Sie sind auf Seite 1von 19

Forensic photography

Forensic photography, also referred to as crime scene photography, is an activity


that records the initial appearance of the crime scene and physical evidence, in order
to provide a permanent record for the courts. Crime scene photography differs from
other variations of photography because crime scene photographers usually have a
very specific purpose for capturing each image.

Crime scenes can be major sources of physical evidence that is used to associate or
link suspects to scenes, victims to scenes, and suspects to victims. This is Locard's
exchange principle. It is the basic tenet of why crime scenes should be investigated.
Anything found at a crime scene can be physical evidence. In scientific crime scene
investigation, the first activities at the crime scene are essential for the successful
preservation of the physical evidence. The first responder and ultimately the crime
scene investigator have the obligation to make the scene secure and ensure that any
further activities at the scene do not change the evidence. The use of a multilevel
security method would accomplish this task. The preliminary scene survey is the first
on-scene activity. Precautions are taken for transient and conditional evidence
during the survey.

All forensic photography must consider three elements at a crime scene: the subject,
the scale, and a reference object. Also, the overall forensic photographs must be
shown a neutral and accurate representation.

Features of crime scene photography


Common photography related to creative and artistic photography often shows their
results in a different way. Creative and artistic photographs are perfectly fine.
However, the forensic photography is different. They should serve several purposes.

For people who were at the original crime scene, forensic photos will help refresh
their memory as time goes by. People who could not be present at the original crime
scene, it provides them with the opportunity to see the crime scene and the evidence
within the crime scene.

Furthermore, the forensic photos can be utilized by law enforcement professionals


who will become involved with crime and will be utilized later when the crime case
goes to trial. Judge, jury, attorney and witnesses can reuse and utilize forensic
photos for lawful evidence or references. Sometimes, forensic photos can be the
only way to collect lawful evidences; therefore, two key points are important:

1. Documentation of the crime scene and the evidence within the crime scene.
2. Collection of evidence. These images can then be later used as examination-
quality photographs by experts/analysts from the forensic laboratory.

Crime scene evidence


Crime scenes are the source of the physical evidence that is used to associate or
link suspects to scenes, victims to scenes, and suspects to victims. Any item found
at a crime scene can be physical evidence; it can be labeled as the debris of criminal
activity. There is considerable overlap among identifications, but evidence can be
categorized into the following broad groups based on its origin, composition, or
method of creation:

1. Biological evidence — any evidence derived from a living item. Includes


physiological fluids, plants, and some biological pathogens.

2. Chemical evidence — any evidence with identifiable chemicals present.

3. Patterned evidence — any evidence with a pattern or predictable pattern of


appearance.

4. Trace evidence — any evidence of such a small size so as to be overlooked,


not easily seen or not easily recognized.

In addition to identifying the type of physical evidence found at a crime scene, it is


necessary to obtain valuable investigative information from the analysis of the items
of physical evidence.

1. Determination of corpus delicti — the evidence is used to determine if a


crime has taken place.

2. Modus operandi identification — criminals repeat behavior. Repeated


methods of entry, for example, by kicking in a back door with the same shoe
leaving the same footwear impressions throughout the crime scene.

3. Association or linkage — the Locard Exchange Principle — transfer of


evidence by contact. See the next section to follow.

4. Disproving/supporting victim/suspect/witness statements — the


evidence may or may not support what these groups say.

5. Identification of suspects/victims/crime scene location — fingerprints and


even DNA can be used to identify who was present at a crime scene.

6. Provide for investigative leads for detectives — the use of the physical
evidence to give information to detectives that will assist them in locating
victims and suspects.
Essential 3 steps on crime scene
The first activities at the crime scene are essential for the successful preservation of
the physical evidence.

First responders

The crime scene investigator is rarely the first person at a crime scene. Most first
responders work on reflex or instinct at the scene. Their tasks are to save lives or
apprehend suspects. Unfortunately, that may mean that physical evidence may be
inadvertently altered, changed, or lost due to the actions of a first responder. The
crime scene investigator needs to communicate with the first responders to
determine if any changes or alterations have occurred at the scene before the scene
investigator arrived.

Crime scene security

Locard's exchange principle is the basis for the use of physical evidence in a criminal
investigation, it is extremely important for the crime scene to be made secure and
restrict the access to the crime scene by nonessential people. Many agencies allow
easy access to crime scenes by anyone in the agency. Most media persons are kept
out but changes to the scene and evidence can change in attempts to protect
victims.

Preliminary scene survey

The preliminary scene survey or walk-through is the crime scene investigator’s first
opportunity to view the target area crime scene. A simple visual search for obvious
physical evidence can be accomplished at this time. It is during this first viewing of
the crime scene that the scene investigator should note any transient or temporary
items of evidence and protect them immediately. Melting snow footwear impression
are examples of this transient evidence.

Methods
All photographs must contain three elements: the subject, a scale, and a reference
object. Crime scene photographs should always be in focus, with the subject of the
photograph as the main object of the scene. There should always be a scale or ruler
present. This will allow the investigators the ability to resize the image to accurately
reconstruct the scene. The overall photographs must be a fair and accurate
representation of what is seen. Any change in color may misidentify an object for
investigators and possibly jurors.

Preliminary overall photographs should attempt to capture the locations of evidence


and identifying features of the scene, such as addresses, vehicle identification
numbers and serial numbers, footwear/tire mark impressions, and the conditions of
the scene. While the purpose of the overall photograph is to document the conditions
of the scene and the relationship of objects, the medium range photograph serves to
document the appearance of an object.

In all photographs, a scale must be included, as well as a marker to indicate the


identity of the object in question. Again, objects of medium-range photographs must
be a fair and accurate representation of what is seen. Adjusting the photographic
principles or lighting may allow the photographer to achieve this goal.

In general, the basic components of macro or evidentiary photography are as


follows: If any evidentiary photographs are to be taken for use in a critical
comparison examination at a later time, guidelines must be followed in accordance
with the best practices of digital evidence.

1. The digital image must be captured in a lossless


compression format. The two widely accepted lossless compression formats
are tagged image file format (TIFF) and RAW. TIFF is a universal file type,
whereas RAW files are proprietary based upon the manufacturer of the
camera. Specialized software may be required to open and enhance a RAW
image.

2. The camera must be on a grounded platform, such as a copy stand or


tripod. In general, the human body cannot stop natural vibrations with a
camera shutter speed slower than 1/60 of a second. Using a grounded
platform will allow the subject matter to be in complete focus.

3. The camera shutter must be controlled by a remote cord or by using the


timer mode. The simple action of depressing the shutter control will cause
the camera to vibrate, losing focus of the subject matter.

Documentation

The responding officer must also maintain a photo log if any photographic
documentation is taken. The log should contain the date and time of the photograph,
the subject matter, and any additional notes. These logs must be maintained within a
case file or incident report, as they are a part of the examination record and
discoverable material at trial.
Equipment

The tools required to properly document the crime scene include:

 Notepad

 Clipboard and/or digital tablet device

 Graph paper

 Writing instruments (pens, pencils, markers)

 Still camera with external flash and extra batteries

 Video camera

 Tripod

 Measurement instruments (tape measures, rulers, electronic measuring


devices, perspective grids, etc.)

 Evidence identification and position markers or placards

 Photographic log

 Compass

Fit for court


The images must be clear and usually have scales. They serve to not only remind
investigators of the scene, but also to provide a tangible image for the court to better
enable them to understand what happened. The use of several views taken from
different angles helps to minimise the problem of parallax. Overall images do not
have scales and serve to show the general layout, such as the house where the
murder is thought to have occurred. Context images show evidence in context, like
how the knife was next to the sofa. Close up images show fine detail of an artifact,
such as a bloody fingerprint on the knife.

Road traffic incident (RTI) photographs show the overall layout at the scene taken
from many different angles, with close-ups of significant damage, or trace
evidence such as tire marks at a traffic collision. As with crime scene photography, it
is essential that the site is pristine and untouched as far as is possible. Some
essential intervention, such as rescuing a trapped victim, must be recorded in the
notes made at the time by the photographer, so that the authenticity of the
photographs can be verified.

As with all evidence a chain of custody must be maintained for crime scene
photographs. Sometimes a CSI (forensic photographer) will process his/her own film
or there is a specific lab for it. Regardless of how it is done any person who handles
the evidence must be recorded. Secure Digital Forensic Imaging methods may be
applied to help ensure against tampering and improper disclosure. [10] Accident scene
pictures should also be identified and sourced, police photographs taken at the
scene often being used in civil cases.

Disaster Victim Identification, or DVI, is the method used to


identify victims of mass casualty incidents, either man-made
or natural.

INTERPOL protocols
As people travel widely these days for both business and holidays, a disaster can
potentially result in the deaths of nationals from many different countries. This can be as
a result of a natural disaster, such as an earthquake or cyclone, or a terrorist attack, for
example.

One country alone may not have sufficient resources to deal with mass casualties. The
incident may have damaged or destroyed the country’s existing emergency-response
infrastructure, making the task of victim identification even more difficult.

A coordinated effort by the international community can significantly speed up the


recovery and identification process, helping victims’ families to begin the healing process
and societies to rebuild.
Following a terrorism incident, DVI procedures can also help investigators identify
possible attackers.

It is rarely possible to identify a victim


of a major disaster by visual
recognition; fingerprints, dental
records or DNA samples are often
required for a conclusive
identification.
Setting the standard
In 1984, INTERPOL produced the first Guide to Disaster Victim Identification. The guide
is updated every five years and is the unique globally accepted standard for DVI
protocols.

Member countries can call on INTERPOL for DVI assistance following a disaster. We
can help them with:
 Downloadable DVI guide and forms;
 Assistance from the Command and Coordination Centre;
 The deployment of an Incident Response Team to provide on-site support.

INTERPOL’s DVI activities are supported by a Working Group on Disaster Victim


Identification which is made up of forensic and police experts from around the world. It
meets regularly to discuss how DVI procedures and standards can be improved and to
help develop training programmes.

Four steps to identification


It can take a long time to accurately identify victims, especially if a large number of
people were killed. The four stages are:

1 – Scene examination: Depending on the incident, and where it happened, it can take
days or even weeks for all the victims and their property to be recovered.
2 – Post-mortem or PM data: The human remains are examined by specialists to detect
forensic evidence to help identify the victim. This can include:
 Fingerprints – if available, these are highly reliable, but as most people’s fingerprints are
not on record they can be of limited value;
 Odontology – or dental examination. Teeth provide one of the most reliable forms of
identification as they are highly durable and most people have dental records;
 DNA profiling – direct comparisons can be made from a victim and a profile taken from
their home, for example from a hair brush. Indirect comparisons can also be made using
the parents’ DNA;
 Physical indications – tattoos, scars or surgical implants which may be unique to the
victim.
Visual identification is not considered to be accurate.
3 – Ante-mortem or AM data: Dental and medical records, fingerprints and DNA are
recovered from the victims’ homes or provided by family members.
4 – Reconciliation: Once the PM and AM data is collected, a team of specialists
compares and reconciles the two sets of information to identify the victims.

INTERPOL coordinated the international DVI response following the 2004 Asian
tsunami. More than 2,000 specialists from 31 countries were involved in the identification
process in Thailand alone, where some 5,000 victims were identified. This remains the
largest single-incident DVI operation conducted to date.

10 COOL TECHNOLOGIES USED IN FORENSIC SCIENCE

1. Laser Ablation Inductively Coupled Plasma Mass Spectrometry (LA-ICP-MS) :


When broken glass is involved in a crime, putting together even tiny pieces can be key
to finding important clues like the direction of bullets, the force of impact or the type of
weapon used in a crime. Through its highly sensitive isotopic recognition ability, the LA-
ICP-MS machine breaks glass samples of almost any size down to their atomic
structure. Then, forensic scientists are able to match even the smallest shard of glass
found on clothing to a glass sample from a crime scene. In order to work with this type of
equipment in conjunction with forensic investigation, a Bachelor’s Degree in Forensic
Science is usually necessary.

2. Alternative Light Photography : For a forensic nurse, being able to quickly


ascertain how much physical damage a patient has suffered can be the difference
between life and death. Although they have many tools at their disposal to help make
these calls quickly and accurately, Alternative Light Photography is one of the coolest
tools to help see damage even before it is visible on the skin. A camera such as the
Omnichrome uses blue light and orange filters to clearly show bruising below the skin’s
surface. In order to use this equipment, you would need a MSN in Forensic Nursing.

3. High-Speed Ballistics Photography : You might not think of it right away as a tool
for forensic scientists, but ballistics specialists often use high-speed cameras in order to
understand how bullet holes, gunshot wounds and glass shatters are created. Virtually
anyone, from a crime scene investigator to a firearms examiner, can operate a high-
speed camera without any additional education or training. Being able to identify and
match bullet trajectories, impact marks and exit wounds must be done by someone with
at least a Bachelor’s of Science in Forensic Science.

4. Video Spectral Comparator 2000 : For crime scene investigators and forensic
scientists, this is one of the most valuable forensic technologies available anywhere.
With this machine, scientists and investigators can look at a piece of paper and see
obscured or hidden writing, determine quality of paper and origin and “lift” indented
writing. It is sometimes possible to complete these analyses even after a piece of paper
has been so damaged by water or fire that it looks unintelligible to the naked eye. In
order to run this equipment, at least a Bachelors degree in Forensic Science or a
Master’s Degree in Document Analysis is usually required.

5. Digital Surveillance For Xbox (XFT Device) : Most people don’t consider a gaming
system a potential place for hiding illicit data, which is why criminals have come to use
them so much. In one of the most ground-breaking forensic technologies for digital
forensic specialists, the XFT is being developed to allow authorities visual access to
hidden files on the Xbox hard drive. The XFT is also set up to record access sessions to
be replayed in real time during court hearings. In order to be able to access and interpret
this device, a Bachelor’s Degree in Computer Forensics is necessary.

6. 3D Forensic Facial Reconstruction : Although this forensic technology is not


considered the most reliable, it is definitely one of the most interesting available to
forensic pathologists, forensic anthropologists and forensic scientists. In this technique,
3D facial reconstruction software takes a real-life human remains and extrapolates a
possible physical appearance. In order to run this type of program, you should have a
Bachelor’s Degree in Forensic Science, a Master’s Degree in Forensic Anthropology or
a Medical Degree with an emphasis on Forensic Examination and Pathology.

7. DNA Sequencer : Most people are familiar with the importance of DNA testing in
the forensic science lab. Still, most people don’t know exactly what DNA sequencers are
and how they may be used. Most forensic scientists and crime lab technicians use
what’s called DNA profiling to identify criminals and victims using trace evidence like hair
or skin samples. In cases where those samples are highly degraded, however, they
often turn to the more powerful DNA sequencer, which allows them to analyze old bones
or teeth to determine the specific ordering of a person’s DNA nucleobases, and generate
a “read” or a unique DNA pattern that can help identify that person as a possible suspect
or criminal.

8. Forensic Carbon-14 Dating : Carbon dating has long been used to identify the age
of unknown remains for anthropological and archaeological findings. Since the amount
of radiocarbon (which is calculated in a Carbon-14 dating) has increased and decreased
to distinct levels over the past 50 years, it is now possible to use this technique to
identify forensic remains using this same tool. The only people in the forensic science
field that have ready access to Carbon-14 Dating equipment are forensic scientists,
usually with a Master’s Degree in Forensic Anthropology or Forensic Archaeology.

9. Magnetic Fingerprinting and Automated Fingerprint Identification (AFIS) : With


these forensic technologies, crime scene investigators, forensic scientists and police
officers can quickly and easily compare a fingerprint at a crime scene with an extensive
virtual database. In addition, the incorporation of magnetic fingerprinting dust and no-
touch wanding allows investigators to get a perfect impression of fingerprints at a crime
scene without contamination. While using AFIS requires only an Associates Degree in
Law Enforcement, magnetic fingerprinting usually requires a Bachelor’s Degree in
Forensic Science or Crime Scene Investigation.

10. Link Analysis Software for Forensic Accountants : When a forensic accountant is
trying to track illicit funds through a sea of paperwork, link analysis software is an
invaluable tool to help highlight strange financial activity. This software combines
observations of unusual digital financial transactions, customer profiling and statistics to
generate probabilities of illegal behavior. In order to accurately understand and interpret
findings with this forensic technology, a Master’s Degree in Forensic Accounting is
necessary.

METHODOLOGY FOR THE FEATURED FORENSIC SCIENCE TECHNOLOGIES

When deciding which technologies to include on this list, a number of factors were taken
into consideration.

 Relevance to the Topic of Forensic Technology: The said technology must


be actively used in the field of Forensic Science and can be taught at the college
level. Widely regarded technologies were considered first, while more
experimental technologies were included only on the basis of reputable peer-
reviewed documentation.

 Novelty in the Field of Forensic Science: More experimental technologies


were given higher priority based on whether the technology gave advanced
information that is not readily available by using other technologies. These
“cutting-edge” technologies were thoroughly vetted to ensure that they have
become accepted techniques by leaders in the field.
 Reliability of Technology: Finally, only techniques used with more than 80%
reliability were included in this list. Factors that affect reliability included case
closure rate, successful conviction rate and correct identification rate.

mitochondrial dna analysis

Mitochondrial DNA (mtDNA) has provided forensic scientists with a valuable tool
for determining the source of DNA recovered from damaged, degraded, or very
small biological samples. MtDNA is a small circular genome located in
the mitochondria, which are located outside of a cell's nucleus.

Information that women and men can derive from their mitochondrial DNA.
Maternal line: the Mitochondrial-DNA is passed on from the mother to her children.
... A mitochondrial DNA test tells you where your maternal ancestors come from.

Yet another benefit of mitochondrial DNA analysis involves missing person cases.
In a family, the maternal members such as an individual's mother or grandmother
have identical mitochondrial DNA. ... Mitochondrial DNA analysis is a valuable
technique and its applications are relevant to many different fields.

Mitochondrial DNA Analysis

In human cells, DNA is found in both the nucleus and the mitochondria. The
mitochondrion is an organelle responsible for the molecular products that provide the
energy to the cell. There is a single nucleus in human cells and it contains two
copies of DNA, one originating from the father and one from the mother. In contrast,
there may be hundreds or thousands of mitochondria in human cells and the DNA in
a single mitochondrion may be copied numerous times. Nuclear DNA is much longer
than mitochondrial DNA, also written mtDNA, however the fact that there are so
many more copies of mtDNA makes it extremely useful in cases in which there is
only a small sample or the sample has been degraded. In addition, some biological
materials such as hair shafts, teeth, and bones do not contain any cell nuclei, but
mitochondria may be present and mitochondrial DNA analyses can be performed.

When a sperm fertilizes an egg, the DNA-containing head of the sperm fuses with
the egg, but the tail and midsection are left on the outside of the egg. The
mitochondria of a sperm are found in the tail and midsection as these parts require
energy in order to propel the sperm. Because the mitochondria of the sperm never
reach the inside of the egg, all the mitochondria in the embryo come from the egg.
As a result the mitochondrial DNA in a child is identical to that of the
mother. Mitochondrial DNA is therefore useful for proving maternal relationships in
forensic investigations.

The DNA molecule is made up of a sequence of four different smaller molecules


called nucleotides:

adenine (A), guanine (G), cytosine (C) and thymine (T). DNA is a double stranded
molecule and its nucleotides always associate themselves with a complementary
nucleotide; if adenine is on one of the strands, thymine is across from it on the other
strand. Similarly, if cytosine is on one strand, guanine will be found across from it on
the other strand. Because the nucleotides of DNA are found in pairs on the two
strands, the nucleotide sequence is also called a sequence of base pairs (bp).

Mitochondrial DNA is approximately 16,569 base pairs long and the genome is
usually found in a ring-like conformation. There are two major parts of the molecule.
A coding region accounts for the majority of the molecule and the DNA from this
section codes for biochemical products related to providing energy to the cell. The
other section of the mtDNA is called the control region and it is responsible for
regulating the production of the gene products from the coding region. Within the
control region there are two regions that have been found to contain a
disproportionate number of variations in humans. These regions are called
Hypervariable Region 1 and Hypervariable Region 2, or HV1 and HV2. HV1 is
approximately 342 bp and HV2 is approximately 268 bp.

There are five major steps to mtDNA analysis. First, the sample is visually
examined, cleaned, and prepared. Cleaning is extremely important because
extraneous cells from handling can easily contaminate a sample. Usually the sample
is immersed in detergent and an ultrasonic bath. Teeth and bones are sanded and
cross-sectioned. In teeth, the dentin and pulp are used in the analysis. In all cases,
the sample is ground to a powder and then placed in an extraction solution to
release the cellular material, including the mtDNA, from the cells.

The second step involves extracting the mtDNA from the cellular material. This is
accomplished by adding to the solution a mixture of chemicals that separate DNA
from other organic molecules and then spinning the mixture in an ultracentrifuge.
The mtDNA is concentrated in the top layer and then purified. The third step
involves a technique called PCR, polymerase chain reaction, which uses carefully
regulated cycles of heating and cooling to produce many copies of the mtDNA. This
process is called amplification. After amplification, the mtDNA product is purified and
quantified to ensure that the PCR yielded the expected quantity of mtDNA. The final
step in mtDNA analysis is sequencing the amplified mtDNA. This is done using a
technique similar to PCR, but special fluorescently labeled nucleotides that terminate
the growth of a strand are added to the solution. This technique is referred to as
Sanger’s method and the result is many strands of DNA that vary in length by one
nucleotide. This collection of DNA is then sorted by length, using a technique called
gel electrophoresis. A fluorescence detector then reads the labels at the end of each
strand of DNA and computer software reconstructs the mtDNA sequence. Finally, a
DNA examiner edits and verifies the sequence.

When performing mitochondrial DNA analysis, about 610 bp are sequenced and
compared to a standard. Any nucleotides in the sample sequence that differ from this
standard are listed by location and nucleotide.

The FBI has been using mtDNA to solve crimes since 1996. By 2006, they
established the National Missing Persons DNA Database to gather information on
missing persons for the law enforcement community. A database of mitochondrial
DNA can also be accessed through the FBI’s CODIS (Combined DNA Index System)
software. Mitochondrial DNA has been used successfully in a broad range of
instances such as solving missing persons cases and identifying human remains and
disaster victims.

SYDNEY SHARK CASE

The Shark Arm case refers to a series of incidents that began in Sydney, Australia,
on 25 April 1935 when a human arm was regurgitated by a captive 3.5-metre tiger
shark, subsequently leading to a murder investigation.

Discovery and identification of the limb

The tiger shark had been caught 3 kilometres (1.9 mi) from the beach suburb
of Coogee in mid-April and transferred to the Coogee Aquarium Baths, where it was
put on public display. Within a week the fish became ill and vomited in front of a
small crowd, leaving the left forearm of a man bearing a distinctive tattoo floating in
the pool. Before it was captured, the tiger shark had devoured a smaller shark. It was
this smaller shark that had originally swallowed the human arm.

Fingerprints lifted from the hand identified the arm as that of former boxer and small-
time criminal James (Jim) Smith, (born England, 1890), who had been missing since
7 April 1935. Smith's arm and tattoo were also positively identified by his wife Gladys
and his brother Edward Smith.[1] Smith led a high-risk lifestyle, as he was also
a police informer. Examination revealed that the limb had been severed with a knife,
which led to a murder investigation.[2] Three days later, the aquarium owners killed
the shark and gutted it, hampering the initial police investigation.
Early inquiries correctly led police to a Sydney businessman named Reginald
William Lloyd Holmes (1892-1935). Holmes was a fraudster and smuggler who also
ran a successful family boat-building business at Lavender Bay, New South
Wales.[3] Holmes had employed Smith several times to work insurance scams,
including one in 1934 in which an over-insured pleasure cruiser
named Pathfinder was sunk near Terrigal, New South Wales. Shortly afterwards, the
pair began a racket with Patrick Francis Brady (1889-1965), a convicted forger and
ex-serviceman. With specimen signatures from Holmes' friends and clients provided
by the boat-builder, Brady would forge cheques for small amounts against their bank
accounts that he and Smith then cashed. Police were later able to establish that Jim
Smith was blackmailing the wealthy Reginald Holmes.

Murder of James Smith

James Smith was last seen drinking and playing cards with Patrick Brady at the Cecil
Hotel in the southern Sydney suburb of Cronulla on 7 April 1935 after telling his wife
he was going fishing.[4] Patrick Brady had rented a small cottage in Taloombi Street,
Cronulla at the time Jim Smith went missing. Police alleged that Smith was murdered
at this cottage.

Port Hacking and Gunnamatta Bay were searched by the Navy and the Air Force,
but the rest of Smith's body was never found. This caused problems for
the prosecution when Brady was eventually brought to trial.

Arrest of Brady

Patrick Brady was arrested on 16 May and charged with the murder of Smith.
A taxi driver testified that he had taken Patrick Brady from Cronulla to Holmes'
address at 3 Bay View Street, McMahons Point, New South Wales, on the day Smith
had gone missing, and that "he was dishevelled, he had a hand in a pocket and
wouldn't take it out... it was clear that [he] was frightened."[5]
Initially, Holmes denied any association with Patrick Brady but four days later, on 20
May 1935, the businessman went into his boatshed and attempted suicide by
shooting himself in the head with a .32 calibre pistol. However, the bullet flattened
against the bone of the forehead and he was merely stunned. Revived after falling
into the water, he crawled into his speedboat and led two police launches on a chase
around Sydney Harbour for several hours until he was finally caught and taken to
hospital.[6]

In early June 1935, Reginald Holmes decided to cooperate with the police
investigating the murder of Smith. He told Detective Sergeant Frank Matthews that
Patrick Brady had killed Jim Smith, dismembered his body and stowed it into a trunk
that he had then thrown into Gunnamatta Bay. He then claimed Patrick Brady had
come to his home, showed him the severed arm and threatened Holmes with murder
if he did not receive ₤500 immediately. Holmes also admitted that after Brady had
left his home, he travelled to the Sydney coastal suburb of Maroubra and discarded
Smith's arm in the surf.[7]

Second murder

On 11 June 1935, Holmes withdrew £500 from his account and late in the evening
left home, telling his wife he had to meet someone. He was also very cautious as he
left his home, accompanied by his wife to the door of his Nash sedan. Early the next
morning, he was found dead in his car at Hickson Road, Dawes Point. He had been
shot three times at close range.[8] The crime scene was made to appear that Holmes
had committed suicide, but forensic police had no doubt that he was murdered.
Holmes was due to give evidence at Smith's inquest later that morning.
Reginald Holmes was cremated at Northern Suburbs Crematorium on 13 June
1935.[9] He left an estate valued at over ₤34,000 in 1935, which would be worth
millions of dollars today.[10]

In his 1995 book The Shark Arm Murders, Professor Alex Castles claims that
Reginald Holmes took out a contract on his own life to spare his family the public
disgrace of conviction.[11]

Coroner's inquest

The Coroner's inquest into Smith's death began on 12 June 1935 at the City
Coroner's Court led by Mr. E.T. Oram, the same day Holmes was found dead in his
car with gunshot wounds to his chest. Although Holmes was the inquest's star
witness, he was never offered police protection before his testimony could be heard.
Forensic evidence was examined by Prof Sydney Smith.[12]

The lawyer serving Brady, Clive Evatt KC (1900–1984),[13] claimed to the coroner
that there was not enough substance to begin the inquest. Evatt argued that an arm
"did not constitute a body", and that Jim Smith, minus his arm, could still be
alive.[14] The case has remained unsolved to this day.

The inquest's most important witness, Reginald Holmes, was then dead; the case
against Patrick Brady fell apart due to lack of evidence.[15] The Shark Arm
Murders suggests that Jim Smith was killed by Patrick Brady on the orders
of gangland figure Edward Frederick (Eddie) Weyman, who was arrested
while attempting to defraud a bank with a forged cheque in 1934[16] and later during
a bank robbery, apparently due to information Jim Smith had given to the police.
Smith had been exposed as a police informant, and therefore would have been a
target for assassination.[17]

The police charged Patrick Brady with the murder of Jim Smith, although he was
later found not guilty and acquitted.[18] For the next 30 years, Patrick Brady
steadfastly maintained that he was in no way connected to the murder of Jim
Smith.[19] He died at Concord Repatriation Hospital in Sydney on 18 April 1965, aged
76.[20] [21] The investigation into the murder of Jim Smith and his severed arm
became legendary in Australia's legal history.[22]

Das könnte Ihnen auch gefallen