Finally, the selected dye is fully compatible with DNA, mean-
ing that both papillary and genetic identications are possible on a single latent mark. For the rst time in the
forensic history, it is now possible to fume an entire room or vehicle and observe uorescent marks with forensic
lightings allowing new perspectives and saving time: just like watching CSI TV show!

References
1. Ramotowski, R. in Lee and Gaensslens Advances in Fingerprint Technology, 3rd ed., Ramotovski, R., 2013
2. Prete, C., L. Galmiche, et al. Lumicyano: A new uorescent cyanoacrylate for a one-step luminescent latent ngermark devel-
opment. Forensic Science International, 104-112, 2013

Jeremy Malinge holds a Ph.D. in Chemical Physics and is the R&D Manager at Crime Scene Technology.

14 Forensic Magazine | wwww.forensicmag.com JUNE 2016


dna connection
the
Chris Asplen

Utilizing DNA Evidence Decades after Pitchfork

T
he news that convicted murderer Colin But, while we should appreciate the relative light-
Pitchfork was denied parole was shocking. Not ening-like speed with which we have leveraged the
that he was denied, but that he was still alive. benefits of DNA in a criminal justice system de-
Certainly, the rst case in history that utilized DNA signed to move slowly, we should also recognize how
evidence in a forensic context had to be a very long far we have to go. Four hundred thousand untested
time ago. In truth, Pitchfork was put away 28 years ago. rape kits nationwide? Seriously? It shouldnt be news
Back then, there wasnt a single offender DNA database that the Grim Sleeper was convicted with famil-
in the world. Now, they are standard in over 50 coun- ial DNA analysis. It should be standard operating
tries and expanding almost on a daily basis. Weve gone procedure.
through RFLP, Castro and the admissibility wars, Bu- Somewhat ironically Ive spent the week in
dowle and Lander and Nature Magazine, NRC I (and II), Manila, the Philippines with forensic DNA pioneer
Dotson and Bloodsworth, and Simpson. We are even George Sensabaugh speaking to law and forensic
looking at the reality of performing DNA analysis in 90 science students about the impact that DNA has had
minutes in police stations. DNA databases have been on criminal justice systems since its introduction. In
used to help convict serial killer Lonnie Franklin Jr., other words, none of my audience was alive for the
known as the Grim Sleeper, using familial testing, and Pitchfork conviction, and many werent even around
have also been used to exonerate 300 innocent people when O.J. Simpson was declared not guilty. As I
and counting in the US alone. looked at the picture of Pitchfork on my PowerPoint
On this odd recognition of the Pitchfork con- slide, and talked about all the future applications of
viction, its important to realize that the changes DNA technology that were contained in that one
brought about by the integration of DNA technology case, it struck me that our next responsibility is to
into the worlds criminal justice systems have been keep the next generation of forensic scientists, pros-
systemic. Statutes of limitations have been altered ecutors and defense attorneys inspired. Newness and
and even eliminated to allow for more exonerations novelty were great motivators for the scientists and
and to crack cold cases. The passage of legislation to attorneys responsible for DNAs seismic impact over
create DNA databases has created one of our more the last two decades. But DNA has been around long
effective crime fighting tools. But, the broadest im- enough now for Colin pitchfork to qualify for, and be
pact of DNA technology has been conceptual. denied, parole.
What started as a better piece of evidence has As a new generation of scientists and lawyers
become a better understanding of the weaknesses in integrate into criminal justice systems throughout
our system. Our concepts of quality forensic science, the world, its important to ensure that they are not
reliable evidence and trustworthy convictions have just good scientists and lawyers. As emphasized at
changed dramatically. Ultimately, thats a very good our conference in Manila, science in the service of
change. I would even argue that our sense of respon- society, must remain the core message of our educa-
sibility to that system has changed. We can do more tional efforts.
to protect the wrongly accused and the innocent vic-
tim, therefore we have the responsibility to do more. Chris Asplen is the attorney in charge of the Life
While original claims of DNA-based exonerations Sciences practice at Hill Wallack, LLP, and works with
were met with skepticism and automatic objection, the US Department of State and the United Nations as a
prosecutors now take a more thoughtful approach. legal expert.

JUNE 2016 Forensic Magazine | www.forensicmag.com 15


feature
Forensic Palynology
Tracking the Near Invisible
Xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
Seth Augenstein
Byline

W
hen the little girl known as Baby Doe was found in a plastic bag on a Massachusetts beach, investi-
gators had to keep their geographical possibilities open on the case. The girl could have been from

F
xxxxxx
virtually anywhere in North Americaor even beyond.
But it was the painstaking work of Andrew Laurence, a forensic pollen expert, that centered the
search in the local region. Some of the trace spores on the girls clothes and blanket showed the partic-
ular mix of oaks and pines and other ora native to Massachusetts. In fact, it even identied an exotic
cedar which further narrowed the search. The girl was later identied as Bella Bond, and her mother
and her mothers boyfriend are now awaiting trial on murder charges, partly on the microscopic detec-
tive work of Laurence.
Palynology gathered headlines from the public in the months since the high-prole breakthrough. This
week Laurence, program analyst for U.S. Customs and Border Protection, Laboratories and Scientic Ser-
vices Directorate, also helped make revelations on a 1981 cold case in Ohio, in the hopes the microscopic
evidence could crack the decades-old murder.
But theres just one catch: Laurence is pretty much a one-man band in American palynology. Only he and
his mentor Vaughn Bryant are trained to do the delicate forensic workand Bryant is often subsumed in his
academic responsibilities at Texas A&M University.
Basically, if anyone wants an analysis done, its me or Vaughn, Laurence told Forensic Magazine in an
exclusive interview. I have a fairly large backlog right now.
About 1,000 trained palynologists are working in the world right now. But the vast majority are employed
in the oil industry, since they are a vital resource to tell drillers how far back they are in time at certain depths
as they pursue fossil fuels, according to Laurence.
Only ve worldwide are currently pursuing forensic work.
Part of the difculty is the exacting combination of disciplines the work relies on. Geography, archaeology,
geology, climatology, and basic chemistry all go into the labor-intensive work.

Hardy grains, investigative


breakthroughs
The startling analysis is made possible by the
hardy little traces of trees and plants that are
around us all, all the time.
Each region has a signature that is indicated
by the mix of the spores: in the case of Baby
Doe, it was some 39 different types of spores
which were in her clothes, on her blanket, and
even stuck in her hair, Laurence said.
Laurence has to process all those minute
traces carefully with a gentle vacuuming
Andrew Laurence, program analyst for the US Customs and Border process. The lter is removed, and dissolved
Protection, Laboratory and Scientic Services Directorate. with a series of chemicals: an acetolysis solution

16 Forensic Magazine | www.forensicmag.com JUNE 2016


involving acetic anhydride and sulfuric acid, hydro-
uoric acid, and hydrochloric acid.
The debris and junk is removedleaving the
precious pollen spores, which are hardy and survive
the breakdowns (the structures even survive cycles
through a washing machine).
The distinct parts of the geographic recipe are left,
which Laurence then analyzes manually. Leads come
from the minute nuances on the slide under the
microscope.
For instance, the pollen on the 1981 Ohio homi-
cide victim, now known only as the Buck Skin Girl,
gives a wealth of information. It shows that her long-
time place of living was in the Northeast, since it
showed a mix of oak, pine, hickory, beech, chestnut,
and sweetgum. Most of those are found throughout
the Eastern U.S., but the traces of spruce further
narrowed down to a northern area.
All those grains were generally older and beat-up
from wear and tear and washing. The newest traces
were instead from spores from the American or Mex-
ican West, including mesquite and joint r, which
appeared brand-new. Andrew Laurence works on forensic cases using palynology,
They were in excellent condition. They were the study of pollen.
very recent, he said. Most of the Eastern pollen Children, which also led to his work on the Buck
grains were in very bad condition, like they had been Skin Girl case.
washed many times. Laurence, who grew up in the Cleveland, origi-
nally had aspirations to be a Navy pilot. But he was
Spores and cold cases sidelined by an injury early on in the Merchant Ma-
Laurence also noted the heavy soot which was locat- rine Academy. He switched to archaeology studies
ed in the clothes. That could indicate the girl was at Kent State, and later on was lured to the exacting
spending a lot of time in an urban environment with work because of Bryants experience at Texas A&M.
industrial areas nearbyor could have been hitch- The federal agency hired him right out of school,
hiking alongside the road with the exhaust from cars several years ago.
swirling constantly around her. Laurence told Forensic Magazine he wasnt
One working investigative theory is that the girl aware of other people being trained at his old
was from the Northeast, had traveled to the South- school or elsewhere in the forensic applications
west, where she could have picked up the buck skin of pollenbut the discipline could use more
jacket, and pollen traces, before being killed on the people.
way back home. I hope, he said, with a chuckle. Right now, we
The National Center for Missing and Exploited are the only agency doing this.
Children said they were hoping putting a new face
out with the new geographic leads could help crack Seth Augenstein is a science writer at Advantage
the 35-year-old case. Business Media. He previously worked as a crime beat
Laurence spends most of his time on intelligence reporter at the The Star-Ledger. His other work can be
work and national security cases. However, the found at www.sethaugenstein.com.
Baby Doe case was jump-started by a collaboration
with the National Center for Missing and Exploited

JUNE 2016 Forensic Magazine | www.forensicmag.com 17


f orensic PATHOLOGY:
Judy Melinek, M.D.
expert witness
Mind Your Manners
Where Death Certication Ends and Prevention Begins

T
he police pick up a 45-year-old man, a robbery natural? The man had been immobilized and showed
convict, for speeding. The arrest is a parole signs of injury on his legs from the restraint straps, so
violation. The man has a history of smoking is this death an accident? But, waithis immobiliza-
and substance abuse, and is obese. On his third day tion was forced. He had been restrained and injured
back in jail, he refuses to cooperate during a routine at the hands of the guards. This prisoners death
search of his cell. The corrections ofcers address should be a homicide. How about undetermined? Sui-
this behavior problem by strapping the man into cide is the only manner of death we would categori-
a restraint chair for cally discount.
several hours until he Medical examiners and coroners agonize over
calms down. After he manner of death all the time, and for good reason.
is released, he immedi- The cause of death, the disease or injury leading to
ately starts a ght with the lethal event, may be patently clear, but its the
another inmate. Once manner of death that the family hears and that the
again the guards strap press pounces on. Call an in-custody death such as
him into the restraint this one a homicide, and the media will immediately
chair, for several more pronounce that the police killed the inmate, even
hours, until he is if the corrections ofcers were only following their
compliant. The man training and jail protocol. Call an in-custody death
goes back in the chair accident or natural, and you might be accused of a
twice more over the cover up. Call it undetermined (a way of saying the
course of the next death doesnt fully categorize into one manner or an-
four days. After the other) and no one is happy: You get branded as either
Dr. Judy Melinek is a forensic nal time, he stands unscientic or indecisive. Or, both.
pathologist and does autopsies upand then, without
for the Alameda County Sheriff
a word, collapses. Hes
Coroners ofce in California.
lying on the oor of
What is manner of death?
The manner of death is a required part of the death
the jail, unconscious. He is not breathing. The guards
certicate, a system of classication most often used
initiate CPR immediately, but after a few minutes the
for data analysis in the realms of public health and
man is still not breathing and no longer has a pulse.
academic research. Every time you read an article
The guards continue CPR until paramedics arrive ten
that contains information about the ways people
minutes after the mans collapse. The medics declare
die, or compares types of deaths across geographic
him dead.
regions, the researchers likely started their analysis
The forensic pathologist conducting the autopsy
with publicly available death certicate data, sorted
nds that the man has a large saddle pulmonary
by manner of death.
embolus and blood clots in both legs associated with
But manner of death has a social function as well,
the strap marks from the restraint chair. The cause of
because, like it or not, we attach different moral
death is clearpulmonary embolus. Whats the man-
value to different ways of dying, even when the
ner, though? A blood clot traveled from the mans
mechanism is the same. In my experience, families
legs to his lungs. Obese smokers commonly develop
who have lost a loved one to a drug overdose dont
dangerous blood clots, so should this be certied as
object to the determination that the cause of death

18 Forensic Magazine | www.forensicmag.com JUNE 2016


was by acute mixed drug intoxication. Nor do they avoidable death will repeat with others under similar
object to my manner ruling that the overdose was circumstances. If we dont publicize it in the press,
an accident or a suicide, in some cases because of how will others learn from our experiences and adjust
religious prohibitions against suicide. their policies accordingly, before the next death?
One Pennsylvania coroner has been in the news The next time it happens, what will you do about it?
lately for classifying overdoses of illegal drugs as Will you call it another homicide, another accident,
homicides, so that the drug dealers will be prosecuted another natural death? Whatever your answer, you
for murder, even if the user injected the drugs himself will have a harder time explaining why another such
in order to get high. Sounds like a good idea, right? corpse has come to a slab in the morgue, and why
Drugs are illegal and the dealers should be punished. you didnt do anything to stop it getting there. We
The problem is, such an approach conates the duties forensic pathologists are physicians working in the
of scientic death classication with those of law realm of public health. Our jobour dutydoes not
enforcement. Our job is statistical and unbiased, and end with the death certicate.
we need a uniform classication system in order to
understand how people die in the real world, and to Dr. Judy Melinek is a forensic pathologist and does
study regional differences. Coroners in jurisdictions autopsies for the Alameda County Sheriff Coroners ofce
surrounding this Pennsylvania county have avoided in California. Her New York Times Bestselling memoir
following suit with this reclassication of manner in Working Stiff: Two Years, 262 Bodies, and the Making
drug deaths. of a Medical Examiner, co-authored with her husband,
T.J. Mitchell, is now out in paperback. She is the CEO
Just the beginning of PathologyExpert Inc.
We in the forensic sciences must work to commu-
nicate with the police, the families of decedents, and
with the public at large about the different manners
of death, about the national standards used in classify-
ing deaths, and about our decision-making process in
arriving at a conclusion in each individual case. We
must do so as part of our professional duty to public
health in seeking to reduce our national burden of
avoidable deaths. We spend a lot of time agonizing
about the mannerbut the determination of manner
doesnt matter if we dont then do something to coun-
sel the decedents family, to explain what happened to
the public, and to prevent this from happening again,
if what happened was at all preventable.
Some jurisdictions will call our hypothetical case
study of the prisoner with the embolus a homicide.
Others might call it an accident. A few might even
decide this was a natural death. Regardless, they will
all be remiss if they stop with cause and manner. We
coroners and medical examiners have an ethical duty
to do more than just check a box on a death certif-
icate and wait for the inevitable lawsuit. We have
a duty to reach out to those in power to change the
lethal environment by educating the jail staff and the
corrections department managers who write the pol-
icies and procedures. If we dont reach out to other
professionals in other county agencies, one mans

JUNE 2016
ColdCase Dolly Stolze

CHRONICLES
The Black Dahlia: The Murder of Elizabeth Short

T
he murder of the Elizabeth Short, better known as The mother called the
the Black Dahlia, is the most infamous unsolved police and dispatch alerted
murder in Los Angeles history. She was a beautiful patrol units in the area over
heroine of a real-life lm noir that ended with her brutal the radio. Because newspaper
murder. For decades, detectives and journalists investigated reporters also listened to the
the slaying of Elizabeth Short and put forward their own police radio bands, journal-
theories about the identity of the murderer. The FBI le ists from the Los Angeles
on the Black Dahlia murder is probably one of the best Examiner were the rst people
resources of the early days of the investigation.1 on the scene. According to
Elizabeths body was discovered on January 15, 1947 in an FBI memo dated February
a vacant lot in a residential neighborhood and the FBI 20, 1947, the press arrived at
became involved the very next day. But the Bureaus role the scene before police, took Dolly Stolze is a researcher
was purely to provide assistance to the LAPD for things pictures of the unidentied and editor at Strange
like analyzing evidence and checking the backgrounds body, and handled some of Remains, a blog site that spe-
of suspects. The FBIs le is not an all-inclusive resource the evidence. cializes in forensic science,
on the murder investigation, which it admits, because it Harry Hansen and Finis bioarchaeology and bizarre
history.
doesnt have nearly has much detail as the LAPD les. Brown were the lead LAPD
But it does shed light on the investigation, evidence, and detectives assigned to the case. When Hansen and Brown
suspects.2 arrived at the scene they quickly determined that the un-
The le contains internal communication within the identied woman had been killed and drained of her blood
FBI regarding the case, letters from random people to J. Ed- somewhere else and dumped in the lot.
gar Hoover with tips about the killer and the case, reports
on forensic evidence, and newspaper clippings. Autopsy and Evidence Collection
On January 16, 1947 assistant chief deputy medical
Last Days and Discovery examiner of Los Angeles, County Frederick Newbarr
Elizabeth was born on July 29, 1924 in Boston, Mass. In performed the autopsy on what was still a Jane Doe.
January of 1943, she moved to Santa Barbara and applied Newbarr determined that her cause of death was
for a job at the Post Exchange at Camp Cooke, an Air hemorrhage and shock due to concussion of the brain
Force Base, where she provided her ngerprints as a routine and lacerations of the face. Also, despite disappearing a
part of the application process. On September 23rd of that week prior, she had been dead been dead about twelve
year Elizabeth was arrested by the Santa Barbara Police for hours, thats probably why the date of death on the
underage drinking and sent home to Massachusetts.1 death certicate is listed as January 14th or 15th.1
Short moved back to Southern California in July of The unidentied woman had three deep abrasions over
1946, and, for the next six months, she moved between Los her right eye and had small pieces of esh incised from her
Angeles, Long Beach, and San Diego. She was last seen body. Most notably the corners of her mouth had been cut
alive on January 9, 1947 by Robert Red Manley, a man three inches while she was alive. Also, her body had been
she had once dated, dropped her off at the Biltmore Hotel.1 cleanly bisected post-mortem between the second and
The morning of January 15, 1947 a mother walked with third lumbar vertebrae. None of the internal organs were
her daughter across a vacant lot on Norton Avenue near damaged except for where the intestines were severed.1
39th Street when she noticed the form of a woman in the The body was scrubbed so thoroughly that the autopsy
grass near the sidewalk. At rst she thought she was looking surgeons found bristles from a brush on the chest and
at a mannequin but, as she walked closer, discovered that among the internal organs. These bristles were submitted
it was the body of woman who had been cut in half at the to the FBI for analysis. The FBIs report on the bristles
waist.2 didnt note anything distinctive about the bristles. They

20 Forensic Magazine | wwww.forensicmag.com JUNE 2016


were plant bers, maybe palm tree, used inexpensive Then a person, who said they were the killer, started to
brushes.1 taunted the press and the police. The editor of Los An-
geles Examiner received a call from a person claiming to
Identication of Elizabeth Short be the Elizabeths Shorts killer on January 23, 1947. The
Fingerprints were taken during the autopsy in order anonymous person claimed to have Elizabeths belongings
to identify the body. On January 16, 1947, thanks to a and offered to mail them to the newspaper. The next day
coordinated effort with Detectives Hanson and Brown, the postal service intercepted a package with the following
the Los Angeles Examiner, the Washington Bureau of the message spelled with letters cut from newspaper clippings,
Hearst Newspapers, and International News Photos, the Here is Dahlias belongings letter to follow. The package
Jane Does ngerprints were transmitted to the FBI in DC contained Shorts birth certicate, photographs, a claim
with soundphoto equipment, an early fax machine system ticket for a bus station locker, diary, and address book.1
designed to transmit photos for news agencies. This almost On January 26th the Examiner received a hand-written
instantaneous transmittal of forensic evidence for analysis letter that said: Here it is. Turning in Wed, Jan 29. 10
was unique for the time and praised as a feat of technologi- A.M. Had my fun with police. Black Dahlia Avenger. The
cal innovation and interagency coordination.1 time came and went but no one showed up.3
The FBI received the pictures of the Jane Does nger- They did run the prints on the letter but found no match
prints the morning of January 16th and ran them against in their collection. The FBI took no further action because,
their catalogue of more than 104,000,000 prints. A few as stated in an FBI communication on March 7, 1947, No
hours later the identication was made as 22-year-old Eliz- subsequent mail or communications contained any material
abeth Short of Boston, MA. The Bureau matched the Jane to indicate the writers have any knowledge or connection
Does ngerprints to criminal prints submitted by the Santa with instant case.1
Barbara Police Department for Elizabeth Shorts underage Detectives investigated everyone in Elizabeths life:
drinking arrest, and a national defense print submitted by ex-lovers, people pictured with her in photographs, and
Camp Cooke when she applied for a job at the base.1 names mentioned in address books. Some of these suspects
Although her friends called her Beth and Betty, the press are documented in the FBIs Black Dahlia le in internal
almost immediately dubbed her the Black Dahlia. There memos and newspaper clippings. The LAPD asked the
isnt a consensus about how Elizabeth Short got the nick- Bureau to run background checks, check criminal records,
name. Some say she inspired it when she was alive because and analyze ngerprints with latent prints related to the
of her fondness for black hair and black clothes. Others case. They checked out John Henry Shippey, who posed in
say that the nickname came about post-mortem and was a picture with Elizabeth; Peter Vetcher, an ex-lover who last
inspired by the 1946 lm noir classic The Blue Dahlia.1 saw her in 1946; Jeff Connors, real name Arthur Lane, a bit
player in lms who admitted to seeing Elizabeth Short the
Suspects, Leads, and Dead Ends night she disappeared; and Robert Red Manley, who was
Over the next six decades police followed countless leads, one of the last known people to see Elizabeth alive. Again
questioned hundreds of people, and received dozens of false the LAPD hit a dead end.1
confessions. In the days and weeks immediately following
the discovery of Shorts body, newspapers hypothesized that References
Shorts murder was related to unsolved homicides in San 1. FBI Records: The Vault. Black Dahlia (Elizabeth Short). Retrieved
from: https://vault.fbi.gov/Black%20Dahlia%20(E%20Short)%20
Diego and Los Angeles.
2. The Black Dahlia Murder, (2003). Retrieved from: https://www.
On January 17, 1947 The L.A. Daily News published fbi.gov/news/stories/2006/october/dahlia_102006
an article titled Grisly L.A. Murder Similar to Slaying 3. Hodel, S. (2006). Black Dahlia Avenger: The True Story. New
of Seven San Diego Women in it was hypothesized that York, NY: Harper Collins.
Elizabeth Shorts slaying was related to seven unsolved ho- 4. Ex-Cop Cites New Evidence His Dad Was Black Dahlia Killer.
(2014). Retrieved from: http://www.nbcnews.com/news/us-
micides in the area because Short had spent a few weeks in
news/ex-cop-cites-new-evidence-his-dad-was-black-dahlia-n119861
San Diego shortly before she died.1 Then The Los Angeles
Examiner speculated on February 19, 1947 that the Black
Dolly Stolze is a researcher and editor at Strange Remains, a
Dahlia murder was related to the killing of Mrs. Jeanne
blog site that specializes in forensic science, bio-archaeology and
French 45 year-old nurse and aviatrix, whose nude and
bizarre history. She has a masters degree in forensic anthropology
beaten body was found on February 10, 1947. But this line
from California State University, Los Angeles.
of thinking went nowhere.1

JUNE 2016 Forensic Magazine | wwww.forensicmag.com 21


Digital
DIGITAL FORENSIC INVESTIGATION

forensic insider
John J. Barbara

Encrypted Cell Phones

N
ational and international headlines were made text form, the encrypted data will remain unread-
recently when the U.S. Government served able and unusable. Another form of encryption is
Apple with a court order to assist the FBI Asymmetric encryption. It uses two different keys,
in cracking the passcode on an iPhone used by San one to encrypt the data and another one to decrypt
Bernardino shooter Syed Farook. This appears to be a it and is often referred to as public key encryption.
reasonable request as it concerns matters of national Users generally make the encryption key public,
security. However, the request may exceed the author- but keep the decryption key private. Thus, anyone
ity of the All Writs Act of 1789 and conict directly can send an email or file encrypted with the public
with the Fourth Amendments search and seizure key, but only the recipient can decrypt it using the
protections which extend to police searches of places private decryption key.
and items (i.e. cell phones) in which an individual has
a legitimate expectation of privacy. Encryption is cen- iPhone Encryption Basics
tral to the discussion as it involves an individuals right Apple has integrated encryption into the hardware
to privacy vs. the needs of law enforcement to conduct and rmware of their iPhones. The iOS uses a dedicated
a criminal investigation. AES 256 bit cryptographic engine in conjunction with
a SHA-1 cryptographic hash function which resides
Encryption Basics between the main system memory and the ash storage.
The purpose of encryption is to secure sensitive infor- Every iPhone also includes a Unique IDentier (an
mation from being readily accessed by an unauthorized AES 256-bit key fused into the application processor)
user. Encryption is essentially a mathematical transfor- which causes the data to become cryptographically
mation which uses a program called an algorithm or linked to a specic iPhone. It cannot be tampered
cipher to transform accessible data or information such with, bypassed, accessed by any software or rmware,
as an email or photograph (plaintext) into an unin- and is not recorded anywhere. Data les are associated
telligible code (ciphertext) which cannot be read or with specic classes, each supporting different levels
understood by normal means. After being transformed, of accessibility. Each classs encryption and decryption
a cryptographic key (a long string of data) works like operations are based upon a complex key hierarchy: the
a password to protect the data or information. The UID and passcode, class keys, le system keys, and per-
plaintext appears as random meaningless gibberish le keys. Per-le keys encrypt the les and the class key
and does not reveal anything about the content of the functions along with the per-le keys and are stored in
original data. Once encrypted, no person (or machine) the le metadata. File system keys encrypt the metadata
can discern anything about the content of the original and the UID and passcode serve to protect the class key.
data by reading its encrypted form.
Encryption is a reversible transformation. Each Cell Phone Data and Information
encryption and decryption function requires a Whenever a text message is sent, a photograph
cryptographic key (a string of binary digits used as uploaded to a social media account, or a mapping pro-
an input to encryption and decryption functions). gram is used, much of the data migrates to the comput-
To decode the encrypted data and render it back to ers owned by cell phone providers. However, not many
plaintext that can be easily understood, both the en- people realize that information is also being stored on
cryption and decryption functions must use the same the cell phone itself.
cryptographic key. This is referred to as Symmetric
key encryption. There is no other way to read the s Text Messages
ciphertext. If for some reason the ciphertext cannot Text messages transmitted from one phone to another
be reversed back to its original unencrypted plain- pass through the computer systems of the providers who

22 Forensic Magazine | www.forensicmag.com JUNE 2016


retain metadata such as information on when text mes- microchips, it is possible to trace everywhere the phone
sages were sent and to whom. This metadata is generally has been! For instance, Google Maps Timeline stores
used for billing purposes. The actual body of the text precise, detailed location data. The iPhones Frequent
messages is only stored for as long as it takes to transmit Locations can provide a listing of specic locations as
and then is deleted by the carrier. Apples messaging well as when and how often the location was visited.
app, iMessages, works differently. There is no metadata For instance, if you went to work twenty days last
as it is all sent to and from Apple itself. Cell networks month, not only will it tell you that, but also what time
transmit the encrypted message to Apples servers or you arrived and left each day! If this feature was oper-
if sent via Wi-Fi, bypass the cellular carriers. Messages ating on Syed Farooks iPhone, it would be invaluable
that have been backed-up can be recovered. Apple does information.
not retain the messages as they are routed from phone
to phone. Summary
Smartphones contain the most intimate data of our
sPhotos everyday lives. Not only do they contain our credit card
Photographs remain until they are shared, backed-up, and nancial information, but also record where we go,
downloaded, and/or deleted. Even after being deleted, who we talk with, what photographs we have taken,
its possible they can be recovered using sophisticated who are contacts are, what social media services we
forensic software. A user can set up a smartphone to frequent and so forth. All of this information can be
manually or automatically save his/her pictures. Syed exploited by hackers, identity thieves, advertisers, or
Farooks iPhone had apparently not been backed up government entities.
for at least a month thus it is possible it may con- So, why would anyone want to encrypt his/her cell
tain pictures that could be of immense investigative phone? Fairly obvious. Needless to say, the cell phone
potential. contains a virtual goldmine of personal and private
information. Current technology makes it impractical
s Email, Contacts, and More to brute force crack an encrypted cell phone, especially
Email providers normally store user generated emails one that has a limit on the number of unsuccessful
on their servers which can be accessed via a search tries before the data is totally corrupted or erased.
warrant or subpoena. Emails can also be saved on the There is no easy resolution to the inherent conict
cell phone itself. The users Contact list is only stored on of an individuals right to privacy and the needs of
the cell phone (unless it was backed-up somewhere to a the government to protect us. If a company can be
cloud computer). Information such as the users browser compelled to compromise its own security features and
history, a list of movies watched, any records pertaining protections for its cell phones and customers, virtu-
to purchases made online, self generated notes and doc- ally every piece of personal and nancial data may
uments, documents received as attachments to emails, become readily available to a potential hacker. On
and any user generated videos can also be found on the the other hand, not having access to an encrypted cell
cell phone. phone will certainly hinder law enforcement criminal
investigations and perpetrators of horrendous crimes
sTracking Where You Are or Where Youve Been may remain at-large. Whats the solution? Whats the
Most individuals do not realize that a cell phone pro- compromise?
vider can use multiple towers to triangulate the location
of a specic cell phone in real time (such as when a John J. Barbara owns Digital Forensics Consulting,
911 call is made). Although not always precise, records LLC, providing consulting services for companies and
regarding when and where normal calls originate are laboratories seeking digital forensics accreditation. An
sometimes maintained by providers for a year or more. ASCLD/LAB inspector since 1993, John has conducted
A considerable amount of geographic data can be inspections in several forensic disciplines.
stored on the cell phone. Since smartphones have GPS jjb@digforcon.com

JUNE 2016 Forensic Magazine | www.forensicmag.com 23


Who says you
Cant do that? Dick Warrington

Crime Scene Vehicles: The Right Vehicle for the Job

A
ccess to the appropriate equipment is key to vans, box trucks, or old ambulances. All of these vehi-
processing a crime scene. A good crime scene kit cles have the benet of providing extra storage space. By
is an obvious rst step. But you also need to think adding shelves and other storage containers, you can make
beyond the basics. What other equipment will you need? it easier to keep your equipment and the evidence you
How will you ensure that equipment is available when you gather organized and well-protected. Ambulances are often
need it? A crime scene vehicle provides a convenient way an especially good choice for a crime scene vehicle because
to store and transport essential equipment, allowing you they already have built-in containers that can be retro-
to process evidence at the scene. Choosing the right crime tted to your needs. Ambulances, box vans, and box trucks
scene vehicle will depends on your needs. also have the advantage of being large enough to walk
The simplest and cheapest solution to the problem of around in comfortably. These vans and trucks may also be
storing and transporting equipment is to load everything equipped with their own generators, lighting systems, and
into the trunk of a patrol car. Many agencies in areas with work stations.
low crime rates and tight budgets rely on this solution. Being able to move comfortably inside your vehicle can
In general, it works neespecially when youre talking be a huge advantage. Depending on just how much room
about the basic equipment that every crime scene in- you have to maneuver, you may be able to le reports,
vestigator should bring to every scene. Supplies such as: send data, and process your evidence right at the scene.
ngerprint and photographic equipment, blood collection Performing these tasks at the scene can save you time
and evidence packaging supplies, casting and impression and help with your investigation, especially when youre
equipment, biohazard kits, and miscellaneous measuring dealing with major crimes.
devices, labels, cutting tools, and ashlights. The next step up from retrotting an existing vehicle is
Relying on the trunk of a patrol car has some obvious purchasing a customized mobile crime scene lab. The two
drawbacks. First, its difcult to keep equipment organized. basic types of labs are a container style that needs to be
In addition, patrol cars have limited space; you may run delivered to the scene, and a motorized style that can be
into a problem if a scene requires special equipment. For driven to the site. Once the container is delivered by the
example, items such as extra lighting sources, large tents, semi-trailer to the scene, it takes about 45 minutes to set it
and privacy screens wont t into the trunk. You will need up. Motorized vehicles, on the other hand, are built on a
access to a larger vehicle to get those items to the scene. bus or RV-type platform and do not require any additional
Because of these problems, many agencies opt to set-up time. Most labs will likely contain their own genera-
purchase a separate vehicle to handle their crime scene tor, water supply, fuming chamber, copy stand for photog-
investigation equipment. Examples include panel or box raphy, computer work stations, portable lighting sources,
and additional stations for processing items for ngerprints.
Take the time to think about both your current needs and
Advertiser Index your future needs.
Finding the right mobile crime scene vehicle for your
Labconco Corporation ............................................... 26 agency is a complicated task. It involves looking carefully
www.labconco.com at your cases, your expertise, and your budget. Once you
gure out the right way to balance the need for storage
Life Technologies...................................................... 28 space and work space, then you can decide what vehicle or
www.thermosher.com combination of vehicles will help you get the job done.
Promega Corporation ...................................... 2, 25, 27 Dick Warrington is retired from the Shawnee County Sheriffs
www.promega.com Department in Topeka, Kan. where he spent 25 years in law
enforcement. He is now a training instructor for the Lynn
Peavey Company. dwarrington@peaveycorp.com

24 Forensic Magazine | www.forensicmag.com JUNE 2016


Discover the CE
youve been missing

LAST SAMPLE!!

Come on a journey of discovery to see what the Spectrum CE System can do


for you. Built and supported by Promega, Spectrum is thoughtfully designed
to provide user-friendly software, more information from challenging samples,
and greater exibility and efficiency in processing samples.

Sign up for the e-newsletter to discover all the delightful details that make
Spectrum a CE worth waiting for. www.promega.com/Spectrum2016

2016 Promega Corporation. All Rights Reserved. 28131450


Labconco forensic enclosures deliver
How unique features that matter the most.
Solving crimes can be complicated. Let Labconco forensic
do you enclosures, developed with input from forensic experts,
process the evidence so you can solve the crime. It really

make is elementary.
 t .JDSPQSPDFTTPSDPOUSPMMFEQSPHSBNNJOHGPSWFSTBUJMJUZ 

crime-solving 

 BOEQSPUPDPMnFYJCJMJUZ
t%JHJUBMQBSBNFUFSGFFECBDLGPSIJHIFTURVBMJUZ DPOTJTUFOUSFTVMUT

easier? 

t 4VQFSJPSNBUFSJBMTPGDPOTUSVDUJPOGPSEVSBCJMJUZBOEFBTF 
 PGPQFSBUJPO
'PSNPSFJOGPSNBUJPO DBMM800.821.5525PSWJTJU
www.labconco.com/forensics
Elementary.

Protector
Evidence Drying
NEW!
Cabinet CApture BT
Fuming
Chamber

CApture
Portable Fuming
System

Protector Downdraft
Powder Station

,BOTBT$JUZ .0] Made in the USA

XXXMBCDPODPDPN

f
Hear about the latest developments in forensic
DNA at ISHI 27, the largest symposium to focus
on DNA typing for human identication. Network
with forensic scientists from around the world, and
advance your understanding of the current and
future state of the eld.

Register by August 1 and save $100


on the conference registration fee.

Learn more at: ishinews.com

MINNEAPOLIS, MN SEPT. 26 29, 2016

2016 Promega Corporation. All Rights Reserved. 27984474


you trust
Condence from quality results
Integrated solutions for sexual assault casework
Comprehensive and integrated solutions for sexual assault casework from Thermo Fisher Scientic are designed
to deliver maximum efciency and condence. Featuring 3 of our most powerful Applied Biosystems kits, this
total workow enables precise information the rst time through.

Solutions include:
Quantiler Trio DNA Quantication Kit for simultaneous quantitative and
qualitative sample assessment to streamline workow and decision making
GlobalFiler PCR Amplication Kit for high sensitivity and discrimination
with 6-dye, 24-locus technology
Yler Plus PCR Amplication Kit for high discriminatory power due to
7 rapidly mutating Y-STRs

Watch a video of these kits in action


thermosher.com/sexualassaultsamples

Unless stated otherwise in the individual product labeling, products listed are For Research, Forensic, or Paternity
Use Only. Not for use in diagnostic procedures. 2015 Thermo Fisher Scientic Inc. All rights reserved. All trademarks
are the property of Thermo Fisher Scientic and its subsidiaries unless otherwise specied. CO018805 0915

Vous aimerez peut-être aussi