Beruflich Dokumente
Kultur Dokumente
Volume 73
Number 3
United States
Department of Justice
Federal Bureau of Investigation
Washington, DC 20535-0001
The attorney general has determined Geologic Material as Geologic materials often can provide
that the publication of this periodical is
necessary in the transaction of the
public business required by law. Use
Physical Evidence 1 scientific support as physical evidence
in criminal and civil cases.
By Joseph A. Finley, Jr.
of funds for printing this periodical has
been approved by the director of the
Office of Management and Budget. Law enforcement officers can better
Sudden, Unexplained Infant
The FBI Law Enforcement Bulletin
(ISSN-0014-5688) is published
Death Investigations 10 handle SUID cases after gaining an
understanding of their role in these
monthly by the Federal Bureau of By Ernst H. Weyand investigations.
Investigation, 935 Pennsylvania
Avenue, N.W., Washington, D.C.
20535-0001. Periodicals postage paid Community Policing Understanding the concept of
at Washington, D.C., and additional
mailing offices. Postmaster: Send
address changes to Editor, FBI Law
By David M. Allender 18 community policing can help law
enforcement agencies design and
Enforcement Bulletin, FBI Academy, implement successful programs.
Madison Building, Room 209,
Quantico, VA 22135.
Computer Forensics An understanding of computer-related
Editor By Loren D. Mercer 28 evidence proves necessary for law
enforcement agencies and the courts.
John E. Ott
Associate Editors
Cynthia L. Lewis
David W. MacWha
Bunny S. Morris Departments
Art Director
Denise Bennett Smith
Assistant Art Director 6 Book Review 16 Bulletin Reports
Stephanie L. Lowe
Law Enforcement Corrections
Staff Assistant
Linda W. Szumilo Funeral Manual Juvenile Justice
Training
This publication is produced by 8 Focus on Identity Theft Web-Based Resources
members of the Law Enforcement
Communication Unit, Training Identity Theft Within Federal
and Development Division. Student Aid Programs 23 Perspective
Management Defined
Internet Address
9 Unusual Weapon Alert
leb@fbiacademy.edu
Bullet Cartridge Knives
Cover Photo
© Digital Stock
© PhotoDisc
T
he field of geology and its in forensic science. Geologic
Whenever two objects come relationship to forensic material, as with all physical
into contact, there always is a science has remained evidence, contributes scientific
transfer of material. The shrouded in mystery for many support that can assist in es-
methods of detection may not
be sensitive enough to demon-
years. Although the interaction tablishing the guilt or innocence
strate this, or the decay rate of humans with the environment of an individual. In general,
may be so rapid that all evi- long has been the object of much the usefulness of geologic mate-
dence of transfer has vanished interest to physical scientists, rial as physical evidence de-
after a given time. Nonetheless, published literature on this topic pends on the number of signifi-
the transfer has taken place.1
is relatively limited. cant variations in the material
Geologic material, com- and the ability to compare and
monly used as physical evi- contrast these variations. The
dence in both criminal and civil inorganic nature of geologic
cases, can play an important role material can make qualitative
March 2004 / 1
identification relatively straight- standard practices for the FBI minerals are produced elsewhere
forward. Combined with the sci- Laboratory in soil cases.3 and transported to the location
entific objectivity of the analysis where they are found. Fragments
and testimony of the expert wit- Formation of rocks and minerals created by
ness, geologic material has a Soil material generally is the weathering of a rock outcrop
great advantage as physical evi- formed by nature in one of two may be carried away by rivers
dence. To this effect, investi- ways, residual or transported. and deposited as sandbars,
gators must ensure that they This loose material (soil) is com- gravel, or fine mud. Wind can
use proper collection and pres- posed of fragments of minerals move vast quantities of frag-
ervation techniques for process- and rocks generated from the ments great distances, depositing
ing and analyzing various breaking up or dissolving of the them as dunes and dust layers.
materials. earth’s solid rocks. Residual soil Wave and current actions break
material forms in places where down rock and mineral forma-
SOIL solid rock is exposed in outcrops tions along shores of seas and
Today, most major crime at the earth’s surface. This solid lakes, transporting this material
laboratories throughout the rock endures the natural weath- and depositing it as beaches or
world, both public and private, ering processes, which, over undersea sediment. The force of
study soils. The FBI was one of time, break up and dissolve the gravity may cause landslides and
the first forensic laboratories in rock. This procedure turns the move tons of material down a
the United States to extensively outcrop into a mass of fragments slope, thereby producing a mass
use soil and mineral analysis and removes some of the mate- of newly transported soil on the
in criminal cases. 2 As early rial in solution (dissolving of the land below.
as 1935, the FBI Laboratory minerals normally occurs in rain
worked with soils; by early 1939, or groundwater). Composition
heavy mineral separations and Transported soil mate- Characteristically, soil is a
mineral identifications were rials occur where fragments of very complex system composed
of certain quantities of solid, liq-
uid, and gaseous materials. The
unconsolidated mineral matter
on the earth’s surface has been
“ ...investigators must
ensure that they use
proper collection and
subjected to and influenced by
genetic and environmental fac-
tors, such as parent materials,
climate (including moisture and
temperature effects), macro- and
preservation techniques
microorganisms, and topogra-
for processing and phy. Over a period of time, these
analyzing various factors produce a product (soil)
materials. that differs from the material
”
from which it derived in many
physical, chemical, biological,
Special Agent Finley, formerly an expert witness in the Mineralogy Unit, and morphological properties
FBI Laboratory Division, now serves in the FBI’s Miami, Florida, office.
and characteristics.4
“
served and measured in the ma- therefore, appropriate personnel
terial; specifically, how many should use them accordingly.
different kinds of classes can ex- Evidence value rests Because forensic geologists
ist and how widespread each upon the fact that soil must be aware of the context
class is. The value of soils, rock, varies from point to and source of the samples exam-
minerals, and fossils lies in the point on the surface, ined, investigators should ensure
fact that many variations and as well as below the that they remove earth material
possibilities exist. Any process from clothing, vehicles, or other
that aids in generating a uniquely
earth’s surface. sources with extreme care, en-
”
identifiable material determines suring preservation of the
the value and type of examina- original sample. Specifically, in-
tions that will prove most useful. vestigators should pay close at-
These processes constitute the minerals are classified as sand, tention to layering and lumps of
keys to a meaningful soil com- silt, and clay (based on a physical materials.8
parison from which the foren- measurement). A wide range of Evidence value rests upon
sic scientist can draw valid textural (particle) size exists in the fact that soil varies from
conclusions. soil, depending upon the rocks point to point on the surface, as
Soils pass through a cycle of from which it derived and the well as below the earth’s surface.
development involving youth, processes by which the soil has For depth of the sample, investi-
maturity, and old age.5 Based accumulated.6 Soils are coarse- gators should note the approxi-
upon this readily accepted con- or fine-grained. mate depth of their own foot-
cept of soil alteration, the com- Soil structure constitutes one prints in the soil at the scene.
parison of soil by color, texture, of the most important soil prop- Investigators should take numer-
and mineral composition is justi- erties, but forensic scientists ous samples at the immediate
fied. Color is one of the most must approach it carefully due to scene radiating outward from the
important identifying character- the inherently smaller sample center and also an “alibi” sample
istics of minerals—virtually all sizes. In most soil samples, away from the immediate scene.
possible colors of the visible mineral composition is the This type of sampling will allow
March 2004 / 3
Examining Geologic Evidence
The stereobinocular microscope helps identify the various minerals and mineral sites
present in a sample. The widefield, low-power stereobinocular microscope gives an erect,
three-dimensional image that makes it ideal for manipulating a sample. Minerals also have
different densities, an identifiable property. Normally, these differences are divided into two
groups of “heavy minerals” and “light minerals” with the boundary drawn at approximately
2.9 grams/cc.
Additionally, forensic geologists use a polarizing or petrographic microscope to posi-
tively identify the sample. This differs from the stereobinocular microscope in that it has
filters for polarizing the light and rotating the state and attachments for viewing the charac-
teristic effects on light that has passed through minerals. Minerals, especially small-sized
ones, commonly are identified using x-ray diffraction and spectrographic techniques. Other
instruments of value to the forensic geologist exist, particularly the scanning electron
microscope and the electron microscope. With these instruments, geologists can examine
extremely small mineral particles using magnification in excess of 100,000 times. Where
applicable, pH-size particle determination and elemental analysis may be used in conjunc-
tion with color, texture, and mineral composition.
the forensic geologist to see any when packaged and limit the materials and represent the com-
variation. If sample variations possibility of contamination. bination of a variety of minerals
are wet or moist, investigators Only plastic locking bags or or rocks at a specific time for a
should air-dry them before plac- glass vials should be used, never certain purpose, they can be
ing them in a vial or similar con- envelopes. highly distinctive. Regional dif-
tainer to prevent biological ac- ferences in the base aggregates
tivity from continuing and to BUILDING MATERIALS used to produce these materials
avert any breakdown of the Building materials long have prove useful to the forensic sci-
sample. The amount of sample been an important part of entist. Different building materi-
required for analysis depends on people’s interaction with and im- als contain suitable aggregates,
the type of examination con- pact upon their environment. such as quartz, gravel, crushed
ducted; however, most analyses Natural materials used to form stone, bituminous or anthracite
require approximately 1 cup of manmade products that will be- cinders, burned clay or shale, and
soil. If considerable gravel or come part of a structure, dwell- pumice or volcanic scoria, all of
other coarse material is present, ing, or similar fixture can be which may indicate a particular
investigators should increase the classified as building materials. geographic area.9
size of the sample. They can When handling building ma- Building materials can in-
make the first determination of terials, investigators must con- clude bricks, cinder and con-
the soil’s color at the scene, for sider the various types of com- crete blocks, cement, plaster,
example, and the color of the soil binations at a given location. ceramics, fiberglass, abrasives,
on a suspect’s clothing. They Because building materials cleaning and face powders,
should ensure that the soil is dry commonly are made of mineral and commercial sands. Each
“
sible conversion of the gypsum moving the insulation may ren-
back to the plaster, or low-water, der its value worthless in the
form. Soil, building forensic examination.
Cleaning and face powders materials, and
commonly have a mineral base safe insulation...can CONCLUSION
or mineral filler. The specific benefit law enforce- Geologic material can prove
minerals used tend to differ from ment agencies as an invaluable tool as physical
one product to another, and evidence in cases. evidence in criminal and civil
manufacturers often change the proceedings. The field of foren-
”
size and composition of minerals sic geology can expand to con-
through time. Abrasive materials tain virtually all inorganic mate-
may be natural or artificial— rials used as physical evidence.
natural materials tend to be more SAFE INSULATION Soil, building materials, and safe
diverse. Further, a wide variety Found between the walls of insulation represent just three
of sands are used for commercial fire-resistant and burglar-resis- examples of the numerous types
purposes. tant safes and safe cabinets, safe of geologic materials that can
The alteration of the environ- insulation often is soft and very benefit law enforcement agen-
ment with building materials can porous and, therefore, can be cies as evidence in cases.
prove important to the forensic readily transferred to tools and The usefulness of most types
scientist who will use various clothing. Various types of mate- of physical evidence depends on
methods to examine building rials are used as safe insulation, the number of significant differ-
materials broken down into sev- including wood chips, gypsum, ences that exist in the material.
eral areas. However, for the fo- fiberglass, and asbestos. Many Nature has provided geologic
rensic scientist to make an accu- safes made before 1936 contain materials with large variations
rate determination, investigators natural cement as insulation. and possibilities.10 Investigators
should sample all types of mate- Collecting safe insulation at must ensure that they follow ap-
rial present at the scene. Most a crime scene is a relatively propriate procedures when se-
cases involving building mate- simple procedure. If the safe is curing, packaging, and preserv-
rials are related to burglaries present at the scene, investiga- ing geologic materials. The
where someone has broken into tors should take samples of all forensic scientist then can pro-
a dwelling or structure. Brick, walls because replacement of vide an expert opinion to the
cinder block, fiberglass, and one or more walls with different inference or conclusion drawn
gypsum board most likely would safe insulation is common. In- from facts determined during the
be involved, and investigators vestigators should keep the examination of these materials.
March 2004 / 5
Endnotes Soils (New York, NY: McGraw Hill, crime scene, or “alibi” location, and
1939). samples scientists use as part of their
1 6
The Locard exchange principle, L. C. Nickolls, “Identification of normal professional resources. “Known
developed by Edmond Locard in 1929, Stains of a Nonbiological Nature,” in samples” from scientists’ normal profes-
is the basic precept of forensic geology. F. Lundquist, ed., Methods of Forensic sional resources are numerous and varied.
2
R. C. Murray and C. F. Tedrow, Science, 1 (New York, NY: Interscience Use of these samples for comparison may
Forensic Geology (Englewood Cliffs, NJ: Publications, 1962), 355-362. provide the scientist with a correct
7
Prentice-Hall, Inc., 1992), 23-24. Although scientists have identified identification of the material and, in some
3
Ibid. over 2,000 minerals, only about 20 are cases, the particular area of origin.
4 9
G. D. Smith, et al., “Glossary of commonly found in soils, with the bulk of American Society for Testing
Soil Science Terms,” Soil Science Society soil containing only 3 to 5 different Materials Standards, Book of ASTM
Proceedings 26, no. 3(1965): 305-317. minerals. Standards, 1955, 421-611.
5 8 10
A. K. Lobeck, Geomorphology: An Two possible types of “known Supra note 2.
Introduction to the Study of Landscapes, samples” exist: samples collected from the
Book Review
March 2004 / 7
Focus on Identity Theft
individuals and prison inmates to apply for and
obtain federal student aid. Beginning in 2002, the
department began checks of Social Security
numbers against death records to identify the
fraudulent use of numbers formerly issued to
deceased individuals.
A recent example of student identity theft
resulted in a 26-count indictment against an
individual in U.S. District Court, Western District
of New York, for his role in allegedly defrauding
the Department of Education of over $160,000 by
submitting fraudulent student loan applications in
Identity Theft the name of his mother and brother. The indict-
Within Federal ment also charged that the individual prepared
Student Aid Programs and submitted approximately 2,370 additional
By Sharon Jones-Davis
© Digital Stock
student loan applications requesting disbursement
of approximately $43.8 million. These applica-
tions were prepared using multiple fictitious
March 2004 / 9
© Digital Juice
Sudden,
Unexplained
Infant Death
Investigations
By ERNST H. WEYAND
”
complete investigation, the
circumstances surrounding a
baby’s death will remain a Special Agent Weyand serves in the Indian Country Unit
at FBI Headquarters in Washington, D.C.
mystery.
March 2004 / 11
place where the infant’s death The collection and thorough familiar with basic medical con-
was pronounced and quickly documentation of physical evi- cepts and terms related to infant
move to the location (if differ- dence at the death scene can death. When documenting the
ent) where the baby was found prove essential in accurately es- general appearance of the child,
dead or unresponsive. If pos- tablishing an infant’s cause of officers should note the body,
sible, investigators ought to oc- death. Items considered impor- face, head, and neck positions;
cupy both places as soon as the tant to a SUID investigation in- rigor mortis; postmortem lividity
death is reported and quickly clude the baby’s clothes and dia- (creating a drawing and depict-
identify the individuals who lo- per, bedding, formula, time and ing the pattern); birthmarks;
cated the child because their ob- contents of the last bottle, over- body temperature; physical de-
servations can greatly assist the the-counter or prescribed drugs velopment; evidence of trauma;
re-creation of the death scene. state of hydration; and any fluids
At the scene, investigators (e.g., vomitus, blood, mucus, or
“
should describe, in detail, the site other secretions) or obstructions
where witnesses found the baby. present in or around the baby’s
For example, if the death oc- People should mouth or nostrils. Additionally,
curred at home in the infant’s not confuse SUID they ought to document all at-
bedroom, officers ought to in- with sudden infant tempts to resuscitate the child,
clude a description of the room, death syndrome along with any physical signs of
as well as their observations of (SIDS).... attempted resuscitation (e.g., en-
the sleeping surface. Investiga- dotracheal tube, chest ecchymo-
”
tors must take great care in docu- sis,8 EKG monitor pads, or intra-
menting these details (e.g., “The venous lines).
mattress is too small for the crib”
or “Officers noticed a broken or medications, and other appro- The Autopsy
spring in the bedding”). They priate items, such as folk rem- The forensic autopsy of the
also should determine if anyone edies or unpasteurized honey (if infant serves as a critical step in a
was sleeping with the child at the ingested within 30 days of the SUID investigation. Without a
time of death and if this person time of death). In addition, in- thorough autopsy by a compe-
was impaired by alcohol or other vestigators should collect any tent, experienced health profes-
drugs. After examining the toys located nearby and docu- sional, the cause and manner of
sleeping site, investigators then ment their relative position to the the baby’s death will remain in
would record a variety of envi- child. question. The law enforcement
ronmental factors, including in- Officers also must meticu- officer plays a critical, though
side temperature, outside tem- lously document the baby’s gen- limited, part in this phase of the
perature, type of heating present, eral appearance. This serves as a investigation. While carrying out
type of air conditioning, any hu- critical portion of the death scene their role in this process, in-
midifier or vaporizer use, type of investigation and provides in- vestigators ought to remain
flooring, state of the home’s valuable information to the sensitive to the needs of the
cleanliness, number of people health professional—in this child’s family and effectively ex-
living in the residence, and any regard, investigators can com- plain the importance of a foren-
presence of animals. municate more effectively when sic autopsy.
March 2004 / 13
when they were administered. life-threatening trauma, HIV, (e.g., anemia, diabetes, high
Finally, the investigator ought to hepatitis, or sickle-cell anemia. blood pressure, infections,
develop information about the If so, the officer ought to conduct physical trauma, or sexually
child’s feeding history (e.g., Did a logical and thorough investiga- transmitted diseases) or use of
the infant have any food intoler- tion to gather as much informa- alcohol, controlled substances,
ances?) and establish the baby’s tion as possible about each par- or tobacco during pregnancy. In
exposure to illness through con- ticular instance. If necessary, the addition, the officer should de-
tact with adults or animals. investigator should widen this termine if the mother had any
phase of investigation to include previous pregnancies, previous
The Family’s Case History extended family members. After live births, previous abortions or
A review of the infant’s fam- the interviews of family mem- miscarriages, or a history of fer-
ily case history may prove the bers, the officer must contact an tility treatment.
most time-consuming part of appropriate agency, such as so- Finally, the investigator
a SUID investigation. The inves- cial services or child protection ought to document the infant’s
tigator begins by interviewing services, and inquire about any gestational age (considering 40
immediate family members to family contacts and the nature of weeks as “full term”) and weight
determine if they have experi- these contacts. at birth, method of delivery
enced any suspicious childhood The investigator also needs (vaginal birth or cesarean sec-
accidents, a history of infant to examine and document the tion), and if the baby was part of
or childhood death, SIDS, con- mother’s prenatal history and a dual or multiple birth. To en-
genital anomalies, infections, medical care. Information ought sure completeness, the officer
pneumonia, premature birth, to include any health problems should determine the age and
Online Resources
• SIDS Alliance
http://www.sidsalliance.org
• Interagency Panel on Sudden Infant Death Syndrome
“Guidelines for Death Scene Investigation of Sudden, Unexplained Infant Deaths”
http://www.cdc.gov/mmwr/preview/mmwrhtml/00042657.htm
• Office of Juvenile Justice and Delinquency Prevention
“Recognizing When a Child’s Injury or Illness Is Caused by Abuse”
http://www.ncjrs.org/html/ojjdp/portable_guides/abuse_02/key.html#sids
• Canadian Association of Chiefs of Police
“Code of Police Practice - A Guide for First-Line Officers”
http://www.rcmp-learning.org/copp/encopp/d_infant.htm
March 2004 / 15
Bulletin Reports
Corrections
The National Institute of Corrections (NIC) presents
Gender-Responsive Strategies: Research, Practice, and
Guiding Principles for Women Offenders, which summa-
rizes current knowledge on the characteristics of women
in correctional settings, the ways in which gender makes
a difference in current criminal justice practice, and
multidisciplinary research and theory on women’s lives
that have implications for managing women in the crimi-
nal justice system. For availability and ordering informa-
tion, contact the NIC
Information Center at 800-
877-1461 and reference
accession number 018017. Juvenile Justice
This publication also is The Office of Juvenile Justice and Delinquency Preven-
available electronically at tion (OJJDP) presents Juvenile Gun Courts: Promoting
http://www.nicic.org/pubs/ Accountability and Providing Treatment, which draws on
2003/018017.pdf. the experiences of policymakers and practitioners involved
with juvenile gun courts to describe their development.
Juvenile gun courts are targeted interventions that expose
youth charged with gun offenses to the ramifications of
such acts. Like its better-known counterpart, the youth drug
court, the juvenile gun court is a specialty court that fea-
tures small case loads, frequent hearings, immediate sanc-
tions, family involvement, and treatment services. This
bulletin, part of the Juvenile Accountability Incentive
Block Grants Best Practices Series, reviews the OJJDP-
supported Jefferson County, Alabama, Juvenile Gun
Court. This report is available electronically at http://
ojjdp.ncjrs.org/pubs/courtsum.html#187078 or by contact-
ing the National Criminal Justice Reference Service at
800-851-3420.
Bulletin Reports is an edited collection of criminal justice studies, reports, and project findings. Send your
material for consideration to: FBI Law Enforcement Bulletin, Room 209, Madison Building, FBI Academy,
Quantico, VA 22135. (NOTE: The material in this section is intended to be strictly an information source and
should not be considered an endorsement by the FBI for any product or service.)
March 2004 / 17
Community Policing
Exploring the Philosophy
By DAVID M. ALLENDER
© Mark C. Ide
A discussion concerning
the definition of com-
munity policing can in-
clude vastly different connota-
envision a police force that re-
sponds exclusively to the de-
mands voiced by them. Re-
searchers usually define the
consensus interpretation entirely
dissimilar to any of these. With
such a wide range of viewpoints,
formulating a definition of com-
tions, depending upon the views model by their particular orienta- munity policing becomes a
held by those involved. Street- tion. Politicians typically sup- daunting task. However, one ex-
level officers might conjure up a port the concept, but often re- planation highlights nine words
scenario that requires the transfer main unsure of what the theory that can provide the key to better
of officers from traditional en- means. Law enforcement admin- understanding the concept.
forcement duties to an assign- istrators tend to view the idea as Community policing is a
ment that requires little “police another federally supported ini- philosophy of full-service,
action” but, instead, concen- tiative that they must implement personalized policing where
trates on helping citizens con- to receive grant funds. Finally, the same officer patrols and
front “order maintenance” is- officers and citizens working in a works in the same area on a
sues. Community groups may successful project often reach a permanent basis, from a
”
cepted the traditional policing
approach.
To this end, several law
enforcement agencies attempted Captain Allender serves with the Indianapolis,
Indiana, Police Department.
to implement “team policing”
in the 1980s. Poorly defined
March 2004 / 19
as opposed to maintenance of explain adequately all of the engage in problem solving
community social order or gen- responsibilities that would ac- designed to deal with both the
eral service delivery.”3 Those company this policy. Uncer- immediate situation and with the
designing community policing tainty about what the program underlying causes for the prob-
projects were determined to entailed hindered its implemen- lems. The general public and law
go in a different direction, but tation in the law enforcement enforcement must partner to
they faced many challenges. The community. Some veteran offi- identify problems and formulate
first obstacle to overcome was cers began to feel that commu- solutions. The local law enforce-
formulating a definition for the nity policing was just another ment agency and its citizens
concept. federal program that would dis- must arrive at a consensus defi-
appear as soon as the grant nition for community policing
DEFINING THE CONCEPT money dried up. before they attempt its imple-
Confusion about what con- mentation. The definition needs
stituted community policing to be flexible and subject to
“
arose from the beginning. Every- change as problems in the neigh-
one from citizens to politicians, borhood evolve.
academics, and even law en- Confusion about
forcement managers espoused what constituted IMPLEMENTING
conflicting ideas of what com- THE STRATEGY
community policing
prised community policing. arose from the Besides law enforcement of-
Community advocates latched ficers, other components of the
onto the name and decided that it
beginning. criminal justice system can be
”
signaled a new value system in impacted by the implementation
which police would become of a community policing strat-
more involved with the social egy. Prosecutors or district attor-
problems within their neighbor- How, then, could the propo- neys need to be part of the plan-
hoods. Grant programs encour- nents of community policing ning process before officers
aged community policing mea- identify the expected outcomes bring them arrests for order
sures that satisfied written grant of the program? The common maintenance concerns that other-
requirements and attempted to theme running through all of wise might have been over-
meet the needs of the target area the definitions of community looked. Judges need to under-
receiving funds. Grant writers, policing remains the desire to stand that cases brought before
however, often failed to define improve the quality of life for them from these areas are part of
what those measures entailed. local residents. To accomplish a systematic approach to allevi-
Law enforcement managers be- the goals and objectives of ate problems in a targeted area.
gan holding meetings for their the program, most community Aggressive enforcement that
rank and file sworn personnel policing theories state that an or- results in increased arrests might
informing them that with the der maintenance component impact the jail because of an
advent of community policing, must exist that targets problems increased inmate population.
officers would be “empowered” specific to each community or Probation and parole officers
to take care of problems on environment. may benefit from working with
their beats. These managers, However, coupled with order community policing officers,
however, sometimes failed to maintenance, police also must who could offer them a better
March 2004 / 21
Problem solving represents an formulate new solutions for new National Institute of Justice, 2000),
important component of the ef- problems. 299-370.
4
The author based this statement on his
fort. Flexibility remains a neces- observations during a 6-month detail
sity in dealing with evolving Endnotes working in the Executive Office for Weed
problems in the target area. 1
and Seed as a part of the FBI’s Executive
Robert C. Trojanowicz, U.S.
Regular interaction between Department of Justice, Federal Bureau of
Fellowship Program. He visited several
residents and the police builds Investigation, Behavioral Science Unit, cities that had instituted community
policing as part of Weed and Seed, which
trust and an increased flow of and Michigan State University, National strategically links concentrated and
information. Intelligence gained Center for Community Policing, Commu- enhanced law enforcement efforts
from the public is an invaluable nity Policing: A Survey of Police Depart- (weeding) with health and human services
tool for police. Information ments 2
in the United States, (1994), 6.
James Q. Wilson and George L.
(seeding) to prevent and deter further
gained as a result of community Kelling, “Broken Windows,” Atlantic crime. One city had three sites that varied
greatly in police commitment and resident
policing can lead police to crimi- Monthly 249 (March 1982): 29-38. participation. The most successful had
nal activity that otherwise would 3
Jack R. Greene, “Community Policing high levels of both. The least successful
have gone undetected. Although in America: Changing the Nature, Struc- site had low police involvement, little
ture, and Function of the Police,” in
criminal activity may mutate and Policies, Processes, and Decisions of the resident support, and even some evidence
continue, a successful commu- Criminal Justice System vol. 3 (Washing- of resident opposition to the program.
nity policing program will help ton, DC: U.S. Department of Justice,
Subscribe Now
March 2004 / 23
invest meaningful time with their employees to Bach’s classic book Jonathan Livingston Seagull,
truly understand them and their needs. most of the seagulls did not bother to learn
Supervisors can demonstrate their willingness anything more than just the simplest facts of
to get involved in a variety of situations. For flight. Jonathan struggled with the decision of
example, my chief still goes out on patrol every whether to be content to fly like the other gulls or
now and then. He puts on his uniform, takes the to be different and live up to his flying potential.
stars off his collar, and partners with an officer He decided to take action and excelled above the
on patrol. His actions show the entire department other gulls in the art of flying.
that he does not consider himself above doing the While it is easy to sit back and do just enough
same work that he asks his officers to perform— to get by, to not make waves, and to make every-
and demonstrate his account- one happy, it takes courage to
ability to his employees. act. Employees find it frustrat-
ing to look at a manager and see
N – Nobility
“
someone who will not do so.
Nobility means being Nonaction implies that the
morally sound, superior in All organizations... supervisor must not care.
character and nature. Subordi- desire to supervise Managers should strive to be
nates want to follow managers their employees as people who act when needed,
who model such qualities. effectively as leaders who possess enough
Unfortunately, in today’s possible. courage to change direction
society, many people seem to when warranted. Subordinates
think that two standards exist in
”
want to know that if their
the way people act—one for bosses see something that is not
professional conduct and the right, they will have the courage
other for private. For example, to speak up, to bring the issue to
famous athletes or well-known politicians may light, and to take action. As a famous athlete said,
want to receive judgment only on their spectacu- “You miss 100 percent of the shots you never
lar accomplishments on the athletic field or in the take.”2 Strong leaders “take the shot.” Employees
political arena and to have their private affairs want to work for such individuals.
ignored. However, people of integrity adhere to
moral principles in all activities, on or off duty. G – Guiding Principle
The fact is, subordinates lose respect for their People generally follow a guiding principle
managers if they see them participating in inap- that tells them to treat others as they would like to
propriate conduct, regardless of when or where be treated. Truly, the greatest legacy a person can
the activity takes place. Employees want to work leave behind is to have had a positive influence
for managers of noble character; such supervisors on the lives of others. Supervisors can do this in
earn the esteem of their staffs. three ways.
First, managers should only employ supervi-
A – Action sory tactics that they would consider appropriate
Action defines leadership. Leaders make if their own bosses used them. In this regard,
decisions about where they want to go, what they supervisors can evaluate their own managers and
want to do, and how they will get there. And, they incorporate positive attributes into their own style
do what they said they would do. In Richard of management while eliminating the negative.
March 2004 / 25
offered to attend with me. I remember thinking maintain subordinates’ trust by demonstrating
that this sergeant easily could have thrown the self-discipline and consistency. Subordinates
announcement away when he received it, think- need assurance that supervisors base their actions
ing to himself that he already had attained this and decisions on ethical principles.
rank and did not need the seminar for his own
benefit. How grateful I was that he looked upon N – Notice
his responsibility to mentor others. I greatly Managers should notice the quality work
appreciated his willingness to help me in my own done by their personnel. People depend on the
progression and development toward promotion. evaluations of others, particularly in the work-
place. Supervisors can address this need by using
E – Ethics praise often. Recognition acts as a strong motiva-
As individuals who must set the example for tor at work; employee job satisfaction surveys
their subordinates, managers must realize that attest to this. Unfortunately, organizations often
their words, attitudes, emotions, thoughts, and do not recognize their staffs for the superior work
actions all reveal their personal they do. Certainly, nobody
ethics. While nobody is perfect, wants to work for an agency
supervisors are held to a higher where the boss takes credit for
standard. Fair or unfair, the
higher individuals climb the
“ladder of success,” the more
people expect them to uphold
“ ...a particularly
insightful way to
look into the subject
everything that goes right and
places blame on others when
things go wrong. Managers
should give credit where credit
the ethical standards of law of management is to is due—not doing so surely will
enforcement. view it from the develop disdain and resentment
People’s ethical standards subordinate’s in the organization.
are the written and unwritten perspective. In my department, a watch
rules that govern their personal commander became known for
conduct. Law enforcement
officers strive to abide by the
Law Enforcement Code of
Ethics, which states, in part, “I will never act
” placing stickers of big red stars
on officers’ reports that he
deemed outstanding. While
everyone initially considered it silly (reminding
officiously or permit personal feelings, preju- them of kindergarten), officers actually began
dices, political beliefs, aspirations, animosities or working harder to write better reports, with the
friendships to influence my decisions.” In other obvious goal of receiving a red star on their work.
words, this simply means doing the right thing Recognizing someone for the valuable work they
and making the right choices for the right rea- do is an easy way to develop loyalty and encour-
sons. Supervisors have an obligation to abstain age increased productivity.
from unethical behavior and to call attention to
inappropriate actions when others commit them. T – Trustworthiness
Employees expect managers to “right the wrong,” The Boy Scouts of America follow 12 ideals
to be just and fair in their dealings with their that encompass their Scout Law, with the first
staffs, to demonstrate respect, to prove loyal to being, “A scout is trustworthy.” Trustworthiness
the organization’s mission and vision, and to is of the utmost importance in management as
March 2004 / 27
Computer Forensics
Characteristics and
Preservation of Digital Evidence
By LOREN D. MERCER, M.F.S.
© Digital Juice
I n San Diego County, Cali- a dock at muster. These cases properly handle digital evidence.
fornia, forensic experts ex- and many more, handled by com- Law enforcement agencies take
amined a laptop computer puter forensic examiners every different avenues of addressing
for evidence of notes used in the day, have convicted scores of this increasing load of computer
robbery of several local banks— criminals who committed or evidence that requires examina-
a university professor later stored information pertaining to tion to close cases. Many train a
would plead guilty to bank rob- their crimes with computers and few of their law enforcement of-
bery charges and receive 9 years other digital devices. 2 Such ficers. Some train professional
in prison, even though the laptop criminal acts now transcend tra- support technicians. Increas-
contained no saved notes.1 In an- ditional business crimes. ingly, agencies send their work
other case, a Navy enlisted man Criminals commit few to local or regional computer fo-
faced a dishonorable discharge crimes today without involving a rensic laboratories. Regardless,
and time in the brig for posses- computing device of some type. an understanding of the proper
sion of child pornography after This puts a strain on computer evidentiary foundations for ad-
the discovery of floppy disks in a forensic examiners who have the mission of computer-related evi-
backpack he inadvertently left on training, skills, and abilities to dence proves necessary for the
”
culated ways to send them
through communications lines.3
Since then, computers and other Mr. Mercer serves as a computer forensic examiner with the Computer
Analysis Response Team at the FBI’s San Diego, California, office.
digital computing devices have
used encoding methods based on
the binary numbering system.
Computers allow criminals and how important a chain alphanumeric code must repre-
to remain relatively anonymous of custody becomes when testi- sent 10 decimal digits and 26 let-
and to invade the privacy and fying to the ‘originality’ of the ters, or 36 items. However, the
confidentiality of individuals evidence.”5 inclusion of punctuation, sym-
and companies in ways not pos- bols, and computer control codes
sible prior to the advent of the Storage of Data requires a seven-bit code
computer age. “Evidence of “Digital electronics involves (2x2x2x2x2x2x2) yielding 128
these crimes is neither physical circuits and systems in which combinations, or 27=128. The
nor human, but, if it exists, there are only two possible complete expression of binary
is little more than electronic states. The states are represented information encompasses eight
impulses and programming by two different voltage levels: a bits, with one sign bit and seven
codes.”4 This evidence can take high or a low level. The two-state magnitude bits,8 giving 256 pos-
the form of data digitally stored number system (base 2) is called sible combinations. This eight-
as text files, graphics files, binary, and its two digits are 0 bit binary number represents one
sounds, motion pictures, data- and 1. A binary digit is called a byte. Of the alphanumeric codes,
bases, temporary files, erased bit.”6 Because reading strings of the American Standard Code for
files, and ambient computer data zeros and ones severely limits Information Interchange (ASCII)
dumped on the storage device by the number of people capable of serves as the most widely used.
the operating system or applica- reading a digital device and to Although more complicated,
tion program. If someone opened accommodate letters, punctua- hexadecimal numbering pro-
a digital storage device, they tion, and special characters, an- vides a way to input data into the
would see no letters, numbers, or other decimal numbering system computer that makes sense to the
pictures on it. Therefore, “un- began—the hexadecimal, or average person. After entry,
derstanding how a computer base 16,7 system. The hexadeci- computers write and read data to
stores data is basic to under- mal numbers express the binary digital media by a “read-write”
standing how sensitive that data values stored on a device. At head controlled by the micropro-
is to inadvertent contamination a minimum, a truly readable cessor. For example, a computer
March 2004 / 29
may store data as minute magne- it in the best possible state for courts to question the accuracy
tized regions along a track of a authentication purposes.12 and reliability of the data, the
floppy disk. Other storage de- When duplicating evidence, examination process, and the
vices exist that store data in a the original needs forensically examiner’s “intellectual rigor.”
different fashion, but all read the sound handling from its initial For the admissibility of the
binary data as a zero or a one. seizure until its final disposition. evidence, courts require proof of
Computer evidence has both This requires a chain of custody its authenticity. Two recent U.S.
a physical component (the stor- to assure proper handling by Supreme Court cases, Daubert
age media) and a nonphysical qualified individuals. Also, the vs. Merrell Dow Pharmaceuti-
component (electronic impulses duplication must produce an ac- cals, Inc., 1993 and Khumo Tire
and magnetic orientation). By its curate reproduction of the origi- Co. vs. Carmichael, 1997, have
nature, digital evidence proves nal. Failure to authenticate the brought the standards of forensic
susceptible to alteration, either science and expert testimony
inadvertently or purposely. “It is concerning admissibility of evi-
“
a product of the data stored, the dence into focus. The major fac-
application used to create and tor that underlies the authenticity
store it, and the computer system …evidence of criminal of duplicate evidence is data set
that directs these activities.”9 activity…requires validation.
preservation, The process of validating
Preservation of Computer examination, digital data sets proves straight-
Forensic Evidence forward. Forensic examiners use
and analysis in
Computer forensic science a forensically an algorithm13 to create a hexa-
encompasses four key ele- sound manner…. decimal numeric value repre-
ments: identification, preserva- senting the data set. For ex-
”
tion, analysis, and presentation.10 ample, in an MD514 one-way
Manual handling, processing, hash15 sum, a 16-character hexa-
and authenticity issues serve as decimal value is produced by the
the basis of the preservation as- duplicate image or copy may in- algorithm where there are 2128
pect. Safeguards and method- validate any results produced. possible values. This equates to
ologies used by computer foren- The duplication process requires approximately 340 billion bil-
sic examiners must ensure the the examiner to protect the origi- lion billion billion probable
preservation of digital evidence nal from accidental alteration unique numbers. Theoretically,
to withstand judicial scrutiny and to use methods and applica- two different data set values
should the matter go to trial.11 tions that assure the duplicate could prove identical, but, prac-
In this regard, computer foren- image will produce output that tically, they cannot. By com-
sic examiners seek to use copies would match output from the parison, in cases where DNA re-
of images of original digital original. Agency standard oper- sults have identified a subject,
media for their investigations. ating procedures and policy probability tables exclude or in-
This premise finds its basis in manuals delineate methods of clude an individual using prob-
protecting original digital evi- handling and duplicating. Fail- abilities of one to several billion
dence from accidental damage or ure to adhere to agency policies and stand accepted as unique to
unintentional alteration, leaving and procedures will cause the an individual, or a very small
March 2004 / 31
the handling, duplication, and The ultimate goal of law en- 5
Loren Mercer, “Chain of Custody
authenticity provides assurance forcement has not changed, but Issues Regarding the Handling of Digital
Evidence” (masters thesis, National
to courts that the evidence is as crimes are committed in new University, 2001).
claimed. ways. To preserve the freedoms 6
Thomas Floyd, Digital Fundamentals
all Americans enjoy, evidence of (New York, NY: Merrill, 1990).
Conclusion criminal activity still requires 7
The term base describes the number
The computer age dramati- preservation, examination, and of digits used in a particular numbering
cally has changed how people re- analysis in a forensically sound system. For instance, the decimal number-
ing system is a base-10 system.
late to each other, but not their manner to show the innocence or 8
For further information, see http://
basic human nature. A minority guilt of a suspect. www.geocities.com/regia_me/sig-mag.htm,
of individuals who believe there accessed on July 23, 2003.
9
exists a shortcut to riches, or who Michael Noblett, Mark Pollitt, and
“
invade the privacy or innocence Lawrence Presley, “Recovering and
Examining Computer Forensic Evidence,”
of others, continue to carry out Forensic Science Communications 2, no. 4
their criminal agendas. How- (2000); retrieved on July 23, 2003, from
ever, now they more likely use a
Law enforcement http://www.fbi.gov/hq/lab/fsc/backissu/
computer or other digital device agencies recognize oct2000/computer.htm.
to store information about their that digital devices 10
Rodney McKemmish, “What Is
actions or to commit their will increase in use Forensic Computing,” Australian Institute
of Criminology–Trends and Issues in
crimes. in the commission Criminal Justice (June 1999): 1-6;
Law enforcement agencies of crimes.... retrieved on July 23, 2003, from http://
recognize that digital devices www.aic.gov.au/publications/tandi/
”
ti118.pdf.
will increase in use in the com- 11
J. Borck, “Leave the Cybersleuthing
mission of crimes and that hu- to the Experts,” InfoWorld 23, no. 54
man and equipment resources to Endnotes (2001).
examine this evidence will prove 1
Kathryn Balint, “Computers May
12
Supra note 9.
13
an expanding department bud- Reveal Secrets Behind Crimes”; retrieved A formula or set of steps for solving
a particular problem.
getary item. Agencies that em- on July 23, 2003, from http:// 14
For further information, see
ploy or use computer forensic www.signonsandiego.com/news/metro/ www.permissiontechnology.com/
laboratory resources must recog- santana/20010312-9999_1n12compute. md_5_hash_resources.htm, accessed on
nize that computer forensic ex- html. 2
The author based this article largely
July 15, 2003.
15
aminers need to 1) adhere to a set on his research on and experience with For further information, see
www.rsasecurity.com/rsalabs/faq/
of scientific standards that in- the subject of computer forensics. Law 2-1-6.html, accessed on July 15, 2003.
clude a chain of custody policy enforcement agencies should refer to 16
Federal Rules of Evidence; retrieved
encompassing the unique nature appropriate legal guidelines applicable on July 23, 2003, from http://
of digital evidence, 2) use stan- to their
3
jurisdicions.
Loring Wirbel, “Comms Pioneer
www.law.cornell.edu/rules/fre/
dard operating procedures that Claude Shannon Dead at 84”; retrieved on overview.html.
17
Ibid.
assure known results from dupli- July 23, 2003, from http://www.eetimes. 18
Ibid.
cation and authentication, and 3) com/story/OEG20010227S0045. 19
Ibid.
4
follow policies that meet stan- David Carter and Andra Katz, 20
Ibid.
“Computer Crime: An Emerging Chal-
dards of forensic science and ex- lenge for Law Enforcement”; retrieved on 21
Ibid.
22
pert witness testimony as pro- July 23, 2003, from http://www.sgrm.com/ 42 U.S.C. § 2000aa-7.
mulgated by the courts. art11.htm.
Law enforcement officers are challenged daily in the performance of their duties; they face each
challenge freely and unselfishly while answering the call to duty. In certain instances, their actions
warrant special attention from their respective departments. The Bulletin also wants to recognize
those situations that transcend the normal rigors of the law enforcement profession.
Official Business
Penalty for Private Use $300
Patch Call
The patch of the Fayette, Alabama, Police The patch of the Hampstead, Maryland,
Department features an eagle, symbolizing Police Department displays the town train station,
strength and justice through law and order, sitting which serviced passengers traveling between
atop the city’s shield, which is framed by the Baltimore and Hanover, Pennsylvania. The
flags of the United States and the state of Ala- station, built in 1912 and operational until 1969,
bama. The shield features the year of Fayette’s still stands and is currently under renovation to
incorporation, 1821, along with the cotton bowl, serve as a museum and visitor center.
representing agriculture; the wheel, depicting
industry; and the lamp, symbolizing education.