Forensic intelligence and crime analysis
|
|
|
- Maude Lawson
- 10 years ago
- Views:
Transcription
1 Law, Probability and Risk (2003) 2, Forensic intelligence and crime analysis O. RIBAUX AND A. GIROD Institut de Police Scientifique et de Criminologie, BCH, Université delausanne, 1015 Lausanne-Dorigny, Switzerland S. J. WALSH Centre for Forensic Science, University of Technology, Sydney, Australia AND P. MARGOT, S.MIZRAHI AND V. CLIVAZ Institut de Police Scientifique et de Criminologie, BCH, Université delausanne, 1015 Lausanne-Dorigny, Switzerland [Received on 21 October 2002; revision received on 1 March 2003; accepted on 4 March 2003] Computerized databases have been developed in forensic science to provide intelligence for the investigator. For example, automated fingerprint identification systems (AFIS) and DNA databases efficiently help identify potential suspects or, particularly for DNA, link crime scenes. Other evidence such as various marks transferred during the offence, items left by the offender (such as clothing or accessories) or information captured through devices such as surveillance cameras could also be exploited systematically to provide similar intelligence. However, if such systems exist under the form of operational databases, they commonly struggle to overcome computational complexities pertaining to the retrieval and comparison of traces from large quantities of data. Thus, the use of forensic case data combined with the temporal and geographical dimensions of the crime is often felt as a necessary development, but the circumstances in which the visualization of traces on maps can help to provide accurate and useful analyses remain to be identified. A limited study will illustrate the potential of forensic case data to provide intelligence through inferences which vary from the traditional model initiated by DNA and AFIS databases. Specifically, it shows that the occurrence of certain characteristics of shoemarks, toolmarks and/or glovemarks can be concentrated in geographical areas and/or during delineated periods of time. These clusters can then be scrutinized to help reveal a series of potentially linked crimes. The experiment confirms that this two-step process, which does not require the implementation of complex computer systems, can be systematically applied as a crime analysis method and as an investigative tool. Keywords: intelligence-led policing; crime analysis; forensic intelligence; shoemark; toolmark; glovemark. [email protected] c Oxford University Press 2003, all rights reserved
2 48 O. RIBAUX ET AL. 1. Introduction The evolution of policing strategies and new technologies has dramatically increased the role of intelligence in law enforcement agencies. Despite difficulties implementing former community-based and problem-oriented (Goldstein, 1990) philosophies beyond specific experiments (Brodeur, 1997), it is now generally recognized that intelligence has an important role to play in both the diagnosis of insecurity problems and the design of targeted, preventative actions (Gottlieb, 1998). The strategic allocation of resources to the most significant problems and the measure of police performances (essentially through crime reduction indicators) provide additional managerial motivation for enhanced intelligence-based approaches to policing. The increased role of intelligence has been augmented through the creation of crime analysis units within police organizations. However, the implementation of these new structures has occasionally encountered resistance. It is not always clear why the police should expand their role when there is often a lack of resources to carry out their traditional job. Ideologically, the new strategies can be perceived as reducing the importance of single investigations and consequently changing the role of the investigator. Moreover, it opens the door of the confined police community to civilian employees. Finally, crime analysis is a transversal process across vertical hierarchies; these favour the obedience to traditional hierarchical demands whereas demands by other colleagues or services may be answered but inalow priority order. These may be compounded by traditional boundaries jealously preserved as specialist fields of expertise. As a result of this background, crime analysis has attracted researchers from different academic communities such as geography, psychology and criminology. Their work has provided the domain with an impressive set of models, methods and computerized tools (Gottlieb, 1998; McGuire, 2000; Peterson, 2000). Moreover, thoughts about the relationships between criminal intelligence analysis and specific bodies of scientific knowledge are now appearing in the literature, for example in the discipline of psychological profiling (Atkin, 2002). Forensic scientists have also participated in the debate, mainly through the development of databases (Sprangers, 1997), but also through crime reduction projects and research programmes that encourage increased utilization and awareness of forensic science among all the contributors of the criminal justice system (FSS, 2000; NIFS, 2002) This change of attitude has led to more funding, a remarkable technological expansion and specific successes in crime solving. For instance, innovative uses of databases provide new forms of intelligence that were previously unimaginable or simply precluded by legal rules (Anonymous, 2002). However, whereas recent progress allows forensic intelligence to assist better the police in specific criminal cases, there is still a lack of understanding of how to go beyond traditional identification, such as is possible through DNA or AFIS databases (Walsh et al., 2002). Other forensic science research suggests the systematic use of traces like shoemarks, combined with geographical information in order to provide crime scene linking (Birkett, 1989; Milne, 2001; Napier, 2002). These approaches help to narrow the gap between forensic science and crime analysis but fail to make this intention explicit. Intelligenceled policing tempts forensic science to operate in a new context, within which it is yet to find its place (Walsh et al., 2002).
3 FORENSIC INTELLIGENCE AND CRIME ANALYSIS 49 Previously (Ribaux & Margot, 1999, submitted) we have proposed a framework for crime analysis that fully integrates forensic case data. It was argued then that this conceptual model should be based on two main components: a structured memory that represents the knowledge we have at a certain time about the criminality under consideration: current problems, active series, cases linked, etc. (basic intelligence). an organized repertoire of systematically, frequently or possibly applied inference structures that reveal how to combine the use of different types of data in the course of the analysis. This framework helps understanding of the relationships between forensic science and crime analysis, the design of specific intelligence processes and computerized systems, the interpretation of new situations in the light of what is already known, and the integration and organization of the knowledge originating from these new experiences. It also provides an opportunity for initiating the debate about management of memory and treatment of uncertainty. The concept of intelligence will be recalled and extrapolated to the forensic context. Areview of traditional inference structures that are applied through the use of forensic databases will follow. Finally, we illustrate how innovative inference structures can enrich our existing collection. The examples provided have been successfully applied in actual cases and have a great potential for systematic exploitation as a crime analysis method. 2. Intelligence It is generally recognized that intelligence is the timely, accurate and usable product of logically processed information. In the context of the criminal justice system the information pertains to crime and the context in which it occurs. For instance, from a series of crimes, a hypothesis about where the criminal lives or when and where he will next offend can sometimes be inferred from the available data. These judgements provide leads that are then translated to operative measures like surveillance or targeted police patrols. This interpretation step, called analysis, is often considered as the heart of a process embodying the whole treatment of data, from its collection to the practical implementation of the intelligence itself ( the intelligence process, see Peterson, 2000). Analysis can involve a variety of knowledge from different specialized fields such as criminology, computer science, psychology, forensic science and economics. Reasoning on imperfect information (which is systematically uncertain, incomplete, imprecise or even contradictory) can generate intensive debate, in those domains where inferences are carefully studied and discussed, with the aim of providing intelligence through well grounded criminal investigation methods. However, a lot of effort is generally dedicated to the construction of elaborate formalisms whereas the accuracy of the results in the real context of the investigation can vary broadly. The practical benefit of these research activities is sometimes difficult to evaluate and even questionable, as for some psychological approaches (Beauregard & Proulx, 2001; Santtila et al., 2003). Contributions from specialized domains are often considered a complement to crime investigation by implicitly making the assumption that the intelligence will be integrated
4 50 O. RIBAUX ET AL. FIG.1. From information to intelligence. via well defined investigative frameworks. In actual fact, criminal investigation is rarely formalized and mostly requires the processing of common sense knowledge (Kind, 1987; Ribaux et al., 2002). Criminal intelligence analysis should therefore be considered as a domain that provides methods and techniques that assist the integration of data and various bodies of specialized knowledge, the result of which is to structure better the reasoning processes used in the course of investigations and to communicate effectively the results to partners (Fig. 1). 3. Forensic intelligence By definition, forensic science already plays an intermediary role between specialized fields of science and law enforcement. Repeating our earlier definition, forensic intelligence is the accurate, timely and useful product of logically processing forensic case data. It can be illustrated by Fig. 2. Of importance is the implication of an additional level of consideration, where collectively (across numerous investigations or various disciplines), the outcomes of forensic analyses become the source of intelligence. 3.1 Inferences and their context It is generally recognized that the practice of forensic science is founded on four basic inferences, or processes: identification, individualization, association and reconstruction. They aim to help, in various degrees, answer investigative questions of who? what? where? why? when? and how? (Inman & Rudin, 2001)
5 FORENSIC INTELLIGENCE AND CRIME ANALYSIS 51 FIG.2.Forensic intelligence. The paradigm suggested by Kind (1994) captures the different contexts in which those inferences are carried out. He considers the crime investigation process and its subsequent criminal trial, within a framework composed of three chapters : the problem to find, the decision to charge and the problem to prove. A globally inductive reasoning process leads to the identification, localization and arrest of authors of crimes (first chapter), whereas logical inferences become essentially deductive when the investigator has to refine and check his standpoint and remains convinced he has the right culprit in his hands (second chapter). The trial itself constitutes the third chapter. Forensic science traditionally focuses on the second and third chapter, whereas criminal intelligence and consequently forensic intelligence are mainly concerned with the first chapter, even if the knowledge gained a priori can be re-used and refined after the arrest of a suspect. 4. Databases and inference structures The use of AFIS and DNA databases illustrates one of the most common forms of analysis that is based on forensic case data: helping to determine the source of a trace. Recent and innovative approaches allow the extraction from the databases of frames delineating more than one individual. For example, the comparison of a partial DNA profile, select features from a mixed DNA profile, or a putative DNA profile (which has for example been constructed from the profile of family members) may match many samples contained on the database (see Fig. 3). Such results, however, are still frequently misunderstood by investigators who have a tendency to view DNA and fingerprint findings as a definite determination of the source of a trace. This confusion emphasizes the importance of the definition of the context in which those databases are used, in criminal intelligence (chapter 1) or as the demonstration (proof,
6 52 O. RIBAUX ET AL. FIG.3. Using DNA databases to identify possible suspects through the comparison of incomplete DNA profiles. Subsequent combination with other forms of intelligence can then assist with the identification or investigation. chapter 3), in order to avoid misunderstanding and loss of intelligence because the scientist will not take the risk to have their results used for any purpose other than the final proof. 4.1 Identification of the source: limits of other databases Despite these potential ambiguities pertaining to an extension to the role of the databases, DNA and AFIS systems are very efficient as an aid to the identification of an offender. However, an expansion of the platforms upon which they are based to include other types of evidence is not straightforward. Matching and retrieval algorithms used to identify and compare traces in large quantities such as DNA and fingerprints are successful, but the transposition of these algorithms to other databases encounters difficulties in overcoming the different levels of complexity associated with the fragmentary and visual nature of trace evidence types. This has been demonstrated through experimental attempts at utilizing toolmarks or shoemarks in this fashion. Moreover, when the source of a trace is an object or an accessory that a criminal can discard, the chance of obtaining links with stored data decreases and the accuracy of the database is reduced. These drawbacks do not mean that marks of objects and accessories collected are not worthy of treatment through computerized systems. They should rather be considered as a support not only to identify the source, but also along other reasoning patterns that combine different sources of data (Ribaux & Margot, 1999). Comparison of shoemark databases used in forensic laboratories illustrates the lack of understanding of this expanding role of physical traces in criminal
7 FORENSIC INTELLIGENCE AND CRIME ANALYSIS 53 intelligence: their structure, size and intentions vary broadly across jurisdictions (Majamaa, 2000). The disparity of contexts within which these diverse databases operate illustrate the difficulty because they have not been developed within a conceptualized framework. Thus there is a need to study the circumstances in which various types of physical traces can provide intelligence through treatment of the data collected. The role of DNA databases, for example, can be expanded beyond their traditional use in identifying the source of a biological trace. 4.2 Expansion of the role of DNA databases When DNA databases were developed, the whole process, from the collection of samples to the interpretation of results, was carefully designed towards the goal of identifying the source of an individual trace, even if there remained some room for variation (see above). What was certainly known but generally very poorly anticipated when implementing the database process is that DNA has a great potential for scene linking. The forensic community is itself often sceptical about the importance of this side effect, highlighting once again poor understanding of the potential of trace evidence for intelligence purposes, although its validity, reliability and inherent indicative power is often much stronger than any other investigative type of information (witnesses, observation, etc.). Every forensic practitioner has heard in his or her professional circle that it is of no use to connect cases because it does not give the name of the perpetrator. At least in Switzerland, but certainly also in other countries, no systematic management of this information has been planned. This passivity is largely influenced by the traditional role of forensic science within the criminal justice system, but is ignorant of the fact that linkage is a basic inference in criminal investigation and in crime analysis. This information should be stored, treated and exploited in combination with other types of data. A case example helps to illustrate this point. Over a three year period, a burglary problem was revealed and when studied by the regional crime analysis unit it was found to extend over the entire region across multiple political boundaries. A link was provided by the DNA database that showed the existence of a series (same perpetrator). It connected two specific cases located at opposite ends of the region of interest. The analysis of the files where individuals had been identified as the sources of traces collected in cases of that nature led to the identification of a suspect, a known burglar residing in a neighbouring country. Subsequent investigations led to his arrest and it has since been verified that his DNA corresponds to the traces collected in the original linked cases. A large number of previously unsolved cases have been subsequently attributed to this individual. In this example, a new link has been interpreted through a priori knowledge about the current structure of burglary in one region and along a rather complex inference pattern (see Fig. 4). Usually, this kind of knowledge is disseminated among investigators that treat specific cases. The implementation of a crime analysis unit allows the centralization, integration and interpretation of that information in order to draw a general picture of criminal problems that can in turn help to interpret new and specific situations.
8 54 O. RIBAUX ET AL. FIG. 4. Two crimes had similar modus operandi (B) were confirmed as part of a series through a scene-to-scene DNA match (A) and subsequently linked to a broader phenomenon (C). Consideration of other knowledge from the broader phenomenon identified a suspect (D) who could be identified through various traces in a multiple offence case. 5. Crime analysis Crime analysis aims at revealing problems, analysing their potential causes and trying to foresee their development in order to determine where best to target law enforcement resources. A combination of exploratory, statistical and visualization methods help reveal patterns in large quantities of information. The information itself is an integration of a broad variety of data representing for example crime incidents, physical environments, socio-economic and demographic features of a population, or physical traces. The revelation of crime concentrations (known as hot spots ) is essential in this context as it focuses attention on delineated problems which define themselves via a tendency for similar incidents to occur in the same vicinity. These concentrations are generally geographic, but they can also be temporal, such as the increased incidence of crime during a certain period of time. Additionally, concentrations can represent the occurrence of a high number of certain types of crimes, the frequent use of a specific modus operandi by the offenders, common characteristics among victims of crime (known as repeat victimization), or have a basis in the social, demographic and physical environment within which the crime is perpetrated. The identification of extraordinary concentrations based on the combination of these types of data can indicate the existence of a problem, in
9 FORENSIC INTELLIGENCE AND CRIME ANALYSIS 55 particular a crime series. Part of this process can be computerized. Despite physical traces being rarely mentioned among the dimensions, they can contribute to the identification of crime hot spots. 6. Crime hot spots through shoemarks, toolmarks and glovemarks The identification of a crime series through scene linking is possible through the exploitation of shoemark databases. However it is recognized that there are difficulties in computerising the collection, storage and retrieval of information (Girod, 2002). Particular drawbacks that have been identified include the difficulty in controlling the input of data and defining adequate structures to represent fragmentary traces accurately and allow suitable retrieval. To date, no satisfactory matching algorithms capable of automatically and efficiently proposing links are available. A more suitable process for extracting promising candidates from the database would be to proceed along complex inference structures that combine additional types of data (Birkett, 1989; Milne, 2001; Napier, 2002). Similar considerations have been made for toolmarks (Davis, 1981; Geradts et al., 1999; Ahlhorn et al., 2000). Glove marks are generally not used in this context, although we have found that they are detected in 10 15% of burglary incidents (Mizrahi, 2002). A limited study has been established to propose a crime analysis method that exploits those small amounts of information in an intelligence purpose, and preliminary findings are reviewed below. 6.1 A limited study Objectives. An exploratory study was carried out in order to show that hot spots of crimes can be potentially revealed based on traces of a fragmentary nature, without the implementation of complex matching algorithms. This approach demonstrates the potential for the systematic application of a practical two-step crime analysis method using forensic case data: (1) Provide promising set of cases from extraordinary concentrations of crime identified based on common general characteristics of shoemarks, toolmarks and/or glovemarks. (2) Further scrutinize and combine with other types of data in order to find links or allow assumptions about the existence of a crime series Method. An exploratory approach has been used to reveal concentrations of burglaries where traces with similar characteristics have been collected. No mathematical model has guided the exploratory process or been used to assist the interpretation. A very general classification system has been defined for each of the three types of traces and implemented through databases of stored evidence collected during 2000 and 2001 for shoemarks and toolmarks, and from 1999 to 2001 for glovemarks. In order to satisfy practical constraints, the level of generality and the nature of the classification system was chosen to limit the time required to input data and the dependence on individuals that carry out this task. The classification system for shoemarks was based on 30 patterns generally collected at scenes and the database contained more than 3000
10 56 O. RIBAUX ET AL. FIG.5. Hot spots based on shoemarks traces. The toolmark database was limited to traces made by pliers used by the offender to break the locks of doors and contained 128 records. The width of the trace made by the pliers was stored. Glovemarks were classified in four categories representing the make of the glove and combined in a database containing 441 traces. Images were also stored in order to help scrutinize further specific selections of sets of cases. The visualization of isolated sets of data was facilitated by the use of a computerized crime mapping system that has been specifically developed to analyse serial burglaries. This also simplified the interface with each of the databases (Ribaux, 1997, 2001; Ribaux & Margot 1999). The analysis process started by extracting from each database cases that corresponded to each given pattern. The selected cases were then displayed: on a map in order to reveal hot spots on a cumulative diagram showing the occurrences of cases over time, with the aim to reveal increases and decreases in the appearance of patterns Results. Shoemarks. Shoemarks have shown a great potential using our approach. Some examples of interesting groups of cases to be further scrutinized are shown in Figs 5 and 6 Toolmarks. Even with a small amount of cases, patterns have been revealed with only the
11 FORENSIC INTELLIGENCE AND CRIME ANALYSIS 57 FIG. 6. Concentration of crimes during a certain period of time, where shoemarks with a similar pattern have been collected. FIG.7. Appearance of width of toolmarks made by pliers that show concentrations. width of the toolmarks found at the scene. The burglar can obviously discard his or her pliers after each case. However, it can be assumed that burglars are reluctant to change the type of pliers used and consequently, one can expect that the width of the marks found at the scenes will be similar for the same burglar. Even if it will be difficult to subsequently conclude that the same pliers have been used, concentration of the appearance of similar marks has the potential to reveal the activity of a particular burglar. Figure 7 shows the patterns found following the analysis of the toolmark evidence. It highlights a sort of hot spot that should help direct the attention of investigative services Glovemarks. Similar results have been obtained by analysis of the different categories of glovemarks. An example of interesting tendencies is shown in Fig. 8.
12 58 O. RIBAUX ET AL. FIG. 8. Concentration of crimes during a certain period of time, where glovemarks transfered by gloves of the same make have been collected Discussion. The proposed two-step method has shown a significant potential. By exploring the data along the classification dimensions numerous interesting patterns have been revealed. The computerized systems have proven to be very simple to use and were developed without a requirement for highly specific knowledge. Moreover, due to the level of generality inherent in the classification systems, the input of data is fast and largely independent of the individual responsible. From a practical point of view, one can consider that the method is appropriate to be carried out systematically in a routine crime analysis perspective. Until now, most researchers dealing with the development of databases have focused their attention on the use of expert techniques aimed at finding matches through complex algorithms based on distance computation or neural networked platforms. Our method provides a practical alternative by using small amounts of information along alternative inference patterns. Thus the focus of future research could be to: (1) computerise the exploratory method fully by developing a computational model which is able to extract tendencies and clusters of traces, (2) consider the combination of clusters provided by each trace, (3) expand the approach to other traces, such as earmarks. Of importance will be the development of exploratory tools that will include the management of visual information. 7. Conclusion This paper illustrates that forensic case data are still poorly integrated into crime analysis and the investigative process. There is a lack of theoretical framework in which to classify problems and experiences. The study of inference structures abstracting from consideration about computer systems and the adaptation of crime analysis methods in a forensic intelligence context are adequate dimensions to start building such a framework. Our study has shown that with small amounts of information and a few basic computer skills, it is possible to extract interesting patterns and intelligence. This presents an opportunity to change the research agenda by focusing more on innovative methods that combine the
13 FORENSIC INTELLIGENCE AND CRIME ANALYSIS 59 use of different traces, rather than concentrating solely on finding ways to develop similar systems as AFIS or DNA databases for other forms of trace evidence. Acknowledgement This paper was presented at the Fifth International Conference on Forensic Statistics (ICFS5), Venezia, Italy, August 30 September The authors are grateful for the ongoing support of i2 Ltd whose software applications continue to be utilized in our work. REFERENCES AHLHORN, T.,KATTERWE, H., BRAUNE, M., LISOUNKIN, A., SCHRECK, G.&DREWS, F Computerized comparison of toolmarks. Information Bulletin for Shoeprint/Toolmark Examiners, 6, ANONYMOUS 2002 FSS key unlocks triple murder investigation. Forensic Science Service, http: // releases/2002/ key.htm. ATKIN, H.2002 Offender profiling and criminal intelligence analysis: potential partners in criminal investigation? IALEIA Journal, 15, BEAUREGARD, E.&PROULX, J.2001 Le profilage criminelle: évolution, et nouvelles perspectives dans l établissement de modèles prédictifs. Revue Internationale de Police Criminelle, 486, BIRKETT, B.1989 Scientific scene linking. J. Forensic Science Society, 29, BRODEUR, J.-P La Police en Amérique du Nord: Modèles ou Effets de Mode? Cahiers de la Sécurité Intérieure, 28, DAVIS, R An intelligence approach to footwear and toolmarks. J. Forensic Science Society, 21, FSS 2000 Supporting Pathfinder. Information on FSS and Police Fingerprint process, Forensic Science Service. GERADTS, Z., KEIJER, J.& KEERWEER, I A new approach to automatic comparison of striation marks. J. Forensic Sciences, 39, GIROD, A L exploitation et gestion systématiques des traces de souliers: une approche complémentaire pour l investigation criminelle des cambriolages, Ph.D. Thesis, University, Lausanne. GOLDSTEIN, H.1990 Problem Oriented Policing. Philadelphia, PA: Temple University Press. GOTTLIEB, S., ARENBERG, S.& SINGH, R Crime Analysis: From First Report to Final Arrest. Montclair, CA: Alpha. INMAN, K.&RUDIN, N.2001 Principles and Practice of Criminalistics: The Profession of Forensic Science. Boca Raton, FL: CRC Press. KIND, S.S.1987 The Scientific Investigation of Crime. Harrogate: Forensic Science Service. KIND, S. S Crime investigation and the criminal trial: a three chapter paradigm of evidence. J. Forensic Science Society, 34, MAJAMAA, H Footwear databases used in police and forensic laboratories. Information Bulletin for Shoeprint/Toolmark Examiners, 6, MCGUIRE, P. G The New York Police Department COMPSTAT process: mapping for analysis, evaluation, and accountability. Analysing Crime Patterns: Frontiers of Practice. (V. Goldsmith, P. G. McGuire, J. H. Mollenkopf & T. A. Ross, eds). London: Sage, pp MILNE, R Operation Bigfoot, a volume crime database project. Science & Justice, 41,
14 60 O. RIBAUX ET AL. MIZRAHI, S Potentiel d exploitation des traces de gants. Internal report. University of Lausanne. NAPIER, T.J.2002 Scene linking using footwear mark database. Science & Justice, 42, NIFS 2002 To promote excellence in the forensic sciences. frame.html?goals.asp&1. PETERSON, M. B., MOREHOUSE, B. & WRIGHT, R Intelligence 2000: Revising the Basic Elements. Sacramento, CA: Law Enforcement Intelligence Unit (LEIU) & International Association of Law Enforcement Intelligence Analysts (IALEIA). RIBAUX, O La recherche et la gestion des liens dans l investigation criminelle: le cas particulier du cambriolage, Ph.D. Thesis, University of Lausanne. RIBAUX, O.&AEPLI, P.2001 L analyse des délits contre le patrimoine et son exploitation dans un cadre opérationnel. Revue Internationale de Criminologie et de Police Technique, 54, RIBAUX, O., GITZ, P. & CARTIER, J L analyse criminelle face la complexité des données: risque pour la sphre privée ou moyen de la protéger? Proceedings of the 60th Cours International de Criminologie. (P. H. Bolle & H. Steffen, eds). Bâle: Helbing & Lichtenhahn, pp RIBAUX, O.&MARGOT, P.1999 Inference structures for crime analysis and intelligence using forensic science data: the example of burglary. Forensic Science Int., 100, RIBAUX, O.&MARGOT, P.Case-based reasoning in criminal intelligence using forensic science data. Submitted. SANTTILA, P.,ZAPPALÀ, A., LAUKKANEN, M.&PICOZZI, M.2003 Testing the utility of a geographical profiling approach in three rape series of a single offender: a case study. Forensic Science Int., 131, SPRANGERS, W Forensic Intelligence: Intelligence from Databases Located at Forensic Science Laboratories and Its Relation to Criminal Investigations, March 19th. The Hague, Netherlands: EU-Seminar. WALSH, S.J., ROUX, C., ROSS, A., RIBAUX, O.&BUCKLETON, J.S.2002 Forensic DNA profiling: beyond identification. Law Enforcement Forum, 2,
POTENTIAL USE OF FINGERPRINTS IN FORENSIC INTELLIGENCE: CRIME SCENE LINKING
POTENTIAL USE OF FINGERPRINTS IN FORENSIC INTELLIGENCE: CRIME SCENE LINKING Alexandre ANTHONIOZ, Aude AGUZZI, Alexandre GIROD, Nicole EGLI, Olivier RIBAUX Institut de Police Scientifique et de Criminologie,
UTS:CENTRE FOR FORENSIC SCIENCE
Forensic Science Education Australian Perspective Prof. Claude Roux University of Technology, Sydney, Australia [email protected] Presented at the Trace Evidence Symposium, Clearwater Beach FL, 13-16
98 Crime scene examination
98 Crime scene examination by John Horswell Douglas Elliot BSc (Hons), PhD [Updating author, March 2012] 98-1 EXPERT EVIDENCE Author information Douglas Elliot obtained his Bachelor of Science degree in
Investigative Psychology. Offender Profiling and the Analysis of Criminal Action
Brochure More information from http://www.researchandmarkets.com/reports/2325233/ Investigative Psychology. Offender Profiling and the Analysis of Criminal Action Description: This ground-breaking text
CAN FORENSIC TRACE EVIDENCE PROVIDE USEFUL, TIMELY, AND ACCURATE INTELLIGENCE? 1
CAN FORENSIC TRACE EVIDENCE PROVIDE USEFUL, TIMELY, AND ACCURATE INTELLIGENCE? 1 Can Forensic Trace Evidence Provide Useful, Timely, and Accurate Intelligence? Jordan M. Chaplinsky University of South
SERIAL RAPE: OFFENDER PROFILING
SERIAL RAPE: OFFENDER PROFILING Detective Inspector John Manning New Zealand Police Liaison Officer, Sydney Offender profiling as a viable investigative tool has been graphically illustrated in a number
8 Interpreting Crime Data and Statistics
8 Interpreting Crime Data and Statistics Rachel Boba T he goal of this chapter is to provide knowledge of how to appropriately apply and interpret statistics relevant to crime analysis. This chapter includes
COMMUNITY UNIT SCHOOL DISTRICT 200. Course Description
Forensic Science High School Elective Course Description Forensic Science is a one semester high school level course that satisfies a CUSD200 graduation requirement in the area of science. Successful completion
CRIMINAL JUSTICE, BACHELOR OF SCIENCE (B.S.) WITH A CONCENTRATION IN FORENSIC CRIME SCENE INVESTIGATION
VCU 1 CRIMINAL JUSTICE, BACHELOR OF SCIENCE (B.S.) WITH A CONCENTRATION IN FORENSIC CRIME SCENE INVESTIGATION The major objective of this degree program is to prepare students for effective professional
Introduction to Crime Scene Dynamics
Chapter 1 Introduction to Crime Scene Dynamics OVERVIEW The development of the field of forensics has been a process steeped in science and research. On the other hand, the practice of crime scene investigation
THE TOP TEN PERCENT: Targeting the Top Ten Percent of Pawners
THE TOP TEN PERCENT: Targeting the Top Ten Percent of Pawners A SUCCESSFUL APPROACH TO REDUCING BURGLARIES TUCSON POLICE DEPARTMENT, 2006 SUMMARY THE PROBLEM: ANALYSIS: RESPONSE: In 2003 and 2004, the
Forensics in Nuclear Security. by the Netherlands Forensic Institute
Forensics in Nuclear Security by the Netherlands Forensic Institute Combating the threat of nuclear terrorism In an age when the threat of terrorist violence appears more immediate and more extreme than
CRIME SCENE INVESTIGATION
CRIME SCENE INVESTIGATION CHAPTER 2 Mr. Moss 1 CRIME SCENE INVESTIGATION Crime scenes tell a story Crime scene investigators must be careful and systematic Crime scene investigators must follow protocol
LEN 221: Principles of Criminal Investigation Syllabus 3 lecture hours / 3 credits CATALOG DESCRIPTION
1 LEN 221: Principles of Criminal Investigation Syllabus 3 lecture hours / 3 credits CATALOG DESCRIPTION Prerequisite: Undergraduate level RDG 099 Minimum Grade of P or Undergraduate level RDG 055 Minimum
Evidence Technician s School
Evidence Technician s School Program Overview The Evidence Technician s School is designed to provide your Evidence Technician or Crime Scene Investigator with a sound foundation of the basic principles
Diablo Valley College Catalog 2014-2015
ADJUS Obed Vazquez, Dean Social Sciences Division Faculty Office Building, Room 136 Possible career opportunities Law enforcement study prepares students for a career as a police officer, sheriff s deputy,
Strengthening Forensic Science in the United States: A Path Forward
This PDF is available from The National Academies Press at Strengthening Forensic Science in the United States: A Path Forward ISBN 978-0-309-13135-3 Committee on Identifying the Needs of the Forensic
1 Fundamentals of Crime Analysis
1 Fundamentals of Crime Analysis Christopher W. Bruce I nformation is the most valuable commodity in the world. It s more valuable than money, for with it one can make money. It s more valuable than power,
Tactical Crime Mapping in South Africa
Networks and Communication Studies NETCOM, vol. 17, n 3-4, 2003 p. 269-279 Tactical Crime Mapping in South Africa Antony K. Cooper 1 and Peter M.U. Schmitz 2 Résumé. La lutte contre le crime en Afrique
Street level Drug Enforcement What Works Briefing
Street level Drug Enforcement What Works Briefing Summary: Problem-oriented, community, and hot spots policing are each more successful in policing drugs markets than the traditional approach of preventative
Dashboards Help Lift the Fog of Crime By Chief Bence Hoyle
Dashboards Help Lift the Fog of Crime By Chief Bence Hoyle May 13, 2011 Carl Von Clausewitz, a Prussian military officer in the 1800s, coined the term "fog of war", which described the state of confusion,
LAW ENFORCEMENT AND GEOGRAPHIC INFORMATION SYSTEMS
LAW ENFORCEMENT AND GEOGRAPHIC INFORMATION SYSTEMS Terra Ann Wright Fayetteville State University 1200 Murchison Road Fayetteville, North Carolina 28301 [email protected] [email protected]
Criminal Investigation CRJ141. Matthew McCarty
Criminal Investigation CRJ141 Matthew McCarty Chapter 1 Criminal Investigation: An Overview CSI Effect The exaggerated depiction of how television forensic science operates, creating a phenomenon in which
Online Surveillance Awareness as Impact on Data Validity for Open-Source Intelligence?
Online Surveillance Awareness as Impact on Data Validity for Open-Source Intelligence? Petra Saskia Bayerl 1( ) and Babak Akhgar 2 1 Rotterdam School of Management, Erasmus University, Rotterdam, Netherlands
The origin of evidence
Forensic Science International 126 (2002) 11 16 The origin of evidence K. Inman a, N. Rudin b,* a California Department of Justice, 626 Bancroft Way, Berkeley, CA 94710, USA b 1563 Solano Avenue, PMB 506,
Effectiveness and Cost Efficiency of DNA Evidence in Volume Crime Denver Colorado Site Summary
Effectiveness and Cost Efficiency of DNA Evidence in Volume Crime Denver Colorado Site Summary Simon Ashikhmin 1, Susan G. Berdine 2, Mitchell R. Morrissey 1, and Greggory S. LaBerge 2 1 Denver District
Business Intelligence and Decision Support Systems
Chapter 12 Business Intelligence and Decision Support Systems Information Technology For Management 7 th Edition Turban & Volonino Based on lecture slides by L. Beaubien, Providence College John Wiley
Standardization of Components, Products and Processes with Data Mining
B. Agard and A. Kusiak, Standardization of Components, Products and Processes with Data Mining, International Conference on Production Research Americas 2004, Santiago, Chile, August 1-4, 2004. Standardization
DEPARTMENT OF SOCIAL AND BEHAVORIAL SCIENCES
DEPARTMENT OF SOCIAL AND BEHAVORIAL SCIENCES THE BACHELOR OF ARTS DEGREE IN CRIMINAL JUSTICE (CRIJ) Mission The University strives to endow students with the skills necessary for critical knowledge, communication,
Concepts of digital forensics
Chapter 3 Concepts of digital forensics Digital forensics is a branch of forensic science concerned with the use of digital information (produced, stored and transmitted by computers) as source of evidence
Cyber threat intelligence and the lessons from law enforcement. kpmg.com/cybersecurity
Cyber threat intelligence and the lessons from law enforcement kpmg.com/cybersecurity Introduction Cyber security breaches are rarely out of the media s eye. As adversary sophistication increases, many
University of Huddersfield Repository
University of Huddersfield Repository Canter, David V. Offender profiling Original Citation Canter, David V. (2010) Offender profiling. In: The Cambridge Handbook of Forensic Psychology. Cambridge Handbooks
University of Huddersfield Repository
University of Huddersfield Repository Canter, David V. Offender profiling Original Citation Canter, David V. (2010) Offender profiling. In: The Cambridge Handbook of Forensic Psychology. Cambridge Handbooks
Key Crime Analysis Data Sources. Crime
Part 2 Processes of Crime Analysis coming into the police agency, but those dispatched to or initiated by officers. Because of the vast information contained in a CAD system, information is often purged
Forensic Science : Course Syllabus Forensic Science : Secrets of the Dead
Forensic Science : Course Syllabus Forensic Science : Secrets of the Dead COURSE DESCRIPTION: Fingerprints. Blood spatter. DNA analysis. The world of law enforcement is increasingly making use of the techniques
DIABLO VALLEY COLLEGE CATALOG 2015-2016
ADMINISTRATION OF JUSTICE ADJUS Obed Vazquez, Dean Social Sciences Division Faculty Office Building, Room 136 Possible career opportunities Law enforcement study prepares students for a career as a police
The Scientific Data Mining Process
Chapter 4 The Scientific Data Mining Process When I use a word, Humpty Dumpty said, in rather a scornful tone, it means just what I choose it to mean neither more nor less. Lewis Carroll [87, p. 214] In
Chapter Managing Knowledge in the Digital Firm
Chapter Managing Knowledge in the Digital Firm Essay Questions: 1. What is knowledge management? Briefly outline the knowledge management chain. 2. Identify the three major types of knowledge management
Cyber threat intelligence and the lessons from law enforcement. kpmg.com.au
Cyber threat intelligence and the lessons from law enforcement kpmg.com.au Introduction Cyber security breaches are rarely out of the media s eye. As adversary sophistication increases, many organisations
Willmar Public Schools Curriculum Map
Subject Area Science Senior High Course Name Forensics Date June 2010 Timeline Content Standards Addressed Skills/Benchmarks Essential Questions Assessments 1-2 Introduction History and Development of
CRIME SCENE INVESTIGATION THROUGH DNA TRACES USING BAYESIAN NETWORKS
CRIME SCENE INVESTIGATION THROUGH DNA TRACES USING BAYESIAN NETWORKS ANDRADE Marina, (PT), FERREIRA Manuel Alberto M., (PT) Abstract. The use of biological information in crime scene identification problems
Designing Law Enforcement: Adaptive Strategies for the Complex Environment
Designing Law Enforcement: Adaptive Strategies for the Complex Environment John A. Bertetto, Police Officer, Chicago Police Department Crime Control Strategies As law enforcement professionals, we often
Computer Forensics: an approach to evidence in cyberspace
Computer Forensics: an approach to evidence in cyberspace Abstract This paper defines the term computer forensics, discusses how digital media relates to the legal requirements for admissibility of paper-based
DIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM
DIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM Proposed Program Title: Bachelor of Science in Computing Science- Specialization in Digital Forensics Specialization
Forensic Science and Justice: From Crime Scene to Court and Beyond
Introduction Forensic Science and Justice: From Crime Scene to Court and Beyond Forensic science is becoming an integral component of the criminal justice system. Many commentators have noted this and
ILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION FORENSIC SCIENTIST SERIES
ILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION FORENSIC SCIENTIST SERIES CLASS TITLE POSITION CODE EFFECTIVE FORENSIC SCIENTIST TRAINEE 15897 5/1/10 FORENSIC SCIENTIST I 15891 5/1/10
DEPARTMENT OF SOCIAL AND BEHAVORIAL SCIENCES
122 / Department of Social and Behavioral Sciences DEPARTMENT OF SOCIAL AND BEHAVORIAL SCIENCES THE BACHELOR OF ARTS DEGREE IN CRIMINAL JUSTICE (CRIJ) The Bachelor of Arts in Criminal Justice is a four-year
3. Programme accredited by Currently accredited by the BCS. 8. Date of programme specification Students entering in October 2013
PROGRAMME SPECIFICATION FOR MSc IN COMPUTER SCIENCE 1. Awarding institution/body University of Oxford 2. Teaching institution University of Oxford 3. Programme accredited by Currently accredited by the
Automatic Timeline Construction For Computer Forensics Purposes
Automatic Timeline Construction For Computer Forensics Purposes Yoan Chabot, Aurélie Bertaux, Christophe Nicolle and Tahar Kechadi CheckSem Team, Laboratoire Le2i, UMR CNRS 6306 Faculté des sciences Mirande,
Certified Law Enforcement Analyst (CLEA) Certification Program Study Guide
Certified Law Enforcement Analyst (CLEA) Certification Program Study Guide Jonathan Alston Trina Cook Judy Fernandez Michele Kennedy, Chair August 2014 Contents About the CLEA Study Guide... 3 Knowledge
2. Today, percent of all local police departments require a degree from a two-year college. a. 18 b. 12 c. 9 d. 4
Chapter 5 Challenges to Effective Policing MULTIPLE CHOICE 1. Which of the following is NOT one of the basic requirements for becoming a police officer? a. Being a U.S. citizen b. Having no felony convictions
Criminal Justice - Law Enforcement
Criminal Justice - Law Enforcement Dr. Charles Adair, Acting Chair Criminal Justice Department [email protected] 631-420-2692 School of Arts & Sciences Associate in Science Degree The goal of this
COMBINING THE METHODS OF FORECASTING AND DECISION-MAKING TO OPTIMISE THE FINANCIAL PERFORMANCE OF SMALL ENTERPRISES
COMBINING THE METHODS OF FORECASTING AND DECISION-MAKING TO OPTIMISE THE FINANCIAL PERFORMANCE OF SMALL ENTERPRISES JULIA IGOREVNA LARIONOVA 1 ANNA NIKOLAEVNA TIKHOMIROVA 2 1, 2 The National Nuclear Research
Remarks. 7th International DNA Users' Conference For Investigative Officers. Ronald K. Noble. INTERPOL Secretary General.
Remarks by Ronald K. Noble INTERPOL Secretary General 7th International DNA Users' Conference For Investigative Officers 06 November 2013 Lyon, France Dr Simon Walsh, Chairman of the INTERPOL DNA Monitoring
American Academy of Forensic Sciences
American Academy of Forensic Sciences Forensic Science Education Programs Accreditation Commission (FEPAC) ACCREDITATION STANDARDS Adopted by FEPAC May 16, 2003 Approved by the AAFS Board of Directors
How To Use Data Mining For Knowledge Management In Technology Enhanced Learning
Proceedings of the 6th WSEAS International Conference on Applications of Electrical Engineering, Istanbul, Turkey, May 27-29, 2007 115 Data Mining for Knowledge Management in Technology Enhanced Learning
WYNYARD ADVANCED CRIME ANALYTICS POWERFUL SOFTWARE TO PREVENT AND SOLVE CRIME
WYNYARD ADVANCED CRIME ANALYTICS POWERFUL SOFTWARE TO PREVENT AND SOLVE CRIME HELPING LAW ENFORCEMENT AGENCIES SOLVE CRIMES FASTER, WITH LOWER COSTS AND FEWER RESOURCES. 1 Wynyard Group Advanced Crime
Training and Development (T & D): Introduction and Overview
Training and Development (T & D): Introduction and Overview Recommended textbook. Goldstein I. L. & Ford K. (2002) Training in Organizations: Needs assessment, Development and Evaluation (4 th Edn.). Belmont:
How To Develop Software
Software Engineering Prof. N.L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture-4 Overview of Phases (Part - II) We studied the problem definition phase, with which
Big Data with Rough Set Using Map- Reduce
Big Data with Rough Set Using Map- Reduce Mr.G.Lenin 1, Mr. A. Raj Ganesh 2, Mr. S. Vanarasan 3 Assistant Professor, Department of CSE, Podhigai College of Engineering & Technology, Tirupattur, Tamilnadu,
Community Policing. Defined
Community Policing Defined The Primary Elements of Community Policing Nonprof its / Service Providers Using the Crime Triangle Community policing is a philosophy that promotes organizational strategies
CONCEPT MAPPING FOR DIGITAL FORENSIC INVESTIGATIONS
Chapter 22 CONCEPT MAPPING FOR DIGITAL FORENSIC INVESTIGATIONS April Tanner and David Dampier Abstract Research in digital forensics has yet to focus on modeling case domain information involved in investigations.
EXPERIENCED PROFESSIONAL CERTIFICATE IN Forensic Science
Certificate Description This certificate provides professionals the opportunity to enhance specialized skills in Forensic Science. Arson Investigation CRJS 350 This course will explore criminal and scientific
Draft Martin Doerr ICS-FORTH, Heraklion, Crete Oct 4, 2001
A comparison of the OpenGIS TM Abstract Specification with the CIDOC CRM 3.2 Draft Martin Doerr ICS-FORTH, Heraklion, Crete Oct 4, 2001 1 Introduction This Mapping has the purpose to identify, if the OpenGIS
Definition and Types of Crime Analysis
International Association of Crime Analysts (IACA) Definition and Types of Crime Analysis Standards, Methods, & Technology (SMT) Committee White Paper 2014-02 October 2014 IACA SMT Committee Standards
Course Forensic Science. Unit II History
Course Forensic Science Unit II History Essential Question What is legally and ethically expected of forensic scientists and Crime Scene Investigators? TEKS 130.295(c) (4)(C) Prior Student Learning History
How To Be A Forensic Investigator
CLASS SPECIFICATION Class Code: 2226 Date Est: 10/1989 Last Rev: 04/2014 Last Title Chg: 04/2014 FLSA: Non-exempt Probation: 12 Months FORENSIC INVESTIGATOR II DEFINITION Under general supervision, performs
INTRODUCTION AREAS OF SPECIALIZATION
Eoghan-Intro.qxd 1/6/04 3:01 PM Page 1 INTRODUCTION INTRODUCTION In the years since the first edition of this book, there has been an explosion of interest in digital evidence. This growth has sparked
3 Sources of Information about Crime:
Crime Statistics 3 Sources of Information about Crime: 1-UCR: Uniform Crime Report 2-NCVS: National Crime Victimization Survey 3-SRS: Self-Report Surveys UCR: Crime statistics are collected by branches
Case study on asset tracing
Recovering Stolen Assets: A Practitioner s Handbook ARNO THUERIG * Case study on asset tracing I. Case study background The client adviser of a Swiss private bank transferred approximately USD 1 million
ASC 076 INTRODUCTION TO SOCIAL AND CRIMINAL PSYCHOLOGY
DIPLOMA IN CRIME MANAGEMENT AND PREVENTION COURSES DESCRIPTION ASC 075 INTRODUCTION TO SOCIOLOGY AND ANTHROPOLOGY Defining Sociology and Anthropology, Emergence of Sociology, subject matter and subdisciplines.
DATA MINING AND EXPERT SYSTEMS IN LAW ENFORCEMENT AGENCIES
DATA MINING AND EXPERT SYSTEMS IN LAW ENFORCEMENT AGENCIES Monica C. Holmes, Central Michigan University, [email protected] Diane D. Comstock-Davidson, Central Michigan University, [email protected]
STAGE 1 COMPETENCY STANDARD FOR PROFESSIONAL ENGINEER
STAGE 1 STANDARD FOR PROFESSIONAL ENGINEER ROLE DESCRIPTION - THE MATURE, PROFESSIONAL ENGINEER The following characterises the senior practice role that the mature, Professional Engineer may be expected
CURRICULUM GUIDE. When this Forensics course has been completed successfully, students should be able to:
CURRICULUM GUIDE NAME OF COURSE: FORENSICS COURSE NUMBER: SCI 40 WRITTEN / REVISED: SEPTEMBER, 2011 LEVEL OF COURSE: REPLACMENT NUMBER OF CREDITS: SIX (6) PREREQUISITES: BIOLOGY GRADE LEVELS OFFERED TO:
SPATIAL DATA CLASSIFICATION AND DATA MINING
, pp.-40-44. Available online at http://www. bioinfo. in/contents. php?id=42 SPATIAL DATA CLASSIFICATION AND DATA MINING RATHI J.B. * AND PATIL A.D. Department of Computer Science & Engineering, Jawaharlal
How do we build and refine models that describe and explain the natural and designed world?
Strand: A. Understand Scientific Explanations : Students understand core concepts and principles of science and use measurement and observation tools to assist in categorizing, representing, and interpreting
American Academy of Forensic Sciences
American Academy of Forensic Sciences Forensic Science Education Programs Accreditation Commission (FEPAC) ACCREDITATION STANDARDS Adopted by FEPAC May 16, 2003 Approved by the AAFS Board of Directors
Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com
Alison Hayes November 30, 2005 NRS 509. Crime Mapping OVERVIEW
Alison Hayes November 30, 2005 NRS 509 Crime Mapping OVERVIEW Geographic data has been important to law enforcement since the beginning of local policing in the nineteenth century. The New York City Police
UTILIZING COMPOUND TERM PROCESSING TO ADDRESS RECORDS MANAGEMENT CHALLENGES
UTILIZING COMPOUND TERM PROCESSING TO ADDRESS RECORDS MANAGEMENT CHALLENGES CONCEPT SEARCHING This document discusses some of the inherent challenges in implementing and maintaining a sound records management
CFSD 21 ST CENTURY SKILL RUBRIC CRITICAL & CREATIVE THINKING
Critical and creative thinking (higher order thinking) refer to a set of cognitive skills or strategies that increases the probability of a desired outcome. In an information- rich society, the quality
ADVANCED GEOGRAPHIC INFORMATION SYSTEMS Vol. II - Using Ontologies for Geographic Information Intergration Frederico Torres Fonseca
USING ONTOLOGIES FOR GEOGRAPHIC INFORMATION INTEGRATION Frederico Torres Fonseca The Pennsylvania State University, USA Keywords: ontologies, GIS, geographic information integration, interoperability Contents
TEXT: Turvey, B. E. (2008). Criminal Profiling: An introduction to behavioral evidence analysis 3 rd Edition. New York: Elsevier, Inc.
CJ6600 CRIMINAL PROFILING SUMMER 2009 SYLLABUS (June 8, 2009 July 29 th, 2009) Instructor: Jack McGrath, Ph.D. Office: 1380 Lawrence Street Center Phone: (303) 960-4782 Email: [email protected]
Comparison of K-means and Backpropagation Data Mining Algorithms
Comparison of K-means and Backpropagation Data Mining Algorithms Nitu Mathuriya, Dr. Ashish Bansal Abstract Data mining has got more and more mature as a field of basic research in computer science and
Miracle Integrating Knowledge Management and Business Intelligence
ALLGEMEINE FORST UND JAGDZEITUNG (ISSN: 0002-5852) Available online www.sauerlander-verlag.com/ Miracle Integrating Knowledge Management and Business Intelligence Nursel van der Haas Technical University
Summary of Qualifications: Education: Professional Experience: Kenneth R. Moses
Summary of Qualifications: Kenneth Moses has over forty years of experience in forensic evidence. He established the Crime Scene Investigations Unit of the San Francisco Crime Laboratory in 1983 and was
