Anda di halaman 1dari 44

THE STEVENSON UNIVERSITY

FORENSICS JOURNAL

EDITOR-IN-CHIEF
Carolyn Hess Johnson, Esq.

PUBLISHER
Carolyn Hess Johnson, Esq.

EDITORS
Patricia Ellis, Esq.
Steven Engorn
Stephen W. Oliner, CPA, CFE, CVA
Nanette Tamer, Ph.D.
John J. Tobin, Jr.
Stephanie Witt
FORENSICS JOURNAL

Welcome to the premier edition of the Stevenson University Forensics Journal. The Journal provides the scholarly
community with a wide range of subjects pertaining to forensic studies as well as forensic science.

The articles written for the Journal are authored by current masters degree candidates, recent graduates and
faculty. It is our goal to offer students and graduates the opportunity to explore their chosen concentration in
the program through researching, writing and reviewing relevant topics, books or interviewing people in the field
of forensic studies.

The opportunity to submit articles is provided to every student in the masters program through a research and
writing course which allows the individual student to select a topic of interest and explore the same over the
eight week session. Each article is peer reviewed, allowing students to work together to provide constructive editing
advice to each other and to improve the quality of the submissions.

I would like to extend special thanks to the many students, graduates and faculty who submitted their work for
publication review. It was not an easy selection process as there were many fine articles from which to choose.
To those authors selected for publication, you have shown remarkable commitment and I am grateful for your
patience and willingness to continue working on your submissions.

My gratitude to the editors of the Journal knows no bounds. The faculty, staff and graduate assistants who
tirelessly edited the submissions demonstrated their commitment to this scholarly pursuit. Thank you also
to President Kevin Manning, Dean Paul Lack, Dean Joyce Becker and to our Program Coordinator, Thomas
Coogan for helping to make the Journal a reality.

Carolyn Hess Johnson, Esq.


Associate Professor of Forensic Studies

1
STEVENSON UNIVERSITY

2
FORENSICS JOURNAL

TABLE OF CONTENTS

4 18
THE FUTURE OF THE AMERICAN
EDITORIAL
PETIT JURY SYSTEM
BOARD
LAUREN MAXWELL

5 22
MORAL LAPSE VERSUS THE PSYCHO-
WELCOME
PATHIC FRAUDSTER: IMPLICATIONS
THOMAS COOGAN, ESQ.
FOR OUR JUSTICE SYSTEM
YVETTE FRUSCIANTE

6 27
AN INTERVIEW WITH PRINCE GEORGES THE GAP BETWEEN TRAINING AND
COUNTY STATES ATTORNEYS OFFICE RESEARCH IN THE DETECTION OF
SPECIAL INVESTIGATOR, RENATA JONES DECEPTION REVISITED
CAROLYN HESS JOHNSON, ESQ. EDWARD R. KEMERY, PH.D.

7 33
ISSUES WITH CELL BOOK REVIEW:
PHONE FORENSICS CORPORATE RESILIENCY: MANAGING THE
MICHAEL ROBINSON GROWING RISK OF FRAUD AND CORRUPTION
BY TONY BISHOP AND FRANK HYDOSKI
KEN JOHANNING

10 35
PRINCESS DOE: WILL HER IDEN- BOOK REVIEW:
TITY EVER BE KNOWN? FRAUD EXPOSED: WHAT YOU DONT KNOW
MYRON BRETHOLTZ COULD COST YOUR COMPANY MILLIONS
BY JOSEPH KOLETAR
MARINA TAPIA

14 38
TECHNOLOGY AND FRAUD BOOK REVIEW:
INVESTIGATIONS IN THE OFFICE INVESTIGATING IDENTITY THEFT: A GUIDE FOR
OF THE INSPECTOR GENERAL BUSINESSES, LAW ENFORCEMENT AND VICTIMS
MARY BETH HUTCHESON BY JUDITH M. COLLINS
VERONICA ARZE

15
THE ANALYSIS OF
ECSTASY COMPONENTS
CHRISTINE BURNS

3
STEVENSON UNIVERSITY

FORENSICS JOURNAL EDITORIAL BOARD

CAROLYN HESS JOHNSON, ESQ. is an STEPHEN W. OLINER, CPA, CFE, CVA


attorney and a full time Associate Professor is a partner at Hertzbach & Company, P.A.,
of Forensic Studies in the School of Graduate a regional public accounting firm located in
and Professional Studies at Stevenson Univer- Owings Mills, MD. He is a director of the
sity. She has worked in private practice, as Business Valuation, Forensic and Litigation
a Senior Assistant State Prosecutor for the Consulting Group at Hertzbach, and concen-
State of Maryland and as an Assistant States trates his efforts in business valuations, foren-
Attorney in Baltimore City, Maryland. sic accounting and litigation support services.

PATRICIA ELLIS, ESQ. has served in many MIKE RYMAN is Treasurer and a member
capacities at Stevenson University, currently as of the Board of Directors, International Anti-
an Associate Dean in the School of Graduate Corruption Resource Center, Washington,
and Professional Studies. Among her accom- D.C. and is Chief Operating Officer and
plishments, she has published and presented at Director of Compliance, Lone Star Interna-
national conferences and has given several work- tional, LLC. Retired from Federal Service in
shops. She is currently the Vice Chair for the 1991, he served as a White Collar Crime and
Executive Board of the Commission for Accel- Public Corruption Field Supervisor, Opera-
erated Learning and is Editor of its Newsletter. tions Auditor on the Directors Staff, and a
Field Staff Program Manager for Anti-Racketeering. He then received
an appointment to the Federal Senior Executive Service, Office of
STEVEN ENGORN is the Chief Technology Inspector General, in the Commerce, HHS and Labor Departments.
Strategist in the School of Graduate and Pro- Mr. Ryman also served as Senior Policy Advisor and Chief Investiga-
fessional Studies at Stevenson University. He tor with the House of Representatives, Committee on Government
is also the Program Coordinator for Business Operations and served the Speaker of the House as Special Advisor
and Technology Management and Informa- to his Counsel.
tion Systems and an Assistant Professor of
Information Technology
JOHN J. TOBIN, JR. is a full time Assis-
tant Professor of Forensic Science as well as
the Coordinator of the Masters of Forensic
NANETTE C. TAMER, PH.D. has taught Science Program at Stevenson University.
courses in writing and literature at Stevenson Mr. Tobin was formerly the Director of the
University since 1989. She has published Forensic Sciences Division of the Maryland
several articles and contributed to textbooks in State Police. He currently holds a Masters in
writing and linguistics. Forensic Science and is pursuing a doctorate
in Forensic Toxicology.

STEPHANIE WITT is currently a student in


the graduate program at Stevenson University,
where she is pursuing a degree in Forensic
Science. She completed her undergraduate
studies in 2008 at the University of Baltimore,
with a B.S. degree in Forensic Science. Stepha-
nie works as a graduate assistant in Stevensons
School of Graduate and Professional Studies.

4
FORENSICS JOURNAL

Dear Reader,

Welcome to the first edition of Stevenson Universitys Forensics Journal. Since 1947, we, along with Villa Julie
College, our predecessor institution, have had a vision: to educate, not only for the sake of higher learning, but
also for the sake of a better life. It has been and continues to be our hope that by doing well for our students,
and our students doing well for themselves, the Stevenson University community will do well by others.

The Forensics Journal is a direct outgrowth of the Stevenson University vision to become a national leader in
collaborative career-focused liberal arts education. The journal is a collaborative effort among students in various
fields of studyaccounting, information technology, investigations, law, and scienceand between the students
and our faculty.

What led us to publish this journal is our core belief in the value of career-focused higher education. The persons
who came up with the idea for the journal envisioned the journal as a career-building opportunity for our students,
not a career-advancement opportunity for academicians.1

The idea for a journal began a few years ago as part of a continuous improvement of our forensic studies masters
degree program. The program was established in 2004 to address a need identified by employers for persons in the
fields of accounting, information technology, investigations, and law to testify in court. The journal was not origi-
nally part of the curriculum. The original curriculum required all students to take a writing and research course, and
only law students to take a thesis course. Students in the law track were the only masters degree students who had
the responsibility and the opportunity to produce a significant piece of graduate-level writing. However, students
from other tracks occasionally expressed interest in conducting higher-level research and producing a thesis. Under
the original curriculum, we could not accommodate students from other tracks who did.

We found ourselves trying to encourage students to appreciate the value of writing, especially in the field of forensic
studies. By value, we meant more than just some sort of abstraction, but a very concrete, economic value of being
able to write well so our students can advance their careers. A required core writing course just did not seem like
enough to impress upon students the real value of writing. So in concert with the idea of a journal, we decided to
require our students to take a core course where they would prepare a written submission that, if good enough,
might one day be considered for inclusion in the journal. By having their articles published, students would have
a real product to show employers, and presumably would reap a real benefit from their achievement, beyond just
course credit and a grade.

It is our sincere hope that the journal will stand as a concrete example of our commitment to the mission of
Stevenson University, which is to provide a career-focused education. We hope the journal shows off the talents
of our students and enhances their career opportunities. Of course, we also hope the journal provides useful
information to students of forensic studies both at Stevenson University and elsewhere. Please enjoy this first
edition of our Forensic Studies Journal.

Thomas Coogan, Esq. Joyce Becker, Esq.


Program Coordinator, Forensic Studies, Dean, School of Graduate
and Associate Professor of Forensic Studies and Professional Studies

1
We are indebted to the leadership of President Kevin Manning and Dean Paul Lack, who have always provided the forensic studies and
this most recent effort with their unwavering support.

5
STEVENSON UNIVERSITY

A Day In The Life Of A Fraud Investigator


Renata Jones, Fraud Investigator for the Prince Georges County,
Maryland, States Attorneys Office
Carolyn Hess Johnson, Esq.

WHAT ARE YOUR PRIMARY RESPONSIBILITIES AS A WHAT IS YOUR GENERAL PROCEDURE FOR WORKING A
FRAUD INVESTIGATOR? FRAUD CASE?

My work primarily consists of gathering and analyzing financial After speaking with the victim, I begin by sending out subpoenas for
documents pertinent to the alleged fraud. I work on fifteen to twenty bank records. The records of both the victim and the offender are
cases at any given time, each one involving multiple documents needed to allow for the examination and tracing of a money trail. I
and records. In addition, I spend a great deal of time speaking with will send subpoenas to any banks or credit card companies that might
victims assessing the overall case and the damages. have been used by the offender so that I can examine the monies
going in and out of the relevant accounts. I follow up the subpoenas
by contacting the fraud investigators or legal representatives of the
affected bank or credit card company and creating a theft schedule. In
PLEASE EXPLAIN THE TYPE OF FRAUD CASES YOU SEE this way, I have a clear sense of what happened to the money in ques-
MOST OFTEN IN YOUR WORK. tion, should I be called to testify in the case.
Typically, our cases involve trusted employees who steal from their
employers through unauthorized credit card use or check forgery. The
theft can range anywhere from $10,000 to over $500,000 in losses HOW DOES A TYPICAL FRAUD CASE PRESENT?
to the victim. Once the theft is discovered, the victim will either file
charges directly, or contact the police to begin an investigation and Most cases involve an employee stealing from an employer by cashing
then file charges. checks without authorization and/or using company credit cards for
personal expenses. Often, these employees work for small businesses
and are trusted by the owner to have access to checks or credit cards
for limited and specified use. The fraud occurs when the employee
HOW OFTEN DO YOUR CASES GO TO TRIAL AND WHAT begins to cash checks or use a company credit card for personal and
TYPES OF SENTENCES ARE GIVEN?
unauthorized use.
Not many cases go to trial, as we are often able to work out a plea
agreement. The sentence depends on a number of factors, but the
focus is usually on whether the defendant has any prior convictions WHAT ARE THE SKILLS AND PERSONAL CHARACTERISTICS
and the amount that was stolen. Generally, the sentence includes NEEDED TO BE AN EFFECTIVE FRAUD INVESTIGATOR?
restitution to pay the victim back at least some of the stolen monies.
Along with restitution, the offender is placed either on probation or It is extremely important to have compassion for victims of fraud.
under house arrest so supervision is maintained for a period of time. Often, they are small business owners who have come to depend on
Although offenders are sometimes given jail time, the longest jail and trust an employee to help run the business. After a fraud is dis-
sentence I have seen is two years. covered, victims seek closure as well as justice. In addition, maintain-
ing positive relationships with the legal and financial representatives
of banks and credit card companies allows a fraud investigator to get
the documents needed, often on an expedited basis.
WITH WHAT AGENCIES AND TYPES OF PROFESSIONALS
DO YOU WORK (BOTH IN AND OUT OF YOUR OFFICE)
ON A DAILY BASIS?
WHAT OTHER TYPES OF CASES DO FRAUD
I work directly with my supervisor Isabel Mercedes Cumming, Chief INVESTIGATORS HANDLE?
of the Economic Crimes Unit for Prince Georges County. I also work
with the Prince Georges County Police Department, which maintains Computer scams have become more and more common in the last
a detective in each district of the County to work on financial crimes. few years. Often, the offender will create a fake company, promis-
Often, other State and Federal agencies are involved whose fraud ing money or items to the victim in exchange for personal financial
investigators work closely with my office. In addition, I work with information, such as account numbers or a social security number.
banks and credit card companies to trace the thefts. These cases are difficult for investigators because we have to stay
extremely current in our knowledge of technology. However, many of
these scams could be prevented or caught early if people take the time
to check their credit reports once a year and carefully review their
monthly bank and credit card statements.

6
FORENSICS JOURNAL

Issues with Cell Phone Forensics


Michael Robinson

ABSTRACT CELL PHONES: WILDLY POPULAR AND


CONSTANTLY CHANGING
The analysis of mobile phones is a relatively new discipline within
digital forensics that focuses on recovering and analyzing data within There are many different models of computers in use today. Yet, even
cell phones. There are several differences between this field and clas- with a high number of competing manufacturers and vendors, the
sical computer forensics that pose obstacles to examiners in this new number of file systems and operating systems being used on comput-
discipline. In order to recover reliable forensic evidence from cell ers is relatively small. Microsoft Windows still dominates the desktop
phones, examiners must take into consideration these differences. The computing environment, with approximately 85-97%3 of the market
astounding growth in use and rapidly changing cell phone technol- (Steel, 2006). The cell phone industry does not operate the same way.
ogy, issues with the procedures associated with acquisition of live cell While cellular networks and communication signals are standardized
phones and the reliance on canned reports, are significant issues to among a few technologies; e.g., Global System for Mobile Communi-
be overcome. Examiners will need to continue their training in this cation (GSM), Code Division Multiple Access (CDMA), and Inte-
new field and adapt their standard procedures if they hope to remain grated Digital Enhanced Networks (iDEN), there are many different
successful in analyzing cell phones. cell phones being used. There are thousands of different models of cell
phones on the market (Jansen and Ayers, 2007). Cell phone manu-
It is becoming increasingly common for cell phones to be associated facturers are constantly updating existing devices, releasing new mod-
with illegal activities, such as drug trafficking, video recording gang els, and providing upgrades. Analysis of the various phones becomes
hazing activities, sexting1 between minors, driving a car while texting complex due to the sheer size of the market. An examiner may never
on a cell phone, or detonating an Improvised Explosive Device (IED) know what type of phone he/she may encounter.
in a war zone. Cell phone forensics is a young field within digital
forensics that holds great possibilities to make contributions in legal In addition to the wide array of cell phones being used among the
proceedings. A well-trained and talented cell phone examiner can over 200 million in operation (Kim, 2006), the nature of cell phone
uncover significant information for use in civil and criminal proceed- development makes forensic analysis even more complicated. There
ings. Given the proper tools and sound techniques, it is possible to are very few standards in place when it comes to the phones them-
recover address books, text messages, call logs, pictures, videos, and selves. Many cell phone manufacturers use proprietary operating sys-
a history of internet usage from a cell phone (Forte and de Donno, tems to keep their competitive edge (Nelson, Phillips, Enfinger, and
2010). In many situations, deleted data can be recovered as well. Yet Steuart, 2008). This means forensic examiners will continue to inter-
even with these successes, cell phone forensics has its share of com- act with different phones and proprietary operating systems where
plications. Practice within the field is riddled with characteristics that technical standards may not be published. In order to effectively
separate it from classical computer forensics. An expert in computer preserve, retrieve, and analyze data on a cell phone, it is necessary to
forensics may not be qualified in processing cell phones even though understand the technology upon which a cell phone is based and how
both computers and cell phones fall in the discipline of Information a cell phone operates. An examiner would not want inadvertently to
Technology. The differences between the two disciplines make the alter or destroy evidence on a seized device. Having familiarity with
acquisition and analysis of cell phone evidence challenging. Among the various devices in the field of mobile communications is challeng-
the list of issues facing forensic examiners are the cell phone industrys ing. Forensic examiners need constantly to learn about changes in the
growing and changing market, acquisition methods that require live industry to remain effective in their field.
analyses through powered on devices and dependence on canned or
pre-formatted reports in current forensic tools. As precedent is created The ever-changing cell phone market is a challenge, not only for the
in the courts,2 it is extremely important for forensic examiners to examiner, but for the developer of court accepted tools as well. The
know the primary characteristics of cell phone forensics and how they diversity in the market means that not all forensic tools will work
differ from classical computer forensics. with all existing phones. Tool developers, such as Paraben Corpora-

1
Sexting is the practice of sending sexually explicit photographs between cell phone users. Incidents similar to the following have appeared across the United States. In Janu-
ary 2009, in Western Pennsylvania three teenage girls allegedly sent nude or seminude pictures of themselves to three teenage boys. All were charged with possessing child
pornography. See http://www.cbsnews.com/stories/2009/01/15/national/main4723161.shtml.

2
Data recovered from cell phones are being used in more trials. Take for example, State v. Hernandez (Not Reported in A.2d, 2010 WL 816828, N.J.Super.A.D.,2010),
where a kidnapper was tracked using his cell phone. The defenses objection of using cell phone data on the grounds of inadmissible hearsay was overruled.

3
The range of 85-97% is attributed to the different polls taken regarding the use of Microsoft Windows.

7
STEVENSON UNIVERSITY

tion, Cellbrite, Susteen, and LogiCube focus their efforts on popular evidence on the phone by working through a port on the phone and
cell phone models to obtain the highest return on their investments. interacting with the phones operating system; thus, modem com-
Some tools may be very successful in processing call logs on a par- mands are sent to a cell phone through a USB cable, infrared port, or
ticular phone, but not perform as well when recovering text messages. Bluetooth connection in order to retrieve data (Nelson, B., Phillips,
Some tools acquire address books successfully, while others may A., Enfinger, F., and Steuart, C., 2008). If the cell phone is not pow-
miss a list of contacts completely. Because of the vast number of cell ered on, it will not be able to receive the commands to retrieve the
phones in use, each forensic tool has various degrees of success from data. These requirements for power have considerable implications for
cell phone to cell phone. Different operating systems, hardware, and processing a cell phone.
cables are concerns that are addressed by forensic tool developers. As a
result, tools have different degrees of success when it comes to pro- There are risks associated with examining a phone while it is powered
cessing the different types of data stored on the phones (Jansen and on. When a cell phone is seized, the examiner must ensure that
Ayers, 2007). In order to compensate for this disadvantage, examiners the cell phone has sufficient power to be transported to the forensic
need to do three things to increase the likelihood of conducting a suc- lab and undergo an examination. This is so because if a cell phone is
cessful examination. First, they must seize both phones and peripher- turned off, data could be lost and security features, such as encryption
als, such as cables, batteries, and memory cards. Second, they must or a password, might be re-enabled on start-up. A power adapter or
be comfortable using a number of tools to process a device. As noted battery charger will help maintain power to the cell phone. Having
above, it is not sufficient to use only one tool. Finally, examiners must the phone charged and operating opens the phone to another set of
constantly update their toolkits with new releases provided by the issues. Unless communication to and from a cell phone is blocked,
forensic tool developers. cell phones are susceptible to having the information on them altered
by incoming communication. Text messages and inbound phone
calls can alter a cell phones logs. This has the potential to overwrite
ACQUIRING DATA: CELL PHONES NEED TO REMAIN ON existing evidence on the phone. For example, incoming text messages
will overwrite existing text messages if the database containing text
One of the truisms in conducting an examination of computer media, messages is full. A similar concept applies to call logs on phones. If a
such as a hard drive or USB flash disks, is never to conduct an analy- call log is full, incoming telephone calls will force old records to be
sis on the original evidence. Instead, a forensic copy of the evidence overwritten on the phone. In cases where a BlackBerry must be pro-
should be analyzed. This preserves the chain of custody and avoids cessed, remote commands can be issued to the mobile device from a
the contamination or spoilage of fragile digital evidence. Addition- centralized server that would erase all information on the BlackBerry.
ally, an examiner should never boot a computer from the hard drive While the device must remain on, communication between the cell
when performing an examination because this process will alter the phone and wireless signals must be blocked.
target media to be examined. The operating system files and associ-
ated data will change. Data preserved in temporary file locations may It is necessary to take precautions to block wireless communication
be overwritten accidentally. These de facto standards work well for coming to and leaving a cell phone. Electromagnetic shielding by
computers; however, conducting an analysis of a cell phone requires means of a Faraday bag or other shielding material must be used to
an analyst to operate counter to these rules. prevent the contents of a cell phone from changing during transpor-
tation and analysis. This shielding will adversely affect the phones
In order to conduct an analysis of a cell phone, it is necessary for the battery life. This is a trade-off: increasing the blocked signal will
phone to be turned on and examined directly. An examiner cannot decrease the battery life. When most cell phones lose connectivity
perform a dead analysis4 as he/she would with a computer hard with their cellular network, they compensate by boosting their signal
drive. It is impossible to examine a cell phone while it is turned off. strength. This increased strength depletes the cell phones battery at
This is true for several reasons. First, cell phone evidence exists in an increased rate. To address the trade-off, the examiner will need to
volatile memory, which requires power to be running through the compensate. An examiner must not only shield the cell phone, but
phone. Without power, the contents of the phones Random Access must also include a battery charger within the shield to prevent the
Memory (RAM) will be lost. Second, cell phones have the operat- cell phone from losing power. The process of acting quickly to shield
ing system, applications, and user data stored on internal memory a phone and provide supplemental power requires the examiner to
modules that require power. It is not possible to extract the modules have familiarity with the proper procedures and have immediate
and examine their contents directly. Third, all forensic tools access the access to Faraday materials.

4
A dead analysis is the process of conducting an examination of a hard drive in a computer after the computer has been turned off. A dead analysis has the benefit of not
having the contents of the hard drive change while the acquisition and examination take place.

8
FORENSICS JOURNAL

AN EXPERTS ANALYSIS VERSUS CANNED REPORTS forensic examiners as the devices become ubiquitous. As more indi-
viduals discontinue their landlines and opt for reliable cell phones,
Most cell phone forensic tools on the market, e.g., Parabens Device this technology will become further ingrained in everyday culture. In
Seizure, Cellebrites Universal Forensic Extraction Device (UFED), order to keep pace with analyzing cell phones, examiners will need to
Compelson Laboratories MOBILedit! Forensic, and Susteens Secure- seek ongoing training on current and emerging technologies. Addi-
View, have the ability to generate reports using canned formats, tionally, tool makers will need to develop more robust products that
which list in detail the data recovered from a cell phone. The reports can analyze a greater number of phones in circulation.
are enhanced with features such as hash values of recovered files and
the reports themselves.5 Some tools, such as Parabens Device Sei- As cell phones evolve and incorporate greater computing power into
zure, even have the ability to generate multiple versions of reports to the palm of the user, cell phone analysts will need to develop this
provide detailed information in a logically arranged format. Although branch of digital forensics. Examiners will not be able to share their
these reports assist examiners in presenting their data in clear, easy to time between computer forensics and cell phone forensics. These
understand reports, as detailed below, the reports have drawbacks. specially trained individuals will need to focus on this area with 100%
of their attention.
One of these is the appearance an incomplete report may present. As
previously mentioned, forensic tools have different degrees of success
when it comes to retrieving evidence from a cell phone. For example, REFERENCES
a particular tool may not recover the Short Message Service (SMS)
messages that are stored on a cell phone. The tool may not find the Forte, D. and de Donno, A. (2010). Mobile Network Investiga-
messages or it may not be able correctly to parse the data into rec- tions. Handbook of Digital Forensics and Investigation. Elsevier, Inc.
ognizable text. In this situation, no data would be returned to the Burlington, MA.
examiner, even though data might exist on the phone. If a report were
to be generated in this instance, there would be no data in the report; Jansen, W. and Ayers, R. (2007). NIST Special Publication 800-101.
therefore, one might draw an incorrect inference about the phone. Guidelines on Cell Phone Forensics. National Institute of Standards
A blank report may not truly indicate the actual contents of a cell and Technology. Gaithersburg, MD.
phone; further examination of the phone would be necessary.
Kim, R. (2006, February 27). The worlds a cell-phone stage: The
It is of critical importance that forensic examiners do not become device is upending social rules and creating a new culture. San Fran-
dependent on a specific tool or the canned reports generated from cisco Chronicle.
a tool. Examiners must learn the craft of recovering data manually
Nelson, B., Phillips, A., Enfinger, F., and Steuart, C. (2008). Guide
to ensure that forensic tools do not miss significant findings. Tools,
to Computer Forensics and Investigations. Third Edition. Course
such as Parabens Device Seizure, which recover raw operating system
Technology. Boston, MA.
files give examiners the opportunity to analyze data and offer their
own analysis rather than rely on a report. It is only when cell phone Steel, C. (2006). Windows Forensics: The Field Guide for Conduct-
examiners apply their understanding of the technology to a specific ing Corporate Computer Investigations. Wiley Publishing, Inc.
situation that their expert opinion becomes reliable. Indianapolis, IN.

CELL PHONES WHERE TO GO FROM HERE?

The popularity of cell phones will continue to climb as network ser-


vice providers offer better performance and faster speeds. Cell phone
manufacturers will continue to improve their devices by offering
new models with better battery life, improved product integration,
and new features. There will be no shortage of work for cell phone

5
A hash value is a large number that is created based on a mathematical algorithm and a data file. Each file will produce a unique hash value. If a files contents are later
altered, it will not be possible to generate a matching hash file. In this way a hash file serves as a digital fingerprint for a file: a unique identifier of a file where no two files
generate the same value.

9
STEVENSON UNIVERSITY

Princess Doe: Will Her Identity Ever Be Known?


Myron Bretholz

This article describes and analyzes some of the more intriguing aspects Still more recently, a website, www.princessdoe.org, was created by
of a crime that occurred over a quarter century ago. It also examines a man named Travis Riggs. The site, which is devoted solely to the
the efforts of one man who created a website for the express purpose murder victim, is professionally laid out, with numerous links and
of solving this murder. a wealth of information,3 and notes that Princess Doe became the
first Missing Person/Unidentified Person case entered into the NCIC
In July 1982, the remains of a young Caucasian female who would [National Crime Information Center] computer database by [then]
eventually become known as Princess Doe were found adjacent FBI Director, William Webster.4 The site lists her cause of death as
to a cemetery in Blairstown, a small town in Warren County, New blunt force trauma to the head.5
Jersey, a mostly rural northwestern section of the state. Investigators
quickly concluded that the woman had probably been killed else- This internet site dedicated to Princess Doe is a model of thorough
where and then dumped where she was found. Princess Does remains construction, easily legible text, and grammatical and contextual pre-
were laid to rest in the cemetery next to where she was initially cision and clarity. The breadth and depth of information on the site is
discovered, and have been there since that time, undisturbed but for a a testament to a small but devoted group of people whose informa-
single exhumation in 1999, performed in order to extract DNA. The tion and knowledge Riggs has cohesively assembled and organized
crime had occurred before the advent of DNA technology, but many who simply refuse to let their dedicatees passing go unnoticed, and
years subsequent to the murder, it was used in order to try to fill in who relentlessly continue to pursue their mission of releasing the
some of the crimes missing pieces. victim from her anonymity, as well as finding her murderer.

A short time after her remains were found, the anonymous young On the 25th anniversary of her discovery, a graveside service was held
woman was dubbed Princess Doe by Blairstown Lieutenant Detec- to commemorate her anonymous life and mysterious death.6 And yet,
tive Eric Kranz, the original investigator assigned to the case, who despite the initial flurry of investigative activity that naturally ensued
explained that there were too many Jane Does already, so at least our just after her body was found and the wealth of technological and sci-
victim should have a distinctive name.1 Kranz left the Blairstown entific advances that have occurred since, as well as the single-minded
police department three years after Princess Does discovery. A series dedication of at least two law enforcement officers7 and one private
of articles on Lt. Kranzs work in the case explains, [F]rustrated with citizen (Riggs), two critical facts still remain unknown to this day: the
his constant run-ins with other investigators assigned to the case identity of the victim and the identity of her killer.
by the New Jersey State Police, Kranz resigned from the township
department in 1985. He is now disabled, recovering from a back The author of the Princess Doe website has proposed a number of
injury.2 theories regarding the victims origins and identity, including one the-

1
Q20: Where did the name Princess Doe originate? A20: The original detective on the case, Lt. Eric Kranz from the Blairstown Police department, came up with the idea
during the original investigation. He did not want her to be known as another Jane Doe and forgotten. www.princessdoe.org/faq.html.

2
Policeman Haunted By Killers Presence, by Dan Burnett, The Pocono Record (Stroudsburg, Pennsylvania). This article, the second installment of a three-part story devoted
to Princess Doe, focuses on Lt. Kranz. It was added to the Records online site on December 15, 1997, and was later reprinted on the Vidocq.Org website www.vidocq.org/
doe/doe2.html as well as on the Crimeshots website www.crimeshots.com/Haunted04.html.

3
The name of the websites creator does not appear anywhere within the site itself. However, an email inquiry which the author sent to an address on the website early on
in his research for this article elicited a speedy and cordial reply from Travis Riggs, who is the sites creator. This in turn led to an email correspondence, and then a personal
meeting. Riggss comments and perspectives thus became an integral part of this article.

4
www.princessdoe.org/timeline.html (Emphasis in original.) The FBIs NCIC Unidentified Person File www.fbi.gov/hq/cjisd/missingpersons.htm#unidpersonfile is an es-
sential primary source for statistics pertinent to unidentified remains, and is part of the overall file maintained by the NCIC. Additionally, the US Department of Justices
Unidentified Decedents Database https://identifyus.org/ serves a similar purpose; i.e., providing lay access to statistics pertinent to unidentified remains.

5
http://www.princessdoe.org/details.html

6
The memorial service is described in two articles: Remembering Princess Doe by Jacqueline Lindsay, The Warren Reporter, July 14, 2007. http://blog.nj.com/warrenre-
porter/2007/07/jacqueline_lindsay.html; and A Grim Anniversary for Princess Doe, by Kevin Coyne, The New York Times, July 15, 2007.
www.nytimes.com/2007/07/15/nyregion/nyregionspecial2/15colnj.html?_r=1. Both articles mention, and quote, Travis Riggs.

7
Lieutenant Detective Stephen Speirs, who works for the Warren County Prosecutors Office, is currently the investigator in charge of the Princess Doe case: Q7: Who is
currently handling this investigation? Is it active? A7: The Warren County Prosecutors Office is currently handling this case. The investigator in charge is Lieutenant Detective
Stephen Speirs. He can be reached at 908-475-6275 or via e-mail sspeirs@co.warren.nj.us. Yes, the case is active and being investigated/pursued. www.princessdoe.org/faq.html.

10
FORENSICS JOURNAL

ory that she had been working as a prostitute. Just as quickly as this So far, 13 of the entries have been ruled out as a possible match for
theory was raised, however, it was struck down as being completely Princess Doe, but those entries remain on the site nonetheless. This
unsubstantiated on the grounds that not one person came forward array of information is just one more example of, and is typical of, the
to identify her, either on or off the record, and that if she had in fact incredible work that has gone into the sites construction and mainte-
been known to work in prostitution in the local area, it would have nance since its creation.
been highly unlikely for her remains to go unclaimed.8 Nevertheless,
the websites Frequent Questions page advises the reader to consult One name that appears on the site as a possible match is worthy of
the Americas Most Wanted website,9 which posits the theory that Prin- note here, owing both to her local (Maryland) connection, and to
cess Doe was in fact a prostitute and was killed by her pimp when she her seemingly uncanny resemblance to Princess Doe. Her name is
was no longer of any use to him. Lieutenant Detective Stephen Speirs Karen Beth Kamsch, and although she disappeared from her home in
was singlehandedly responsible for unearthing the information which Pasadena, Maryland, in 1976, she was not reported to law enforce-
led to this conjecture, which is all the more tantalizing because it is ment agencies as a missing person until 31 years had passed since
really the only viable theory that relies on the interviews of possible she had last been sighted. It took the curiosity and persistence of her
witnesses to the girls murder. brother, Tate Kamsch, to finally make her disappearance known to
the police.11 The resemblance between the photograph of the miss-
One theory that is not raised on the website concerns the victims ing Kamsch girl (left), and the artists reconstruction of what Princess
country of origin; the site makes the implicit assumption that the Doe might have looked like (right) is striking:
victim was in all likelihood from the United States; however, it is pos-
sible that the victim was from elsewhere in North America, or even
from overseas, and had entered into the US illegally, and/or without
the knowledge of her family and friends. This theory begs for further
investigation, and, for his part, Riggs allows that he, too, needs to
address the possibility of her being an international victim.10

Another intriguing feature of the Princess Doe website is the Possible


Matches page. Here, the assiduous and patient Riggs has taken the
trouble to compile a list of no fewer than 85 women who have disap-
peared during the stretch from as early as August 1974, up to within
a month of the discovery of Princess Does body. The list includes the
obvious categories of name, date of birth, date missing, age [at the
time of disappearance], and [last known] city [of residence]. The list

also includes some absolutely vital categories such as ruled out [as a
match for Princess Doe], rule out method, and age at the time Prin-
cess Doe was found.

8
This is another one of the seven theories that are raised on the websites Princess Doe Possible Theories page. www.princessdoe.org/theory.html.

9
Q16: What is the most likely scenario for the case? A16: This is a tough, yet often asked question. The most likely scenario that has been published is on the Americas Most
Wanted Website. That is the best, most up-to-date lead available. We are always searching for new information to help identify Princess Doe and try to keep an open mind to
all new and old information. www.princessdoe.org/faq.html (See also Endnote 24.)

10
Email from Travis Riggs to the author, March 4, 2009.

11
Test Results Awaited In 1976 Disappearance: Arundel Police Have Person of Interest by Raymond McCaffrey, The Washington Post, September 6, 2007. www.washing-
tonpost.com/wp-dyn/content/article/2007/09/05/AR2007090502370.html.

12
Apart from including Princess Doe in its Unidentified Remains listings, as well as the shared use of the Doe moniker, the Doe Network has no particular or exclusive
connection with Princess Doe. The name Doe (and its most common variants, John Doe and Jane Doe) are of course terms that are ubiquitous when referring to other-
wise unidentified or unidentifiable living persons or decedents.

13
Even though Princess Doe was discovered in a rural setting, the location is less than ten miles from Interstate 80. www.doenetwork.org

14
The administrator of the Maryland Missing Persons Website, Kylen Johnson, also volunteers for the Doe Network site, and she was instrumental in helping to identify
Tonya Gardners remains.

11
STEVENSON UNIVERSITY

The fate suffered by Princess Doe is, unfortunately, not unique far apart from the fact that the decedent was eventually identified, one
from it, in fact. There are literally hundreds of cases nationwide with of those cases fits the aforementioned pattern very closely: the body
characteristics similar to those of the Princess Doe case. The Doe of Tonya Gardner, a Pennsylvania resident, was found alongside
Network,12 a website dedicated to cases involving both missing per- Interstate 70 near the exit for Maryland State 94 in Howard County
sons and unidentified human remains, lists over 100 cases of females in 1996. She was finally identified eight years later,15 although the
whose bodies were found alongside or close to interstate highways question of howand by whose handshe met her demise has yet to
(as was the case with Princess Doe).13 The Maryland Missing Persons be satisfactorily answered.
Network website14 was established specifically in response to one
womans obsession with finding the identity of a Jane Doe discovered The creator of and driving force behind the Princess Doe website,
in 1991, in a culvert alongside Interstate 270 in Frederick County, Travis Riggs, is a native of Blairstown, New Jersey, and now makes
Maryland. In fact, the Maryland Missing Persons Network site also his home in Baltimore, Maryland; he administers the website on his
lists and depicts Princess Doe, owing to her possible connection with own time and at his own expense. Riggs was just four years old when
Maryland. Princess Does remains were found. I was too young to remember
the specifics [of the murder], but I do remember how scared everyone
Clearly, there is a pattern that links many of these cases, which have was. . . . We lived in a place where people rarely locked their doors
in common the victims sex (female), location found (near an inter- and then we suddenly had a murder. This was a total unknown. Blair-
state highway), and, most disquietingly of all, the fact that all of the stown is such a quiet place; you would never expect to see something
victims identities still remain a mystery. To its credit, Doe Network like this happen.16 His primary and indeed sole motive in establish-
volunteers have assisted in resolving several dozen previously open ing the Princess Doe website is simply to find a name for the victim,
cases, involving both missing persons and unidentified remains. Also, and then find out who killed her.

15
The administrator of the Maryland Missing Persons Website, Kylen Johnson, also volunteers for the Doe Network site, and she was instrumental in helping to identify
Tonya Gardners remains.

16
Remembering Princess Doe by Jacqueline Lindsay, The Warren Reporter, July 14, 2007. http://blog.nj.com/warrenreporter/2007/07/jacqueline_lindsay.html.

17
New York State Department of Correctional Services, Inmate Population Information Search, http://nysdocslookup.docs.state.ny.us/GCA00P00/WIQ3/WINQ130.

18
These highlights of Speirs investigative efforts are culled from the Americas Most Wanted website, www.amw.com/missing_children/case.cfm?id=44823, and merit recount-
ing herein. Travis Riggs says that the pimp is Arthur Kinlaw. In 1998, Lt. Stephen Speirs, of the Warren Co. [New Jersey] Prosecutors Office, was assigned to the case. He
immediately began looking through the evidence and informationmaking it his mission to find Princess Doe. . . .That year, Lt. Speirs received a phone call from N.Y. au-
thorities who had some interesting information. A former prostitute and her pimp were arrested in Calif. The cops told Lt. Speirs that the woman had been charged as an ac-
complice in at least one murder committed by her pimpand while cooperating with police, shed told them the pimp was responsible for the beating death of a teenager in
a N.J. [cemetery]. N.Y. cops told Lt. Speirs shed be willing to talk to him about the murder. . . .Lt. Speirs traveled to Rikers Island Prison to meet with the woman. She told
him the killer was a big-time pimp in Long Island who preyed on runaways and throwaways. She said he lured Princess Doe into his pimping businessbut she was naive, in-
experienced, and [of no value] to the pimp. Several times, he tried selling her to other pimps because she wasnt doing well as a prostitute, but no one wanted to buy her. Lt.
Speirs says the womans story made sense, but she was a criminal who lacked credibilityand the pimp she named wouldnt talk to him. Lt. Speirs was at a standstill with the
new lead. . . .Then, in 2005, Lt. Speirs received a copy of a letter originally sent to the Attorney Generals Office. The letter was from the pimp himself, and in it, he accepted
responsibility for Princess Does murder. Although the letter was not addressed to Lt. Speirs directly, the letter mentioned his namelikely because the pimp had remembered
it from 1998 when Lt. Speirs had reached out to him and [the pimp had] refused to cooperate. Lt. Speirs was thrilled by the new development, and began to correspond with
the pimp by mail, then by phone. In May 2005, they made arrangements to meet face-to-face at the Wendi Correctional Facility in upstate N.Y., where the suspect was being
held. [He has since been transferred to another facility.] There, the pimp gave Lt. Speirs some vital information. According to Lt. Speirs, the pimp admitted to the murder in
person and gave some specifics, lending credibility to his storybut he left out some key elements. Lt. Speirs says it may be because the pimp has a long criminal history, and
may be confusing parts of his other crimes with Princess Does murder. But that wasnt all. The pimp also revealed something new about the former prostitute Lt. Speirs had
interviewed back in 1998. The pimp told Lt. Speirs that she hadnt been telling him the whole truth. The pimp told cops that not only did she know about the murderbut
she was there during the murder. Lt. Speirs knew he had to go back and talk to herthis time as a murder witness. When Lt. Speirs and the former prostitute met up later
that month, she admitted shed been at the cemetery during the murder. Lt. Speirs says she was clearly uncomfortable during the meetingappearing guilt-ridden, and scared
to death of retaliation from her ex-pimp. But despite her fears, Lt. Speirs says she was willing to cooperate and wanted to move on with her life. Thanks to the witness coop-
eration, Lt. Speirs learned some important details about Princess Doe. According to the witness, Princess Doe was definitely from N.Y.probably the Long Island area. The
former prostitute also agreed to meet with a forensic sketch artist to create a sketch based on her eyewitness account of what Princess Doe looked like. Once the sketch was
completed on September 13, 2005, Lt. Speirs recalls the witness said, Yes, thats her! He could tell by looking at the witnesss eyes as she looked over the final product that
she was clearly looking into the face of the victim.

19
New York State Department of Correctional Services, Inmate Population Information Search, http://nysdocslookup.docs.state.ny.us/GCA00P00/WIQ3/WINQ130.

20
E.g., Couple Charged in 1984 Slaying Of Woman Found in East River, by Kit R. Roane, The New York Times, June 21, 1998. http://query.nytimes.com/gst/fullpage.html
?res=9A0CE1D8143CF932A15755C0A96E958260

12
FORENSICS JOURNAL

In that vein, Riggs puts some stock in the possible involvement of nationwide. Cases involving unidentified remains are not a top prior-
Arthur Kinlaw, a career pimp who is now serving a lengthy prison ity for most law enforcement agencies, primarily because of the previ-
sentence in New York state.17 Riggs has never met the inmate, but ously cited budgetary and manpower limitations, but also because
Lieutenant Detective Speirs actually interviewed Kinlaw. Speirs came the nameless dead have no family or friends to act as advocates. Thus,
away from that interview believing that he, Kinlaw, was somehow there is no onebarring, of course, the intervention of someone with
connected to Princess Does death, even if, as Kinlaw himself asserted, Riggss dedicationavailable to continuously monitor the progress
he never actually knew the girls name.18 Likewise, Donna Kinlaw of such cases. By tirelessly championing and publicizing his case,
(who was married to Arthur Kinlaw in the 1980s, and also served Riggs hopes and believes that he can help surmount the bureaucratic
time in New York for a manslaughter conviction she incurred as a obstacles that allow many more such cases to languish or be forgotten.
result of being involved with another one of Arthur Kinlaws crimes,
but has since been released19) revealed details about several other mur- Finally, in defense of all of the amateur sleuths or would-be sleuths
ders of young women that only she and/or her then-husband could who have come to embrace the internet as yet another tool for solving
have known.20 These two individuals might hold the key to Princess mysteries: it is all well and good to sit at ones own computer and try
Does death, if not her identity. Still, the passage of so much time to match missing persons with unidentified remains, but it is a vastly
since the murders occurrence only makes the obtaining and corrobo- more daunting task to be part of an investigative team charged with
rating of any fading memories or vague recollections by the Kinlaws examining forensic evidence related to the discovery of unidentified
or anyone else who might come forward all the more difficult. The human remains. No ones efforts or interest, however, should ever be
best hope is for a person or persons to emerge who can positively considered too trivial or mundane to be somehow useful. It can only
identify Princess Doe, and perhaps only then might her storys final be hoped that the Princess Doe websites mission to identify the vic-
chapter be written.21 tim of a crime, as well as her murderer can finally be accomplished
before too much more time has passed, and that all of the painstaking
Riggs emphasizes that Lieutenant Detective Speirs, and Kranz before work that has gone into the websites creation and upkeep will thus
him, were and are both every bit as committed if not more so to not have been in vain.
solving the Princess Doe case as Riggs himself. [It should also be
noted that Riggs modesty about his own involvement with this case Travis Riggs own words might serve as an appropriate coda to this
is equaled only by his unstinting and ongoing praise of the two detec- article, while also helping to maintain the hope for a successful resolu-
tives Eric Kranz and then Stephen Speirs who have devoted so tion to the mystery of Princess Doe: I dont want people to forget
much of their time and energy to the case.] Still, Riggs cannot help this case. I think its totally solvable. You have this young person that
but lament the fact that budgetary and manpower constraints have was never identified. . . . This girl is missing from somebody. . . . I
always been an obstacle to investigative efforts, not just in the Princess want people to know that this brutal murder took place and its been
Doe case, but in missing persons and unidentified decedent cases 25 years that she has been buried without a name.22,23

21
In fact, as the Princess Doe website notes, a novel loosely based on her case has already been written: Death Among Strangers, by Deidre S. Laiken (Avon Books, pub. Sep-
tember 1988). The books title paraphrases a line inscribed on Princess Does gravestone: Dead Among Strangers.

22
Remembering Princess Doe by Jacqueline Lindsay, The Warren Reporter, July 14, 2007. http://blog.nj.com/warrenreporter/2007/07/jacqueline_lindsay.html.

23
Websites containing information relevant to the Princess Doe case, but which were not otherwise cited in this article, include the following:

A. Minutes of Township of Blairstown Committee Meeting, Wednesday, May 9, 2007 7:15 PM. Committeeman Salvatore Lascari noted: Princess Does body was
found about 25 years ago and she has yet to be identified. It appears that Americas Most Wanted has picked up this story and they may air it. www.blairstown-nj.org/
documents/2007May09minutes.doc

B. 07020 describes itself as the place to discuss Edgewater [New Jersey] and whatever else is on your mind. . . .This is a non-commercial site run by an Edgewater
resident. This site includes a lengthy thread devoted to Princess Doe. www.omgili.com/jmp/aHR0cDovL3d3dy4wNzAyMC5jb20vZm9ydW1zL3Nob3d0aHJlY-
WQucGhwP3Q9MzI2MyZtb2RlPWxpbmVhcg==

C. Weird N.J., the brainchild of Mark Sceurman and Mark Moran, describes itself as a travel guide and magazine to places you wont find on state funded maps or
located on any tourist attraction pamphlets. The site includes an entry for Princess Doe. www.weirdnj.com/index.php?option=com_content&task=view&id=186&
Itemid=28

D. Lost in Jersey describes itself as being dedicated to all those people places and things that make us unique, that make us go woah, or that make us say WTF?!?
On this I will share with you what Ive seen in my explorations. This somewhat macabre site (which is further hindered by rampant grammatical and syntactical
errors) contains photographs and descriptions of places throughout New Jersey that have captured the attention of the sites creator (whose identity proved elusive,
perhaps purposely so). www.lostinjersey.com/graves/janedoe.html

13
STEVENSON UNIVERSITY

Technology and Fraud Investigations in the


Office of the Inspector General
Mary Beth Hutcheson

The use of computers has become an important aspect of most peo- and determine there may be additional criminal activity involving
ples home and work lives. The availability of the internet puts online systems outside of the Agencys control, the matter is referred to the
shopping, entertainment, social networking, and banking at the indi- appropriate investigative entity.
vidual users fingertips. Unfortunately, the ease of use and availability
of such technology also creates more opportunities to commit fraud, The Inspector Generals job is complicated by security protections
waste and abuse in the workplace. How has this very same technology such as passwords, encryption and the powerful delete key; how-
that is used so widely today affected the work performed by a fraud ever, AIG Shanholtz quickly provided several resources available
investigator in order to curb this problem? to continue an investigation when these hurdles are identified. As
technology has advanced, so have the forensic tools used to investi-
Many entities, including government agencies, have teams devoted gate fraud, waste, and abuse. Data recovery tools are a huge asset to
solely to fighting crimes involving the use of a computer. Inspectors the investigator. AIG Shanholtz commented that the end users may
General play an important role in this fight against cybercrime and believe they have permanently deleted an email or document, but
they are responsible for detecting and preventing violations of federal, there is usually a way to recover that very same deleted item. Decryp-
criminal and civil law through audits, investigations, inspections, tion software and password crackers are also of use to the investigator
and other reviews. Among the duties of an Inspector General is the when a file has been locked. Technological advancements have led
investigation of computer crimes, which may range from common to improved software with the capability of querying multiple forms
violations of workplace policy to complex criminal matters such as of data and recognizing anomalies. This type of software provides
contract fraud. additional assistance when investigating multiple sources of data in,
e.g., a timecard fraud case.
The author had the opportunity to meet with two investigators who
currently work for an Office of Inspector General (OIG) at a Depart- Unfortunately, just as these tools and software are available to the
ment of Defense (DoD) intelligence agency. Assistant Inspector forensic examiners, many are just as readily accessible to individuals.
General (AIG) Carmen Shanholtz is a certified fraud examiner, and For example, Anonymizer software allows individuals to access web-
Assistant Inspector General Irvin McCullough is the Chief of the sites that may be locked down by a firewall ensuring that the activity
Office of Investigations within the DoD agencys OIG. They provided is not attributed to the intruder. Other software exists that is used to
interesting insight into the duties of an Inspector General and how reformat or destroy hard drives. Search engines, such as Google, can
technology has affected those duties. be used to find all kinds of information, including how to reformat
a hard drive.
The Inspector Generals duties include responding to potential cyber
crimes that require further investigation. Concerns may include When pursuing an investigation involving computer forensics,
allegations of suspected fraud, waste, and abuse previously committed investigator training and awareness become crucial. Many of these
or ongoing. AIG McCullough reports that all fraud complaints are technological hurdles are overcome through the use of forensic tools.
treated as potential criminal violations until determined otherwise. AIG Shanholtz is a certified fraud examiner with a background in
This is an important practice to ensure that evidence is properly col- accounting. Her area of specialty does not include computer forensics;
lected and handled in accordance with Constitutional requirements. however, she has unlimited cyber resources at her disposal during an
investigation. Teams of analysts and computer forensics experts assist
The Fourth Amendment of the U.S. Constitution prohibits unrea- with data extraction, recovery and other analyses that may be required.
sonable searches and seizures so that it affects an investigation from
the time the concern arises to the time of its resolution. The Fourth AIGs Shanholtz and McCullough agree that when it comes to a cyber
Amendment not only requires a search warrant, but also that the crime investigation, email has provided some of the best evidence.
search warrant clearly describe with particularity the exact location to Email has, in some cases, taken the place of phone calls, mail, and
be searched and the items to be seized. Proper descriptions can be dif- faxes, which makes email one of the best sources of evidence when
ficult in the area of cyber crime when determining where a particular investigating fraud, waste, and abuse. There will always be two copies
file is located on a computer. that have the potential to be retrieved: the senders and the recipients,
thus increasing the likelihood that the email can be recovered and
Fortunately, warrants are not typically required when AIGs Shanholtz used in an investigation.
and McCullough are investigating government workplace cybercrime
allegations. Upon commencement of duty, employees consent to It appears that for almost every hurdle technology has created there is an
the Agencys monitoring of their usage of Agency computer systems, alternative solution available. Whether it involves reliance on an expert
including employee email systems; therefore, any potential expecta- to recover data or the use of specialized software, Inspectors Generals
tion of privacy under the Fourth Amendment has been waived. In the work is not as inhibited by the advances of technology as one might
event the investigators are pursuing an abuse of government resources believe. It is quite the opposite: technology seems to be on their side.

14
FORENSICS JOURNAL

The Analysis of Ecstasy Components


Christine Burns, M.S.

ABSTRACT Currently, chemists analyze BZP via the Gas Chromatograph/Mass


Spectrometer; however, the chromatograms produced are problem-
As various substances of abuse come under the schedule restrictions atic. BZP, MDMA and TFMPP do not separate easily from other
set by the Drug Enforcement Administration (DEA), other designer components. The extraction performed by the chemist does not
drugs are beginning to replace them. Many components present in completely isolate BZP, and, depending on the pill composition, the
Ecstasy tablets today are derivatives and are making it increasingly extraction process can produce peaks that may overlap or co-elute.
difficult to isolate certain components. This paper presents some
common, well-known methods used in forensic chemistry and their The development of better methods for the extraction of the compo-
application in separating the components commonly found in Ecstasy nents found in Ecstasy tablets would be essential to drug analysis in a
tablets. Such components can be separated by using the Dragendorff forensic setting. Furthermore, Ketamine has been a recent recurring
reagent and derivatization, with trimethylsilylation on a ZB-1 column. drug in Ecstasy, and it would prove helpful if a color test were devel-
oped to determine if Ketamine were present in a tablet.

INTRODUCTION
OBJECTIVE
In the United States, many designer drugs are appearing that have
been created from other pre-existing drugs. These designer drugs The objective of this study was to improve the separation of the vari-
often have no medical use and when they are abused, they are identi- ous components commonly found in an Ecstasy tablet during tra-
fied as illegal substances. For instance, Ecstasy or 3, 4-methylene- ditional case analysis scenarios. The following were the specific aims
dioxymethamphetamine (MDMA) is a designer drug that was derived intended for this research:
from amphetamines, which are classified as stimulants, which tem-
porarily increase alertness and awareness, as well as the activity of the Develop a new extraction method to separate BZP
sympathetic nervous system and the central nervous system. In the from the sample
medical field, stimulants are often used to treat narcolepsy, ADHD,
and depression. Stimulants are also commonly used in over-the- Identify a color test that can indicate the presence of
counter medications to counteract lethargy and fatigue throughout BZP or Ketamine
the day, to reduce sleepiness and to keep the person awake when
Develop a new technique to yield more defined and
necessary.
individualized peaks on the GC/MS
MDMA or Ecstasy was initially popular among Caucasian adolescents
Determine if a pure enough sample of BZP can be
and young adults active in the nightclub scene or at weekend-long
extracted in order to utilize the Fourier Transform
dance parties known as raves. Ecstasy was quickly identified as an
Infra-Red Spectrophotometer for identification
illegal substance due to its highly addictive nature and harmful effects
on the body. The components commonly seen in combination with
or in place of MDMA are Benzylpiperazine (BZP), Triflourometh- METHODS
ylphenylpiperazine (TFMPP), Methamphetamine, Methylenedioxy-
amphetamine (MDA), and Ketamine. Providing distinct separation Liquid-liquid extractions, one and two dimensional Thin Layer
instrumentally between the components found in an Ecstasy tablet Chromatography (TLC), Gas Chromatograph column variation,
would allow forensic labs to accurately confirm the presence of these derivatization, and color tests were performed on six different samples
controlled dangerous substances and provide more thorough and of seized Ecstasy tablets. An acetone, 0.1N NaOH/chloroform, and
precise analysis of the evidence submitted. Around the 1990s, forensic 0.1N HCl/chloroform extractions were performed on one sample in a
laboratories were beginning to receive a new drug that was being sold test tube and run via GC/MS.
as legal Ecstasy and was later identified as Benzylpiperazine (BZP).
This BZP was immediately controlled and has become more common One and two dimensional TLC were performed with seven different
in Ecstasy; however, new methods of analysis have not been devel- basic solvents systems using glass backed silica gel TLC plates. Each
oped to compensate for its vigorous growth in the drug market. There plate was spotted with a capillary tube ten times across with a sample
are few presumptive tests for BZP and Ketamine. More presumptive dissolved in methanol. Following development, the plates were
tests would allow the chemist to make an informed decision about the viewed under UV light and the fluorescent layers were extracted and
sample components and what method of analysis to use. run via GC/MS.

Next, the two different columns were tested on the GC. The columns
used were a ZB-5 column and a ZB-1 column, which differed slightly

15
STEVENSON UNIVERSITY

in polarity. The ZB-5 column was the standard column used on the C. D.
Maryland State Police GC instrument and the ZB-1 column was the
experimental column. The method that is currently used on the GC
for the analysis of Ecstasy at the Maryland State Police-Forensic Sci-
ence Division lab is called LOW; it was altered with the ZB-1 column
and named BLOW. The flow rate, ramp time, oven temperature, and
hold time were individually altered for optimum separation.

Derivatization was performed using trimethylsilylation and the


method was followed according to the journal article titled, Analysis
of Benzylpiperazine-like Compounds (Inoue, Iwata, Kanamori,
Miyaguchi, & Tsujikawa, 2004). A small amount of sample was
added to a micro-centrifuge tube where derivatizing agent BSTFA w/
1% TMS, and Acetonitrile were added. The reaction tube was heated

at 30C for 30 minutes and run via GC/MS.
Figure (C) represents the GC/MS chromatogram of the standard
Presumptive color testing was then performed with BZP and Ket- mixture underivatized. Figure (D) represents the chromatogram of
amine standards on samples of seized Ecstasy tablets. A small amount the standard mixture derivatized.
of sample was added to the reagent and the instantaneous color
reaction was observed and recorded. The reagents used were Marquis,
Mandelins, Froehdes, Lafons, Dragendorff, Nitroprusside, Gold E. F.
Bromide, Cobalt Thiocyanate, and Mayers.

G. H.

RESULTS

A. B.
Figure (E) is a photo of the color reactions with BZP reference stan-
dard. Figure (F) is a photo of the color reaction with Ketamine refer-
ence standard. Figure (G) is a photo of the color reaction with sample
4 with the addition of Ketamine standard. Figure (H) is a photo color
test results when Dragendorff reagent was added to MDMA, Meth-
amphetamine, BZP, and Ketamine.

CONCLUSION

The 0.1N NaOH/chloroform extraction did reduce the abundance


of caffeine present in the sample; however, it did not eliminate the
Figure (A) represents a standard mixture run on ZB-5 column on cutting agent entirely. The 0.1N HCl/chloroform and acetone extrac-
method BLOW. Figure (B) represents a standard mixture run on tions did not produce the results desired. It was concluded that the
BLOWCB with the ZB-1 column.

16
FORENSICS JOURNAL

extractions used were not able to separate the components found REFERENCES
in Ecstasy and would not be viable for chemists to use for future
analysis. Inoue, H., Iwata, Y. T., Kanamori, T., Miyaguchi, H., & Tsujikawa,
K. (2004). Analysis Benzylpiperazine-like Compounds. National
In one and two dimensional TLC, it was observed that with the Research Institute of Police Science, 9(2), 165-184. Retrieved June 28,
solvent systems used, the drugs of interest separated out together in 2008, from Science Direct database.
the same layer thus they did not provide distinct separation. It was
determined that based on the poor separation provided between the Sarwar, M., Ph.D. (n.d.). A New, Highly Specific Color Test for Ket-
components in the tablets that TLC would be an ineffective tech- amine. Microgram Journal. Retrieved October 16, 2008, from U.S.
nique using these seven solvent systems. Drug Enforcement Administration Web site: http://www.usdoj.gov/
dea/programs/forensicsci/microgram/journal_v4_num14/pg3.html
Color testing was performed on standards, seized samples, and a
combination of both. Dragendorff would be an acceptable color
reagent to use for Ketamine because it turned red, whereas all the GLOSSARY
other components commonly found in Ecstasy tablets turned fluores-
cent orange, shown in Figure H. The Dragendorff reagent provided a 3, 4: A method of identification used in chemistry to describe the
color distinction to indicate the presence of Ketamine in the sample. position of the functional groups in a molecule.
A color test was not found to identify BZP when MDMA, metham-
GC/MS: The Gas Chromatograph/Mass Spectrometer is an instru-
phetamine, and Ketamine were present in the sample. The Gold Bro-
ment that separates and identifies the components present in a
mide reagent was not effective and more experimentation was needed;
mixture.
however, it could prove to be a very beneficial presumptive test.
Co-elute: A process where two or more chemical compounds elute
In the GC column variation, the method commonly used at the
from the Gas Chromatographic column at the same time, making
MSP lab with Ecstasy tablets is called BLOW. The parameters of this
separation and identification difficult.
method were slowly altered using the ZB-1 column. It was concluded
that a lower ramp time and lower starting temperature resulted in FTIR: The Fourier Transform Infra-Red Spectrometer is an instru-
a better separation of methamphetamine, MDMA, BZP, TFMPP, mental technique where the sample is hit with a beam of electrons
and Ketamine. In summation, the ZB-1 column was effective in causing the bonds in the molecule to stretch and bend and the energy
separating the components in the standard mixture, and is a practical emitted is measured and charted on a spectrum.
method to be utilized by forensic chemists in the drug lab.
BLOW: The initial B for Burns paired with a method used typically
The derivatization with Trimethylsilylation provided optimum sepa- to analyze amphetamines.
ration between Methamphetamine, MDMA, BZP, TFMPP, and
Ketamine. The peak shape was sharp with a bell-shaped curve and ZB-1: Zebron-1: a column that is slightly more polar and aids in the
provided distinct baseline separation, shown in Figure C. It was deter- separation of more polar compounds.
mined that this was an effective method for a chemist to use when
attempting to isolate these components when present in an Ecstasy ZB-5: Zebron-5 is a less polar column and the ZB refers to the com-
tablet. pany Zebron that manufactures this specific column.

Unfortunately, the samples used could not be separated using Thin


Layer Chromatography (TLC), and a pure enough sample could not
be extracted to run on the FTIR.

In summation, the components found in Ecstasy tablets can be


separated by using the Dragendorff reagent and derivatization, with
trimethylsilylation on a ZB-1 column. A pure enough sample was not
extracted via TLC or various other extraction methods to analyze with
the FTIR, and further research in this area is required.

17
STEVENSON UNIVERSITY

The Future of the American Petit Jury System


A Look at the Problems in the American Jury System and the Use
of Professional Juries
Lauren Maxwell

Within the American judicial system, justice is intended to be the without stating the cause for dismissal. In Batson v. Kentucky, the
single most important and steadfast principle, and it is expected to United States Supreme Court handed down a decision that an attor-
withstand the pressure of all human ills and evils. Within that struc- ney could not use peremptory challenges to dismiss jurors solely on
ture of justice, criminal defendants are constitutionally guaranteed the basis of race (476 U.S. 79 (1986)). Since an attorney need not
the right to have a panel of their peers determine their innocence state the reason for a peremptory challenge, this standard is difficult
or guilt with regard to the commission of a crime. Unfortunately, the to uphold. The Batson decision has made the science of jury selec-
number of innocent people who have wrongly been convicted under tion even more imperfect, and has caused race to be seen more as a
the current system is alarming; instead of the members of a jury act- card to play within the system than simply the human characteristic
ing as the final safeguard to ensure that an innocent persons freedom of skin color.
is not erroneously taken away, a jurys decision is often the final
step in guaranteeing that someone who has wrongly been accused With prosecutors now depending on more sophisticated types of
of a crime has essentially lost all ability to prove his innocence. The evidencesuch as deoxyribonucleic acid (DNA), physics-based blood
American petit jury system is broken, and the very people the system spatter analysis and forensics, computer-based crime scene re-enact-
is designed to protect are the ones who are paying the price. The time ments, and other complicated advances in science and biologyto
has come for Americans to consider adopting a system of paid, profes- obtain convictions, the need for jurors to be able to separate, analyze,
sional jurors in order to ensure that the fairness and liberties guaran- and arrive at accurate conclusions based on the evidence presented
teed to all citizens are distributed and applied as equally as possible. at trial is becoming arguably more demanding and difficult for the
lay juror. DNA has essentially replaced the fingerprint as the primary
An extensive disparity exists within the American court system type of evidence that is used to prove guilt beyond a reasonable
about exactly who represents a peer group. Because there is no single doubt, and its consistent appearance in the media has considerably
accepted definition of the term peer, defendants often have their heightened the publics expectation of its appearance at trials. This
cases heard by juries that do not necessarily represent them. This is is not necessarily a bad thing, as DNA evidence helps to reduce the
not unfair, per se, but when a defendants jury consists of people from number of innocent people who are convicted by witness accounts
different racial, social, and economic classes, the likelihood of the and other less reliable evidence, but it leaves open the possibility that
defendants receiving a fair trial decreases significantly. potential jurors will believe that if DNA evidence is not presented
against a defendant, the person may not be guilty. Adding to this
In the past, the majority of Americans who faced a courtroom trial issue are television shows that rely on crime scene investigation and
were truly judged by a jury of their peers only if they were white men, the complicated technologies and techniques used to drive their plots
which led to an exorbitant number of black men being wrongly con- and story lines. These shows create the danger that viewers incorrectly
victed and imprisoned. In fact, of the 54 men executed in Virginia for deem themselves to be crime scene experts after a few months of
rape or attempted rape between 1908 and 1965, not a single one was watching them.
white (Dorr, 2004, p. 32). Currently, one in every four African-Amer-
ican males in Virginia is a convicted felon, and under current Virginia The masses of reporters, pundits, and politicians who treat allegations
law, and the laws of many other states, convicted felons permanently and accusations as truth, and make overt statements of guilt without
lose their civil rights unless they are granted a restoration of those waiting for the court system to make the determination of innocence
rights by the state (Kutz, 2005). These men lose the opportunity to or guilt, have a negative effect on the neutrality of potential jury
serve on a jury, and potential jury pools are being significantlyand pools. The well-known case of the Duke University lacrosse team, in
dangerouslydiminished with regard to their African-American male which members were brought up on charges later proven to be false,
representation. is an example of how the press can try suspects in the media before
they are tried in a courtroom. Although media coverage is protected
With regard to jury service, most Americans are taught to believe under the First Amendment and can act as a safeguard for the integ-
that their peer group consists of other American citizens, whether rity of the judicial process, when media coverage is biased and preju-
they are black, white, old, young, educated, uneducated, gay or dicial, that integrity is weakened, and a fair trial becomes harder to
straight. Sometimes, however, when there is discrimination against obtain. As more information becomes readily available to the masses
a prospective member of the jury because he is black, white, young, at faster rates via the internet, cellular phones, personal digital assis-
old, etc., then a trial might not yield justice (Buckley, 1997, p. 63). tants (PDA), and other similar devices, it is becoming more difficult
The use of peremptory challenges shows where this concept is best for the general public not to have an already-established opinion
illustrated. A peremptory challenge occurs when, in the course of about a local crime.
questioning jurors for suitability, an attorney seeks to dismiss a juror

18
FORENSICS JOURNAL

Incorrect or incomplete juror knowledge is also very dangerous when This type of situation should be unacceptable to Americans, yet
potentially mentally ill defendants have been deemed competent to the use of less than competent jurors on cases of all types is all too
stand trial, but assert a defense of not criminally responsible due to frequent. The plaintiff and defendant in this particular computer
mental disease or defect. Research has shown that although insanity technology case should have been arguing their points to jurors who
is a legal term, many people are surprised to discover that psychology at least had the potential to understand the very complicated and
does not offer a definition of insanity upon which most psychologists nuanced material presented to them throughout the course of the
agree (Geiger & Weinstein, 2008, p. 990). Currently, at least seven trial. The fact that a companys future, and with it the futures of all
separate definitions of insanity exist, so when twelve individuals are the firms employees and officers, could be in the very incapable hands
placed in a jury box and asked to determine whether or not a defen- of an improperly trained or uneducated jury, is the very definition of
dant should be acquitted due to insanity, it is very likely each juror is unfair and unjust.
working with a different idea and definition of what it means to be
insane. According to research, even if jurors are given a precise defini- The idea of professional juries is centuries old; what is new, however,
tion of insanity for use to judge the evidence and testimony they hear is the notion of using paid jurors, or jurors whose job it would be to
during trial, their interpretation of the information presented is likely serve the Court and the judicial system as their full-time profession.
to be influenced by the definition they bring with them to the court- Teachers, police officers, and prosecutors, for example, are considered
room (Geiger & Weinstein, 2008, p. 990). Since roughly 9.5 percent professionals who fulfill very important roles and serve the public in a
of the population of American adults suffer from a mood disorder, manner vital to sustaining the American way of life. These public ser-
a sizeable number of potential jurors have their own personal work- vants make decisions every day that not only affect the people directly
ing definition of mental illness (National Institute of Mental Health involved in the situations being handled, but also have an influence
[NIMH], 2009). If practicing psychiatrists and psychologists are on the safety and morality of society as a whole. Jurors are asked to
unable to determine whether or to what degree someone suffers from make many of these same determinations. It is time to ensure that
a mental illness, there should be considerable concern about whether those who fulfill that function are the most qualified candidates for
a jury composed of lay persons would be capable of doing so. the job. Offering wages based on the level of experience and educa-
tion each juror possesses is one way to ensure defendants are served by
Another issue with the current system is that those who serve as jurors the most capable jury possible to hear their cases.
are paid a wage representing a small fraction of what the average
working American earns as a full- or part-time employee. Although Some opponents of a paid jury system assert that there is something
some companies offer paid jury leave to their employees, many do wrong with people who would be willing to choose to work as paid
not, and those employees who work on commission, travel extensively jurors, but it is difficult to see how that same idea would not apply
for their jobs, or are essential to their occupation or business would equally to judges or prosecutors, who also serve willingly, yet are paid
seek to be excused. When people in these positions are forced to make fair wages for their service because society recognizes the importance
sacrifices in order to serve on a jury, they may feel resentment toward of the positions they fill. College students could choose to major in
the defendant for disrupting their business, personal and financial the study of jurors and juror performance, and would be instructed
lives, these factors have the potential to cancel out the good that may in various programs of study, such as how to evaluate physical and
be served by keeping these peers on the jury. circumstantial evidence, abnormal psychology, computer informa-
tion systems and computer forensics, basic accounting principles, and
Participants in the American civil court system are not immune to other important fields with which jurors need to be familiar when
the injustices that can befall criminal defendants. A May 1997 issue hearing a case. Salaries would be commensurate with experience and
of National Review looks at a specific case in which a jury was asked aptitude, and regular evaluations would be conducted to ensure that
to assess subtle differences in opinion involving complex contentions the jurors continue to serve honestly, effectively, and to the height of
about rights and wrongs with regard to computer technology. In their abilities.
this case, the judge was reported as having pulled aside a female juror,
asking her if she knew what was meant by software. She replied The current system of jury selection is time intensive and would be
with something to the effect that software was something soft, in minimized by the use of professional jurors. Voir dire would still
the sense that when you let it fall to the ground, there is no clattering occur, but the pool would be smaller and would consist only of pro-
sound (Buckley, 1997, p. 63). fessional jurors, thus shortening the time between the beginning of
jury selection and commencement of the trial. Cases would be heard
more quickly, and the backlog alleviated to some degree.

19
STEVENSON UNIVERSITY

Of course, professional jurors must be funded. Monies currently Bradley, K. W., & Phillipson, G. (2008, Fall). The court of public
used to pay jurors for their service could be reallocated to pay pro- opinion: the practice and ethics of trying cases in the media. Law
fessional jurors, as could some portion of taxes paid. In addition, if and Contemporary Problems, 71(4), 1-201. Retrieved from Academic
fewer people are wrongly convicted because of the implementation Search Premier database.
of a more competent jury system, millions of incarceration dollars
would be saved. In addition, the rate of financial settlements to those Buckley, W. F., Jr. (1997, May 5). Any prospect for jury reform?
who are proven to be wrongly convicted would dramatically decrease. National Review, 49(8), 63. Retrieved from Academic Search Premier
With the current state of the economy, however, it is very unlikely database.
that Americans would be willing to sacrifice established programs and
already-allotted funds in order to create this new system. Cost of living in Maryland. (n.d.). Maryland Department of Business
& Economic Development [Fact sheet]. Retrieved March 1, 2009, from
More important than how these funds are generated, is that they need http://www.choosemaryland.org/factsandfigures/qualityoflife/costofli-
to be generated; it is past time for America to begin to consider jury vingoverview.htm
duty a service that is not simply mandatory, but one that is held in
high esteem and one that the government and the people are will- Dorr, L. L. (2004). White women, rape, and the power of race in Vir-
ing to make sacrifices to create and support. Although the process ginia, 1900-1960. Retrieved from http://books.google.com/books?id=
of implementing this type of jury system would be a slow and ardu- mq06NDClzZUC&printsec=frontcover&dq=White+women,+rape,+
ous one, as issues are ironed out and the level of effectiveness, fiscal and+the+power+of+race+in+Virginia&cd=1#v=onepage&q=&f=false
feasibility, and usefulness are assessed and increased, the benefits that
Featured Documents: The Manga Carta. (n.d.). National Archives &
would be reaped by each citizen of America, and America as a whole,
Records Administration [Archives & Records]. Retrieved February 4,
would far outweigh the sacrifices necessary in order to become much
2009, from http://www.archives.gov/exhibits/featured_documents/
closer to creating a system that truly dispenses justice for all.
magna_carta/

Frequently asked questions by prospective jurors. (n.d.). Maryland


REFERENCES Judiciary Jury Search [Fact Sheet]. Retrieved February 1, 2009, from
http://www.courts.state.md.us/juryservice/citizens_faqs.html
Amar, A. R., & Amar, V. D. (1996, July/August). Improving the judi-
cial system: Unlocking the jury box. Current, pp. 11-16. Retrieved Geiger, J. F., & Weinstein, L. (2008, December). Definitions of
from Academic Search Premier database. insanity in college students. College Student Journal, 42(4), 990-997.
Retrieved from Academic Search Premier database.
Balko, R. (2008, December). Innocence denied: DNA testing
stalled. Reason, 40(7). Retrieved from http://www.reason.com/news/ Goidel, R., Procopio, S., & Freeman, C. (2004). Television view-
show/129822.html ing, race, and attitudes toward juvenile justice and juvenile justice
reform. In Southern Political Science Association [Conference papers].
Barro, R. J. (2002, July 22). Pleading the case for a paid-jury system.
Retrieved from Academic Search Premier database.
BusinessWeek, (3792), 20. Retrieved from Academic Search Premier
database. Kutz, A. L. (2005, April). A jury of ones peers: Virginias restoration
of rights process and its disproportionate effect on the African Ameri-
Berberich, S. (2007, October 12). Hey, scientists, its not cheap here.
can community. William and Mary Law Review, 46(6), 2109-2152.
Gazette.net. Retrieved from http://www.gazette.net/stories/101207/
Retrieved from Academic Search Premier database.
businew45158_32360.shtml
The numbers count: mental disorders in America. (2009, February 4).
Bernstein, R. (2004, November 30). Stay-at-home parents top 5
National Institute of Mental Health [Fact sheet]. Retrieved February
million, Census Bureau reports. In U.S. Census Bureau [Press release].
19, 2009, from http://www.nimh.nih.gov/health/publications/the-
Retrieved April 10, 2009, from http://www.census.gov/Press-Release/
numbers-count-mental-disorders-in-america/index.shtml
www/releases/archives/families_households/003118.html

20
FORENSICS JOURNAL

Outrageous! Medias influence on jury trials. (n.d.). Readers Digest. Sexton, T. (2007, January 8). The history and future of the jury
Retrieved from http://www.rd.com/your-america-inspiring-people- system in America. Associated Content. Retrieved from http://www.
and-stories/media-influences-the-legal-system/article81290.html associatedcontent.com/article/107695/the_history_and_future_of_
the_jury.html?cat=37
Phillips, K., & Smith-Parra, N. (Eds.). (2006, Fall). NC innocence
commission is worse than nothing. Justice Denied: The Magazine for State & county quickfacts. (n.d.). U.S. Census Bureau [Fact Sheet].
the Wrongfully Convicted, (34). Retrieved from http://justicedenied. Retrieved February 1, 2009, from http://quickfacts.census.gov/qfd/
org/issue/issue_34/jd_issue_34.pdf states/00000.html

Posner, R. A. (1997). Aging and Old Age. Retrieved from http:// Watching TV gives first aid clues. (2009, February 2). BBC. Retrieved
books.google.com/books?id=9gji7PeIsrYC&printsec=frontcover&dq= March 31, 2009, from http://news.bbc.co.uk/2/hi/health/7860557.stm
Aging+and+Old+age&cd=1#v=onepage&q=&f=false

21
STEVENSON UNIVERSITY

Moral Lapse Versus the Psychopathic Fraudster:


Implications for Our Justice System
Yvette Frusciante, CPA, CFF

Past research and theory indicate that most occupational fraud (asset non-shareable to another. These range from true financial problems to
misappropriation) is committed by individuals who face certain problems that are viewed as being solvable through financial means.
situational pressures or motivations that result in one-hit wonder Cresseys study revealed that these non-shareable financial needs
crimes. They are not always seen as criminals, and often receive what typically arise as a result of a desire by the potential offender either
is perceived as lenient treatment in the justice system. A different to achieve a higher status, or simply to maintain the one they have
offender, however, whose character is in complete contrast to that (Wells, p. 14).
which the public has come to know as the typical white-collar crim-
inal, has emerged. This sub-classification is known as psychopathic According to the Association of Certified Fraud Examiners (ACFE)
fraudsters. In some instances, the personality traits present in this 2008 Report to the Nation on Occupational Fraud and Abuse, the
type of offender have led to violent crimes as they attempt to conceal typical occupational offender is over the age of forty and a long-term
their fraudulent behavior. Unfortunately, those same personality traits employee of the organization (greater than five years), holding a
allow these individuals to conceal their true nature. The public and position with an annual salary of less than $50,000. In greater than
the justice system often have difficulty distinguishing the psycho- 80% of the cases surveyed, the offender had a clean employment and
pathic fraudster, and as a result, they are classed with, and receive the criminal record with respect to fraud or abuse (pp. 48-61). It there-
same sanctions as, the typical occupational offender. fore stands to reason that the typical occupational offender is seen as
one who experiences a moral lapse in response to certain pressures
in life. As a result, the public perception is often one of pity and, on
THE TYPICAL OFFENDER IN AN OCCUPATIONAL FRAUD some level, identification. These offenders are seen as more rational
than other criminals, almost innocuous. This public sentiment is
The term white-collar crime was coined by Edwin H. Sutherland in greatest when the offense is committed to feed a family, to care for a
1939, and was defined as criminal acts of corporations and individu- sick loved one, or to pay a mortgage to prevent foreclosure. Although
als acting in their corporate capacity (Wells, 2008, p. 12). Since recent high profile financial crimes have resulted in greater public
then, the term has been expanded to include any financial crime. condemnation and outrage against white-collar criminals in general,
Much of todays literature and theory on the subject, however, is the middle-class occupational offender is still seen as genuinely
based on the early studies conducted by Sutherlands student, Donald sympathetic.
R. Cressey. Unlike Sutherland, Cresseys studies concentrated solely
on embezzlers and the circumstances that resulted in their offenses; he
termed these criminals trust violators (Wells, p. 13). His resulting A WOLF IN SHEEPS CLOTHING
hypothesis is known as the fraud triangle and has become the model
of the typical occupational offender. Cressey explains: The majority of society wants to believe people are inherently good.
This belief explains why many identify with, and make excuses for,
Trusted persons become trust violators when they the guy next door who commits the once-in-a-lifetime crime of
conceive of themselves as having a financial prob- moral turpitude. Unfortunately, this is exactly what makes people
lem which is non-shareable, are aware this prob- and their businesses easy prey for what has come to be known as the
lem can be secretly resolved by violations of the psychopathic fraudster. In stark contrast to the prevailing image of
position of financial trust, and are able to apply to the typical occupational offender, the psychopathic fraudster is a
their own conduct in that situation verbalizations social predator who often takes a position in an organization for the
which enable them to adjust their conceptions of sole purpose of committing fraud. It is in these cases that Cresseys
themselves as trusted persons with their concep- fraud triangle doesnt apply; there is no perceived pressure or requisite
tions of themselves as users of the entrusted funds rationalization there is only a perceived opportunity.
or property (as cited in Wells, p. 13).
Approximately 1% of the population has psychopathic traits (Babiak,
2008, p. 1). Although varying in degrees of severity along the spec-
The three legs of the fraud triangle, therefore, are (a) a non-shareable trum of non-violent to violent, they are all socially destructive. This
financial need, (b) a perceived opportunity, and (c) rationalization personality disorder is defined by specific traits and characteristics
(Wells, p.13). All three must be present or an occupational fraud will that can be grouped into the four main characteristics of the psycho-
not occur. For instance, the potential offender may have a perceived path. The first group of traits defines the psychopaths interpersonal
non-shareable financial need and an opportunity to commit fraud. interactions which characterize the impression that psychopaths make
Without the ability to rationalize his actions, however, he will not on others. Upon first meeting, one may find them to be charming,
be able to maintain his self-concept as a non-criminal and trusted charismatic, humorous, knowledgeable, and articulate. This is simply
person, which is a necessary factor (Wells, pp. 14-18). What is a faade, which requires great skill and energy on the part of the
considered a non-shareable need to one person may not necessarily be

22
FORENSICS JOURNAL

psychopath to maintain. They are successful because they constantly JUSTICE FOR SOME BUT NOT FOR ALL
tailor their faade to their immediate targets, winning over their
targets trust through lies (Babiak, 2008, p. 1). The second main trait A common complaint heard from those who investigate fraud is that
is emotional poverty. Other than anger and frustration, psychopaths there is not enough done to punish occupational fraud and other
lack empathy, sympathy or remorse. They refuse to accept respon- white-collar offenders. According to the ACFEs 2006 Report to the
sibility for their own actions, and blame others for anything that Nation on Occupational Fraud and Abuse, the most common employ-
goes wrong. The closest they come to normal human emotions is by ment action taken against alleged offenders was termination, followed
mimicking them to manipulate their targets (Babiak, 2008, p. 1). by restitution. While nearly three-quarters of the cases surveyed were
The third main trait characterizes the psychopaths daily life, which is reported to the police, frauds with lower median losses were less likely
irresponsible, impulsive, and lavish. Although their resumes are full to be reported. Of the cases that were prosecuted, the most common
of successes and achievements, their real life is the complete opposite. result was a guilty or no contest plea. Even withstanding prosecu-
They are easily bored by details and often neglect important work. In tion, the main goal of an organization which has become a victim of
fact, they lack goals and do not extend themselves to achieve anything fraud is to seek restitution. Unfortunately, nearly half never see a dime
of significance. They act without thinking of, or caring about, the (Wells, 2008, pp. 40-44).
consequences of their actions on others. Although they are unwill-
ing to achieve success on their own, they are more than willing to Regardless of what surveys tell us, an expectation gap exists between
take credit for someone elses (Babiak, 2008, p. 2). The final main what the public feels is justice and what the justice system is able, or
trait of psychopaths is a history of antisocial behavior, including willing, to deliver (Rebovish & Kane, 2002, p. 1). Even though occu-
fraud in adulthood. This antisocial behavior is often the result of the pational fraud continues to cost companies billions of dollars per year,
interaction and culmination of the other main traits of psychopaths. and in some cases, to force organizations into bankruptcy, these types
Their emotional poverty and impulsive life create a belief system of crimes are not a priority for law enforcement. One reason is that
that enables them to take what they want, when they want, without frauds are difficult to investigate defendants are often difficult to
remorse, guilt or fear, leading to a life of crime (Babiak, 2008, p. 2). identify and locate, assets disappear, investigations can require coor-
dination across multiple jurisdictions and agencies, and juries get lost
The corporate or compensated psychopaths have these same main in the details. Another reason is that prosecutors have wide latitude
traits, albeit less severe. The difference lies in the corporate psycho- in deciding which cases to prosecute. Cases that go to trial are usu-
paths ability to maintain a more consistent faade of normalcy. Their ally those that are sure winners, and since prosecutors are elected in
interpersonal interactions are designed to meet organizational expec- the majority of states, a winning record means re-election (Anderson,
tations in order to advance quickly up the corporate ladder. They n.d.). Addressing this problem, Kenneth Brelser wrote in the Winter
gain status and responsibility simply to position themselves where 1996 issue of Georgetown Journal of Legal Ethics:
they need to be to commit fraud. Their targets are co-workers and
upper management, whom they spend a great deal of time convinc- The real-world harm is two-fold. A prosecutor
ing they are perfect, loyal, hardworking, and ambitious employees. protective of a win-loss record has an incen-
They manipulate useful people based on what they need from them; tive to cut constitutional and ethical corners to
these people become pawns, patrons, or patsies. The pawn is anyone secure a guilty verdict in a weak case to win at all
the psychopath perceives has power or access to some desired cor- costs. A prosecutor who counts convictions also
porate resource. The patron is anyone with key power who serves to has a countervailing incentive to drop weak cases.
protect and defend the psychopath when needed. After the pawn or The prosecutor may decline, dismiss or otherwise
patrons utility is used up, their power and influence are neutralized refuse to try cases that, although supported by
by the psychopath and they become the patsy (Carozza, 2008, p. 41). probable cause and sufficient evidence to convict,
The game corporate psychopaths play is somewhat akin to a game of would nonetheless be difficult cases in which to
chess, moving players around the board while avoiding checkmate. secure convictions (Anderson, n.d.).
The psychopaths fraud will continue to be successful as long as their
manipulations and lies are successful. If the fraud is discovered, they With such wide latitude, it is not unexpected that declination rates
will simply move on to the next organization and begin again. If an across jurisdictions vary widely (TRAC Reports, Inc., 2003). Where
organization decides to prosecute, the psychopathic fraudster will a prosecutor in one jurisdiction may vigorously oppose occupational
use charm and pathologic lies to appear as if they were the typical fraud, a prosecutor in the next jurisdiction may not. This broad spec-
one-time offender, even feigning remorse. If successful, it is possible trum serves to increase the publics frustration with the legal system
psychopaths can escape the severe sanctions they truly deserve. and widens the expectation gap. Several surveys conducted since

23
STEVENSON UNIVERSITY

2000 demonstrate an increasing public intolerance toward white- discretion and allowing them to use a lower standard of proof. The
collar crime in general. In the past, the public considered fraud and loss table, however, still remains the starting point in any sentencing
other white-collar crimes to be somewhat innocuous when compared decision (Harris & Kaminska, 2008, pp. 154-155). Following Booker,
to other, violent crimes; however, that is no longer the case. In fact, the Supreme Court decisions in Gall v United States, 128 S. Ct. 586
according to survey results, some now view fraud as more serious than (2007) and Kimbrough v United States, 128 S. Ct. 558 (2007) made
certain street crimes (Rebovish & Kane, 2002, p. 6). Based on the his- further sweeping changes, as noted by Harris & Kaminska, including:
tory of white-collar crime scandals since 2000, and the resulting loss
of pensions and life savings suffered by many, this reaction should not the consideration of certain soft factors
be unexpected; however, even with the Governments response to the [under 18 U.S. 3553(a)] present in white-collar
massive financial statements frauds that occurred in 2001 and 2002, cases, such as age, post offense employment, and
Sarbanes-Oxley (SOX) regulations have done little with respect to the reputational harmwhich were either discour-
punishment of the everyday occupational offender (i.e. misappropria- aged or prohibited under the mandatory Guide-
tion of assets). In fact, even with these regulations and the threat of linesthus finally shifting the focus away from
severe sanctions for the executive who commits a securities fraud, or loss as a controlling factor (p. 155).
cooks the books, the ACFE 2008 Report to the Nation indicates the
existence of an inverse correlation with respect to SOX requirements These recent cases have instilled additional determination require-
and the size of median losses from financial statement fraud schemes, ments aimed at a more fair determination of culpability, by requiring
as well as the duration to detect them (p. 41). the consideration of additional factors such as the mental state and
motive of the alleged offender, as well as other characteristics; how-
The wide latitude and inconsistency in punishing occupational ever, they have also restored a significant degree of discretion to the
offenders can be seen in many recent cases. A woman who admitted courts as can be seen in the above cases (Harris & Kaminska, p. 157).
to embezzling in excess of $1.2 million from a school district over a Although these soft factors may result in a fair determination where
ten-year period was sentenced to a year in jail, five years probation, the typical occupational offender experienced a moral lapse of reason,
and ordered to pay restitution (Crawford, 2007); however, a woman these same factors will also pave the way for a reduced sentence for
convicted of embezzling nearly $1 million from an amateur hockey the psychopathic fraudster. If he need only show community service,
organization may not see one day behind bars; the judge delayed her financial support for charities, and a remorseful mental state, he can
sentencing for a year during which she was ordered to pay restitu- most likely escape severe sanctions and be on his way to his next
tion (Higgins, 2009). The latter case is a clear example of an instance victim.
where the organizations goal of recovery overrides the publics percep-
tion and expectation of just desserts. It is in these instances that the
psychopathic fraudster benefits from conflicting goals. In sharp con- CONCLUSION
trast to the above cases are two additional recent cases on the other
end of the spectrum. In the first, a three-time convicted embezzler There is a common misconception that most occupational offend-
received a twenty-two year prison sentence after being found guilty ers are not really like other criminals. Their crimes are not ones of
of three counts of embezzlement for stealing more than $16,000 violence, rage or insanity, but only of moral turpitude; a slide down a
(Gonzalez, 2009). Meanwhile, a Hawkins County, Tennessee woman slippery slope they attempted to navigate in a moment of weakness.
was sentenced to thirty months in prison and five years supervised These misconceptions help to mask the psychopathic fraudster, whose
release for embezzling $105,900 from a credit union (Lane, 2009). sole reason for waking up every day is to lie, cheat, steal, and manipu-
late those around him. He hides behind the faade he has created
Much of the disparity seen above may be the result of the justice for himself and the misconceptions we have created for him. Once
systems attempt to restore leniency to what may be viewed as overly again in our judicial history, we see these misconceptions resonate
strict Federal Sentencing Guidelines. Prior to the 2005 Supreme through our justice system, with calls for leniency and discretion in
Court decision, United States v Booker, 543 U.S. 220 (2005), Federal sentencing determinations. History has shown that for punishment
Sentencing Guidelines for fraud were mandatory with sentences based to be effective in any circumstance, it must be certain, severe, and
on a calculation of loss; no other factors could be considered. The swift. Regardless of the severity and swiftness called for by our regula-
Booker decision made those Guidelines advisory, giving judges more tions, if punishment is not certain, then it serves no purpose. While

24
FORENSICS JOURNAL

societys attitude toward intolerance for white-collar crime in general Gonzalez, T. (2004, August 14). Attorney asks for Sprouse sentence
has changed, it seems our justice system has moved in the opposite reduction. NewsVirginian.com. Retrieved from http://www2.newsvir-
direction. Although over the past decade we have seen more severe ginian.com/wnv/news/local/article/attorney_asks_for_sprouse_sen-
sanctions against those convicted of high profile fraud schemes, the tace_reduction/43988/
everyday occupational offender continues to benefit from our sympa-
thy and empathy for their particular situation, or for the fact that we Harris, M., & Kaminska, A. (2008). Defending the white-collar
tend to want to see the good in those around us; emotions never to be case at sentencing. Federal Sentencing Reporter, 20(3). Retrieved from
experienced by the psychopathic offender. http://federalsentencingreporter.com/back_issue.php

Herlinger, C. (1992). Country club criminals. (double standards in


REFERENCES law enforcement). Scholastic Update. Retrieved from http://www.
accessmylibrary.com/coms2/summary_0286-9259728_ITM
18 U.S.C. 3553 (a). Retrieved September 13, 2009 from http://
www.nacdl.org/public.nsf/ 2cdd02b415ea3a64852566d6000daa79/ Higgins, L. (2004, August 24). Chelsea woman who stole from Ann
departures/$FILE/3553_amend.pdf Arbor Amateur Hockey Association given chance to pay restitution.
In AnnArbor.com. Retrieved from http://www.annarbor.com/news/
Amble, B. (2004, August 24). Beware the corporate psycho. In woman-who-stole-from-youth-hockey-group-given-chance-to-pay-
Management-Issues. Retrieved September 13, 2009, from http://www. restitution/
management-issues.com/2006/8/24/research/beware-the-corporate-
psycho.asp Holtfreter, K. (2005). Is occupational fraud typical white-collar
crime? A comparison of individual and organizational characteristics.
Anderson, D. (n.d.). Little prosecution of fraud and white-collar Journal of Criminal Justice, 33, 353-365. Retrieved from http://web-5.
crime. In LoveFraud.com. Retrieved September 13, 2009, from http:// interliant.com/fsu/cn.nsf/af07002480bfc5ea852570890064167b/$F
www.lovefraud.com/06_legalSystemFailures/scant_prosecution.html ILE/occupational.pdf

Association of Certified Fraud Examiners. (2008). 2008 Report to the Holtfreter, K., Piquero, N., & Piquero, A. (2008). And justice for
Nation on Occupational Fraud & Abuse. Retrieved from http://www. all? Investigators perceptions of punishment for fraud perpetrators.
acfe.com/documents/2008-rttn.pdf Crime, Law and Social Change, 49(5), 397-412. Retrieved from Crim-
inal Justice Periodicals database.
Babiak, P. (2008, July). Supply Side. The Meeting Professional.
Retrieved from http://www.mpiweb.org/archive/173/94.aspx Lane, M. (2009, March 31). Hawkins woman who embezzled more
that $100,000 from credit union gets 30-month sentence. Kingsport
Carozza, D. (2008, July/August). Interview with Dr. Robert D. Hare Tennessee Times News. Retrieved from http://www.timesnews.net/
and Dr. Paul Babiak: These men know Snakes in Suits: Identifying article.php?id=9012850
psychopathic fraudsters. The Fraud Magazine, 22(4). Retrieved from
http:www.acfe.com/resources/view.asp?ArticleID=785 Mahadeo, S. (2006, January/February). FraudBasics: White collar
crime demographics. Employee thieves: Who commits the most
Crawford, K. (2007, November 20). Montrose woman who embez- fraud? Fraud Magazine, 20(1). Retrieved from http://www.acfe.com/
zled from school district sentenced to jail, restitution. The Flint resources/view.asp?ArticleID=502
Journal. Retrieved from http://blog.mlive.com/flintjournal/news-
now/2007/11/montrose_woman_who_embezzled_f.html Perri, F., & Lichtenwald, T. (2008). The Arrogant chameleons: expos-
ing fraud-detection homicide. The Forensic Examiner, 17(1), 26-33.
Federal Prosecutors: Wide variation found in handling of criminal Retrieved from Criminal Justice Periodicals database.
referrals for prosecution: A TRAC special report. (2003, January 24).
TRAC Reports, Inc. Retrieved from http://trac.syr.edu/tracreports/
pros/ausa_pctdecG.html

25
STEVENSON UNIVERSITY

Perri, F. S., & Lichtenwald, T. (2007, Winter). A proposed addi- Steinberger, M. (2004, December 12). Psychopathic C.E.O.s.
tion to the FBI Criminal Classification Manual: Fraud-Detection The New York Times Magazine. Retrieved from http://www.
Homicide. The Forensic Examiner. Retrieved from http://ncjrs.gov/ nytimes.com/2004/12/12/magazine/12PSYCHO.html?_
pdffiles1/225071.pdf r=2&ex=1104642000&en=cf5b315e5

Rebovich, D. J., & Kane, J. L. (2002). An eye for an eye in the United States Senate Committee on the Judiciary, United States Sen-
electronic age: Gauging public atitude toward white collar crime and ate Cong. (2002) (testimony of The Honorable Michael Chert-
punishment. Journal of Economic Crime Management, 1(2). Retrieved off), http://from http://judiciary.senate.gov/hearings/ testimony.
from http://www.utica.edu/academic/institutes/ecii/publications/ cfm?id=310&wit_id=66.
articles/BA296422-B592-E0A21050AFFB2EAB.pdf
Wells, J. T. (2008). Principles of Fraud Examination. New York: Wiley.
Sandick, H. (2003). Gall and Kimbrough and their relevance to
sentencing in white-collar cases. Federal Sentencing Reporter, 20(3). Whittell, G. (2002, November 11). Snakes in suits and how to spot
Retrieved from http://federalsentencingreporter.com/back_issue.php them. The Times Online. Retrieved from http://timesonline.co.uk/tol/
life_and_style/article826475.ece?token=null&offset=0&page=1
Socially dangerous partial psychopaths: The compensated psychopath.
(n.d.). InternetIdiot.net. Retrieved September 13, 2009, from http://
www.internetidiot.net/ socially-dangerous-psychopathy-links.htm

26
FORENSICS JOURNAL

The Gap between Training and Research in the


Detection of Deception Revisited
Edward R. Kemery, Ph.D.

ABSTRACT (2004) argued that there is little research support for the widely-
touted Reid Technique of Interviewing and Interrogation (Reid Tech-
In a recent article, Blair and Kooi (2004) argue that existing research nique; Inbau, Reid, Buckley, & Jayne, 2001). Upon further review,
concerning detection of deception provides minimal support for the as described below, it is argued that the gap between research and
Reid Technique of Interviewing and Interrogation, the dominant practice in detecting deception is not as large as previously suggested.
methodology currently taught to members of law enforcement. Con-
clusions offered by Blair and Kooi are predicated on a meta-analysis According to Trovillo (1939), interest in differentiating truth-telling
of 1,338 statistical estimates of 158 cues to deception obtained from from lying dates back for centuries, and a variety of techniques have
120 independent samples (DePaulo, Lindsay, Malone, Muhlenbruck, been used to gauge truthfulness (Navarro & Schafer, 2001). While
Charlon, & Cooper, 2003). However, Blair and Kooi (2004) base numerous theories have been offered and studies conducted to iden-
their pessimistic assessment of the viability of the Reid Technique on tify valid ways for detecting deception, many rest on the premise that
a restricted interpretation of the technique and use only select infor- deceptive subjects manifest observable physiological and behavioral
mation from DePaulo, et al. (2003). Using a broader interpretation of changes because lying causes anxiety.
the Reid Technique and the breadth of data provided by DePaulo et
al. (2003), this paper offers more promise for using the Reid Tech- That physiological reactions can be reliably measured and validly
nique for detecting deception. reflect deception prompted creation of the polygraph machine (i.e.,
lie detector). In this procedure, a subject is connected to a device that
measures heart and respiration rate, breathing, blood pressure, and
THE GAP BETWEEN TRAINING AND RESEARCH IN THE galvanic skin response. A polygraph examiner then asks the subject
DETECTION OF DECEPTION REVISITED a series of questions to which the examiner knows the answer (i.e.,
baseline questions). A subjects physiological reactions are recorded
There is nothing more practical than a good theory is a quote and subsequently compared with those to questions of substance
from Kurt Lewin (1951), a noted behavioral scientist. Implicit in to the investigation (Lykken, 1959). Manifest changes in subjects
this statement is that a good, solid theory, one based on sound, reactions to baseline questions and those measured after substantive
scientific research will be of great value to those in the field whose questions are viewed as indices of potential deception.
success depends on applying valid knowledge. This is perhaps no
more important in endeavors such as medicine and law because they Despite their acceptance by, and wide use in, U. S. law enforce-
directly impact human lives. Regarding the former, applications of ment and intelligence agencies, polygraph examination has not been
sound theory have had profound impacts on a wide range of human without its critics who argue that there is little credible research sup-
existence by providing methods to better treat, and in some instances porting its accuracy (e.g., Lykken, 2006). Subjects highly motivated
cure, previously vexing illnesses. In the latter, which is the focus of to beat the polygraph machine can employ a variety of tactics such as
this paper, theory and sound research in the social sciences have pressing on a tack hidden in their shoe to manipulate arousal during
informed various aspects of the legal process, the essence of which is baseline questions. Lykken (2006) concluded that polygraph find-
to dispense justice. ings are biased against the innocent, and suggests that a lie detector
in Washington DC is about as useless as a compass at the magnetic
An essential aspect of criminal justice is determining the guilt North Pole (p. 17). In recognizing limitations of polygraph findings,
or innocence of individuals or deciding on their credibility. This the judicial system in Australia has gone so far as to entirely ban poly-
endeavor, while important to many forensic activities (Aamodt & graph results from criminal proceedings (Freckelton, 2004). The U.S.
Custer, 2006), is a crucial component of criminal investigation judicial system has not gone quite that far. A number of states con-
because decisions regarding guilt, innocence, and credibility of sider polygraph results inadmissible in a criminal trial, while others
individuals determine an investigations direction and ultimately, will allow them, but only if admissibility is agreed to by both parties
its conclusion. In other words, because investigators routinely must (see, e.g., Greely & Illes, 2007, for a listing of U.S. state regulations
make decisions about the veracity of individuals, detecting deception regarding polygraph use).
is an extremely important investigation skill.
Another means of gauging witness and suspect credibility by law
This paper addresses the relationship among theory, research and enforcement officers is from information gathered through the inter-
practice as applied to detecting deception in investigation inter- view process. Based on the totality of information obtained, investiga-
views. In a recent article, Blair and Kooi (2004) claimed that the gap tors must judiciously decide how to proceed with an investigation.
between research and training in detecting deception is so wide that Tracking down false leads provided by deceptive witnesses or suspects
current training practices are unjustified. Specifically, Blair and Kooi wastes valuable time, so investigators often must make snap credibil-

27
STEVENSON UNIVERSITY

ity judgments which are based on several factors operating contem- Blair and Kooi (2004) challenged the validity of the Reid Technique,
poraneously, not only information provided but also the interviewees claiming that The existing literature reveals serious lack of knowledge
overall demeanor (what is said, how it is said, and other attendant regarding The Reid Technique (p. 82). It is the contention of the
behavioral cues). present paper that this conclusion is overly pessimistic in two regards:
one is that it is based on an incomplete representation of the Reid
To assist law enforcement in making valid credibility judgments Technique; the other is that, based on this incomplete representation,
within an interview context, John E. Reid and Associates (Reid) the authors chose to ignore research findings that actually lend sup-
developed a model to guide investigators on paying attention to port to the viability of the Reid Technique.
what are the most important factors during an interview. The Reid
Technique of Interviewing and Interrogation (Reid Technique as it Because Blair and Kooi (2004) evaluated results from a study by
has come to be known) has achieved a wide degree of acceptance. DePaulo, et al. (2003) as their basis for claiming a disconnection
As noted by Blair and Kooi (2004), Reid has trained over 150,000 between research and practice in the detection of deception, details of
criminal investigators from many countries throughout the world. this study will be reviewed below. Following this review and discus-
And, their book, Criminal Interrogations and Confessions (Inbau, Reid, sion of limitations of the analysis provided by Blair and Kooi (2004),
Buckley, & Jayne, 2001) has been touted as the most commonly a broader analysis of DePaulo, et al. (2003) is proffered, one that
employed text in the criminal justice field (Gudjonsson, 2003; Leo, arguably lends more credence to the deception detection methods
2001; Vrij, 2000). taught by Reid and Associates.

OVERVIEW OF THE REID TECHNIQUE OF INTERVIEW THE DEPAULO ET AL. (2003) STUDY
AND INTERROGATION
DePaulo, et al. (2003) conducted an in-depth analysis of previous
The Reid Technique, one of many possible tools in an investigators empirical research involving cues of deception, including verbal,
satchel, involves an on-going assessment of a subjects behavioral reac- non-verbal, and paralinguistic. They used an analytical tool called
tions over the course of an interview. This behavioral analysis method, meta-analysis in which results from a number of studies of the same
predicated on the notion that deceptive subjects will display their behavioral deception cue are combined to provide a best estimate
deception in an array of reactions, trains interviewers to focus on the (also termed effect-size) of the relationship. The effect size (d) can be
totality of interviewee behavior by simultaneously tuning in to three tested for both statistical significance and the presence of moderator
channels of communication: verbal, non-verbal, and paralinguistic. variables which might condition (further explain) observed relation-
The verbal channel involves not only the meaning of the spoken ships. For example, consider the deception cue, providing details.
word, but also word arrangement and choice. The non-verbal chan- According to the theoretical underpinnings of the Reid Technique,
nel contains information communicated through changes in posture, when asked about a situation involving a crime, a deceptive indi-
eye contact, and facial expression, while the paralinguistic channel vidual would be motivated to provide less detail. This way, the indi-
involves response timing and length, and erasure behaviors, such as vidual would not have to create and commit to memory an elaborate
clearing of the throat and laughing following a response (Inbau et al. lie, the elements of which might be difficult to recall later. In their
2001). analysis of research on providing details, DePaulo et al. (2003) were
able to identify 24 independent effect sizes, 16 of which contained
Underpinning the Reid Technique are several principles (Inbau et al., enough information to estimate differences in liars and truth-tellers.
2001). First, and perhaps most important, is that there are no unique From these studies, an average effect size of -0.30 was found which
behaviors associated with truthfulness or deception. Not unlike the is statistically significant. Because the data were coded such that liars
baseline approach to polygraph testing, interviewers using the Reid were compared with truth-tellers, this negative relationship indicates
Technique are trained to gauge a subjects normal behavior patterns that across the 16 samples, liars provided less detail than truth-tellers,
by focusing on all three communication channels simultaneously, a finding that lends support to the Reid Technique.
judging the consistency of the three channels, and evaluating the
preponderance of behavior during an interview. It is especially impor-
tant that interviewers be vigilant for behavioral changes and instances
where subjects display cross-channel inconsistency.

28
FORENSICS JOURNAL

In the aggregate, the DePaulo, et al. (2003) study included data from TABLE 1
120 independent samples obtained from 116 studies. Based on their
results, they addressed the question: Do people behave differently Comparison of Reid Predictions and DePaulo et al. (2003)
when they are lying compared with when they are telling the truth? Observed Behaviors (adapted from Blair and Kooi, 2004)
and concluded:
DEPAULO ALL
BEHAVIORS REID MODELa
The combined results of 1,338 estimates of 158 STUDIES
cues to deception are reported. Results show that Posture Changes + 0.05
in some ways, liars are less forthcoming than truth
tellers, and they tell less compelling tales. They Illustrators 0.14 *
also make a more negative impression and are Adaptors (Fidgeting) + 0.16 *
more tense. Their stories include fewer ordinary Feet/Leg Movements + 0.09
imperfections and unusual contents. However,
many behaviors showed no discernible links, or Eye Contact 0.01
only weak links, to deceit. Cues to deception were Duration 0.03
more pronounced when people were motivated Latency + 0.02
to succeed, especially when the motivations were
Rate 0.07
identity relevant rather than monetary or mate-
rial. Cues to deception were also stronger when Pitch 0.21 *
lies were about transgressions (p. 74).
a
A + value indicates deceptive subjects exhibited more of a behavior.
THE BLAIR AND KOOI (2004) ANALYSIS A value indicates deceptive subjects engaged in less of a behavior
than truthful subjects.
In order to understand limitations of conclusions offered by Blair and * p < 0.05
Kooi (2004) regarding the efficacy of the Reid Technique for detect-
ing deception, it is important to consider evidence evaluated by Blair Taken together, these select results suggest very little support for the
and Kooi (2004) relative to what is taught in the Reid Technique. As Reid Technique; only three of the nine cues are statistically signifi-
noted previously, the Reid Technique trains investigators to focus on cant, and one of them, pitch, is contrary to what is suggested by
three behavioral response domains verbal, non-verbal, and paralin- Reid. Unfortunately, by limiting consideration to only two of the
guistic. While DePaulo, et al. (2003) included research from all three three focal response domains, Blair and Kooi (2004) provide at best a
in their study, unfortunately, Blair and Kooi (2004) chose to focus weak test of the Reid Techniques efficacy. In other words, excluding
only on what they termed non-verbal indicators of deception (in the verbal response domain ignores the richness of information avail-
Reids terms, non-verbal and paralinguistic), justifying their choice by able to investigators who would also pay attention to a subjects verbal
stating that, Because most existing research about the detection of behavior, and according to the Reid Technique, use this information
deception has focused on nonverbal indicators, this paper will focus in conjunction with other data to make a determination of credibility.
on nonverbal indicators of deception (p. 77).

Based on their limited focus, Blair and Kooi (2003) identified nine IMPLICATIONS OF THE DEPAULO, ET AL. (2003) STUDY
cues to deception on which to judge support for the Reid Technique. FOR THE REID TECHNIQUE REVISITED
These cues are shown in Table 1, along with predictions based on
the Reid Technique, and aggregate effect sizes from DePaulo, et al. Of the 158 cues to deception identified by DePaulo, et al. (2003),
(2003). This table partially reproduces the one found in Blair and 88 of them were reported in three or more empirical studies, their
Kooi (2004, p. 81): criterion for final inclusion in the meta-analysis. In order to provide a
stronger test of the Reid Technique, each significant finding reported
by DePaulo, et al. (2003) was categorized according to its relevant
response domain (verbal, non-verbal, or paralinguistic). Results of
this categorization process are displayed in Table 2. In all, 22 effect
sizes (25%) are statistically significant in differentiating liars from
truth-tellers, including nine verbal cues, eight non-verbal cues, and
five paralinguistic cues.

29
STEVENSON UNIVERSITY

TABLE 2

Summary of Significant Findings (out of 88 indices) from DePaulo,


et al. (2003).

RESPONSE DOMAIN/ DEFINITION


EFFECT SIZE INTERPRETATION
BEHAVIORAL CUE (ADAPTED FROM DEPAULO, ET AL., 2003)
NON-VERBAL
Illustrators -0.14 Hand movements that accompany speech and illustrate it Deceptives exhibited
fewer illustrators
Cooperative (overall) -0.66 Speaker seems cooperative, helpful, positive, and secure Deceptives were seen as
less cooperative
Presses lips 0.16 Lips are pressed together Deceptives pressed their
lips more
Chin raise 0.25 Chin is raised; chin and lower lip are pushed up Deceptives raised their
chin more
Facial pleasantness -0.12 Speakers face appears pleasant; speakers show more positive Deceptives displayed less
facial expressions (such as smiles) than negative expressions facial pleasantness
(such as frowns or sneers)
Nervous, tense (overall) 0.27 Speaker seems nervous, tense; speaker makes body move- Deceptives appeared
ments that seem nervous more nervous
Pupil dilation 0.39 Pupil size, usually measured by a pupillometer Deceptives showed more
evidence of pupil dilation
Fidgeting (undifferentiated) 0.16 Object fidgeting and/or self-fidgeting and/or facial fidgeting Deceptives exhibited
(undifferentiated) more fidgeting
PARALINGUISTIC
Talking time -0.35 Proportion of the total time of the interaction that the Deceptives spent less
speaker spends talking or seems talkative time talking
Verbal immediacy -0.31 Linguistic variations indicative of speakers efforts Deceptives were less
(all categories) to distance themselves from their listener, the content immediate in their response
of their communications, or the act of conveying those latencies across all categories
communications (e.g., Theres Johnny is more non-
immediate than Heres Johnny), temporal non-
immediacy (the present tense is more immediate than
other tenses), and passivity (the passive voice is more
non-immediate than the active voice).
Verbal and vocal immediacy -0.55 Speakers respond in ways that seem direct, relevant, clear, Deceptives showed
(impressions) and personal rather than indirect, distancing, evasive, less immediacy
irrelevant, unclear, or impersonal
Verbal and vocal uncertainty 0.3 Speakers seem uncertain, insecure, or not very dominant, Deceptives showed
(impressions) assertive, or emphatic; speakers seem to have difficulty more uncertainty
answering the question
Vocal tension 0.26 Voice sounds tense, not relaxed; or, vocal stress as assessed Deceptives displayed more
by the Psychological Stress Evaluator, which measures vocal vocal tension
micro-tremors, or by the Mark II voice analyzer

30
FORENSICS JOURNAL

VERBAL
Details -0.3 Degree to which the message includes details such as Deceptives provided
descriptions of people, places, actions, objects, events, and less detail
the timing of events; degree to which the message seems
complete, concrete, striking, or rich in details
Plausibility -0.23 Degree to which the message seems plausible, Deceptives provided less
likely, or believable plausible accounts
Logical structure -0.25 Consistency and coherence of statements; collection of Deceptives accounts
different and independent details that form a coherent were less logical
account of a sequence of events
Discrepant, ambivalent 0.34 Speakers communications seem internally inconsistent or Deceptives provided
discrepant; information from different sources (e.g., face vs. more discrepant and
voice) seem contradictory; speakers seem to be ambivalent ambiguous information
Word and phrase repetitions 0.21 Subcategory of non-ah speech disturbances in which Deceptives repeated words
words or phrases are repeated with no intervening and phrases more often
pauses or speech errors
Negative statements 0.21 Degree to which the message seems negative or includes Deceptives made more
and complaints negative comments or complaints (Measures of positive negative statements and
comments were included after being reversed.) complain more
Spontaneous corrections -0.29 Spontaneous correction of ones statements Deceptives offered fewer
spontaneous corrections
Admitted lack of memory -0.42 Admission of lack of memory Deceptives less likely to
admit a faulty memory
Related external associations 0.35 Reference to events or relationships that are external Deceptives offered more
to the event of immediate focus external associations
(events or relationships)
relative to key event

The missing component of the Blair and Kooi (2004) analysis, verbal Taken together, these findings suggest a more optimistic
behavior, contained the largest number of significant findings. Gener- evaluation of the efficacy of the Reid Technique, and a smaller gap
ally, those who were deceptive provided less detail in their answers between research and practice than previously suggested by Blair and
and provided less logical and plausible accounts. They also provided Kooi (2004). That is not to say that the book is closed on the Reid
more discrepant and ambiguous information, repeated words and Technique. The study and conclusions provided by DePaulo, et al.
phrases more often, and were more likely to complain and make (2003) are from an aggregation of information obtained from a wide
negative statements. They were also less likely to make spontaneous range of deception studies. While research on its aspects conducted
corrections in their story, and less likely to admit having a faulty by its proponents is included in the meta-analysis (Horvath, 1973,
memory. Overall, in terms of non-verbal behavior, deceptive indi- 1978, 1979; Horvath, Jayne, & Buckley, 1994), the meta-analysis
viduals used fewer illustrators, were seen as less cooperative, pressed does not speak directly to the validity of the Reid Technique; rather,
their lips and raised their chin more often, appeared more nervous, because the analysis involves estimating an effect size across a num-
and displayed more facial unpleasantness than non-deceptive per- ber of research methods, observed effects are those that are hardy,
sons. Relative to paralinguistic behavior, deceptive individuals spent that is, they tend to manifest themselves independent of the method
less time talking, showed less immediacy in their response latencies, employed. It follows from this analysis that the cues of deception
seemed more vocally tense, and were seen as less certain about what listed in Table 2 are those that manifest themselves rather consistently.
they were saying than were their truthful counterparts.

31
STEVENSON UNIVERSITY

CONCLUSION Horvath, F. (1979). Effect of different motivational instructions on


detection of deception with the psychological stress evaluator and the
While the findings may be interpreted as indicative of behavioral galvanic skin response. Journal of Applied Psychology, 64, 323-330.
tendencies of deception, and it would be tempting to create a profile
of the typical liar, it would be unwise for an investigator to attach Horvath, F., Jayne, B., & Buckley, J. (1994). Differentiation of truth-
specific meaning to any one index or even to a constellation of them. ful and deceptive criminal suspects in behavior analysis interviews.
Just as with results from any investigative tool, information gleaned Journal of Forensic Sciences, 39, 793-807.
from interviews should be considered suggestive, or perhaps even
presumptive. But in any event, hypotheses (e.g. hunches, suspicions) Horvath, F. S. (1973). Verbal and nonverbal clues to truth and decep-
generated from interviews should be corroborated with other infor- tion during polygraph examinations. Journal of Police Science and
mation, when available, in order to make prudent decisions guiding Administration, 1, 138-152.
an investigations direction.
Inbau, F. E., Reid, J. E., Buckley, J. P., & Jayne, B. P. (2001). Crimi-
nal interrogations and confessions. Gaithersburg, MD: Aspen.
REFERENCES
Leo, R. A. (2001). False confessions: Causes, consequences, and
Aamodt, M. G., & Custer, H. (2006). Who can best catch a liar? solutions. In S. D. Westervelt & J. A. Humphrey, Wrongly convicted:
Forensic Examiner, 15(1), 6-11. Perspectives on failed justice. (pp. 36-54). New Brunswick, NJ: Rutgers
University Press.
Blair, J. P., & Kooi, B. (2004). The gap between training and the
detection of deception. International Journal of Police Science & Lewin, K. (1951). Field theory in social science: Selected theoretical
Management, 6(2), 77-83. papers. New York, NY: Harper & Row.

DePaulo, B. M., Lindsay, J. J., Malone, B. E., Muhlenbruck, L., Lykken, D. (2006). Nothing like the truth. New Scientist, 183(2460).
Charlon, K., & Cooper, H. (2003). Cues of deception. Psychological
Lykken, D. T. (1959). The GSR in the detection of guilt. Journal of
Bulletin, 129(1), 74-118.
Applied Psychology, 43, 385-388.
Freckelton, I. (2003, November). The closing of the coffin on foren-
Navarro, J., & Schafer, J. R. (2001). Detecting deception. FBI Law
sic polygraph evidence for Australia. Psychiatry, Psychology, and Law,
Enforcement Bulletin, 70(7), 9-13.
359-366.
Trovillo, P. V. (1939). A history of lie detection. Journal of Criminal
Greely, H. T., & Illes, J. (2007). Neuroscience-basedlie detection: The
Law and Criminology, 29, 848-881.
urgent need for regulation. American Journal of Law & Medicine, 33,
377-431. U.S. Department of Labor. (2008). Retrieved July 2, 2008, from
http://www.dol.gov//.pdf
Gudjonsson, G. H. (2003). The psychology of interrogations and confes-
sions: A handbook. Hoboken, NJ: Wiley. Vrij, A. (2000). Detecting lies and deceit: The psychology of lying and the
implications for professional practice. New York: Wiley.
Horvath, F. (1978). An experimental comparison of the psychological
stress evaluator and the galvanic skin response in detection of decep-
tion. Journal of Applied Psychology, 63, 338-344.

32
FORENSICS JOURNAL

Book Review:
Corporate Resiliency: Managing the Growing Risk of Fraud
and Corruption by Toby Bishop and Frank Hydoski
Ken Johanning

The authors main idea presented in the book is that resilient compa- been put into place. Each of these components supports the theme of
nies can survive after a fraud has occurred. According to Bishop and the book: prepared companies can survive a fraud.
Hydoski (2009), [R]esiliency can be viewed as doing the things nec-
essary to minimize harmful effects and mobilize resources to facilitate The fourth and final step outlines how a company should prepare for
recovery (p. 32). The authors provide advice on what can be done a fraud and what actors need to be involved in preventing and inves-
to assess risk areas and controls that can be implemented to detect tigating fraud. Investigations are crucial to limiting the frauds impact
fraud. In addition, guidance is provided on establishing investigative and enacting steps to prevent future similar frauds. According to
programs in the event a fraud actually occurs so as to help minimize Bishop and Hydoski, In many instances, the way a company investi-
its effect. gates an incident of fraud can be just as criticaland sometimes even
more criticalthan the fact that the fraud took place (p. 123). A
The book reviews some fraud statistics from the Association of Certi- corporation should take careful steps in planning an investigation and
fied Fraud Examiners (ACFE) 2008 Report to the Nation on Occupa- identifying areas that are susceptible to fraud.
tional Fraud and Abuse, e.g. the average company will lose around 7%
of its revenue to fraud (p. 8). It is therefore important for companies The authors describe the actors who have roles in preventing, detect-
to consider fraud and be prepared for it. In addition, A company ing and investigating fraud to include internal auditors, management,
with a 10 percent profit margin that experiences a single $250,000 and the board of directors. Each persons role is clearly defined which
misappropriation of assets would have to generate an additional $2.5 assists companies in clarifying employees responsibilities.
million in revenue to restore its net income to pre-fraud levels (p.
22) Consequently, the recovery from fraud by a company is both a In conclusion, the authors present their views of what may happen
time and cost consuming process. in the future. The authors believe that a companys approach to fraud
needs to be flexible as the schemes that fraudsters employ will change
Companies that are resilient can survive a severe fraud while those over time. Knowing the types of schemes that have been perpetrated
that are not tend to fail. In order to continue after a fraud, the in the past helps corporations prepare for the future.
authors suggest several steps to preclude the recurrence of fraud: per-
form a fraud assessment, establish an anti-fraud control environment, Although the information provided is valuable, the book has several
implement preventive and detection controls, and develope a fraud shortcomings. First, there are no detailed examples of actual frauds.
investigation plan. The authors provide a few real life examples; however, these are too
general and vague to be of much value. Readers tend to relate to real
The initial step is the preparation of a fraud assessment, a tool used life examples more than to the presentation of theory alone. These
to determine where the company is vulnerable to fraud and how its examples would have been helpful to put some of the concepts men-
current anti-fraud strategies are working. The authors provide a help- tioned in the book into perspective. The authors could have followed
ful organized process to prepare a risk assessment including details for one fraud through from beginning to end as the book progressed.
each step that are easy to understand and implement. A list of ques-
tions is provided for those companies that already have prepared a risk Second, a majority of those quoted in the book actually work for the
assessment to evaluate its effectiveness. same accounting and consulting firm as the authors. As such, this
presents a narrow view. Obtaining perspectives from people with
A second step is creating the companys control environment, the varying backgrounds in different industries would widen the aperture
rules of behavior within a company including a written code of eth- and demonstrate the complexity of fraudulent schemes. Interviews
ics, a hotline and a mechanism for investigating fraud allegations. The and insight from former fraudsters who actually committed fraud,
authors explain, A strong control environment sets an appropriate such as Sam Antar, former CFO of Crazy Eddie, Inc., who commit-
tone for the companys attitude toward ethical behavior, including ted financial statement fraud and cost investors millions of dollars
fraud (p. 67), and they provide an example code of ethics. would provide an invaluable perspective. This is a perfect example
of fraud committed by a company insider who is willing to share his
The third step addresses controls either to prevent or to detect fraud. story, to demonstrate how he was able to commit the fraud, and over
The authors cite numerous controls related to fraudulent financial what period of time. Antars website states that he shares his views
statements, misappropriation of assets, and bribery and corruption. and advice on white collar crime (Antar, n.d.).
The authors stress the importance of monitoring after controls have

33
STEVENSON UNIVERSITY

There are many steps a company can take to prevent fraud and to is needed to help a company formulate or strengthen an existing
survive a fraudif it is prepared. The authors convincingly make the anti-fraud program from preparing a risk assessment to implementing
case that the time and cost of implementing the ideas in this book an investigative program before a fraud occurs. The book is easy to
will be less than the cost of a loss due to an actual fraud. A useful understand and written in plain language that eliminates the use of
follow-up to the book would be to provide updated fraud schemes accounting and auditing terms that readers may not understand.
that have been perpetrated. This will allow companies to become
aware of these schemes and realign their anti-fraud tactics to combat
these schemes. REFERENCES

According to the authors, In our experience, companies that prepare Antar, S. (n.d.). White Collar Fraud. Retrieved September 28, 2009,
for the eventuality of fraud and corruption do a better job of coping from http://www.whitecollarfraud.com
and recovering than companies that wait until something unfortunate
has occurred. Formulating a response to fraud after it has occurred is Bishop, T. J., & Hydoski, F. E. (2009). Corporate Resiliency: Managing
like closing the barn door after the horses have escaped. (p. 151) the Growing Risk of Fraud and Corruption. New Jersey: John Wiley &
Sons, Inc.
This book is an effective tool for executives, board members, or
anyone who wants to learn more about ways a company can prepare 2008 Report to the Nation on Occupational Fraud and Abuse. (2008).
for a potential fraud. The reader will gain an understanding of what Retrieved from http://www.acfe.com//.asp?copy=rttn

34
FORENSICS JOURNAL

Book Review:
Fraud Exposed: What You Dont Know Could Cost
Your Company Millions by Joseph W. Koletar
Marina Tapia

ABSTRACT How can an organization mitigate its fraud risk exposure? Koletar
observed that managers, executives, and forensic professionals are
In recent years, meaningful research by the Association of Certified often unaware of effective compliance programs and as a result fail
Fraud Examiners (ACFE) has revealed that occupational fraud con- to prevent and detect fraud. Koletar further contended that although
tinues to be a significant problem in most organizations. According internal controls play a vital role in any organization large or small,
to the ACFE, the fraud problem, at $600 billion, is a problem that even when internal controls are in place, employees often decline to
cannot easily be identified or measured. A review of Fraud Exposed: use them and sometimes even override the controls. Indicative of this
What You Dont Know Could Cost Your Company Millions by Joseph observation, he noted that when an organization fails to implement
W. Koletar, Certified Fraud Examiner, confirmed that forensic internal controls it gives an employee an opportunity to commit
professionals often place greater emphasis on identifying the symp- fraud. Koletar confirmed that, we should also be sensitive to the fact
toms of fraud rather than identifying the causes of fraud. However, that controls should be part of a larger plan for mitigating the risk
empirical research suggests that one of several steps can be taken in to the organization and not an end unto themselves (p. 109). Most
organizations to minimize or curtail the opportunity for fraud, such importantly, Koletar emphasized that although compliance programs
as instituting a reporting mechanism, adopting a minimal cost fraud and internal controls are available, internal and external forces (e.g.
prevention measure, segregating the duties of employees, or develop- internal and external relationships, the environment, and reputation
ing a personal profile of a suspect. of the organization) often contribute to the ineffectiveness of such
programs.

REVIEW An important area Koletar failed to address in his book was segrega-
tion of an employees duties, often recognized as an essential part of
On December 11, 2008, vast numbers of individuals and organiza- internal controls, despite the additional cost and effort it requires. The
tions lost their investments as the result of Bernard Madoffs $50 employee in charge of recording transactions, for example, should be
billion Ponzi scheme.1 Madoff, once the head of NASDAQ, a highly prohibited from handling the authorization and the custody func-
admired and gifted financier of Wall Street, had it all, a penthouse tions. Ultimately, when such segregation of duties is effectively insti-
apartment in Manhattan, shares in two private jets, the yacht moored tuted in an organization, coupled with an adequate system of internal
off the French Riviera (Creswell & Thomas Jr., 2009, p. 1). How did control and fraud policies, the risk of fraud is systematically reduced.
this fraudster achieve prominent status and power while manipulating
and depriving countless individuals and organizations of their invest- Employee theft as a source of occupational fraud was also explored
ments? The answer is not readily apparent, but according to Creswell in the book. According to the ACFEs 2008 Report to The Nation
& Thomas (2009), an easy answer is that Mr. Madoff was a charlatan on Occupational Fraud & Abuse compiled by several certified fraud
of epic proportions, a greedy manipulator so hungry to accumulate examiners, an updated figure of fraud losses indicated that, organiza-
wealth that he did not care whom he hurt to get what he wanted (p. tions lose 7% of their annual revenues to fraud [and when] applied
2). Without a doubt, fraud schemes of this magnitude lead the baffled to the projected 2008 United States gross domestic product, this 7%
researcher to consider how an organization can mitigate its fraud risk figure translates to approximately $994 billion in fraud losses (p.
exposure, minimize its losses as a result of employee theft and avoid 4). While retrospectively, the old estimate in the 1996 Report to the
becoming the next victim of fraud. Nation indicated that, over 80 percent of occupational frauds involve
asset misappropriation, cash being the target in 90 percent of the
In his book entitled, Fraud Exposed: What You Dont Know Could Cost incidents (p. 34), Koletar notes that only a few organizations report
Your Company Millions, Joseph W. Koletar, Certified Fraud Examiner fraud incidents to law enforcement due to fear of bad publicity.
(CFE), helps his readers understand the truth about occupational
fraud and abuse.2 Despite proactive participation in part by the While Koletar recognized that public beliefs and bad publicity could
Association of Certified Fraud Examiners (ACFE) in finding viable damage an organizations reputation, recent empirical data sug-
solutions for fraud problems, Koletar effectively argues that insuf- gest that organizations adopting a minimal cost fraud prevention
ficient resources have been allocated to address the fraud problems measure such as the perception of detection are viewed favorably by
that organizations often encounter. Consequently, forensic profession- their customers while simultaneously reducing the risk of fraud. The
als often fail to identify the causes of fraud, and inefficiently place perception of detection measures is [an inexpensive, yet effective,
greater emphasis on identifying the symptoms. In discussing these fraud prevention measure] that [allows your employees] to know that
and other fraud related issues, Koletar noted, that in order for the the public entity is taking steps to detect fraud (Minnesota Office
field to continue to mature and develop, we still have a long way to of the State Auditor website, in Rebecca Ottos commentary section).
go (p. 85). Of particular importance, Koletar urges forensic profes- Koletar cited a study by researchers Richard C. Hollinger and John P.
sionals to recognize that regardless of the size of an organization, the Clark who discovered employees steal primarily as a result of work-
base levels of fraud are predominantly the same. place conditions, and that the true costs of the problem are vastly

35
STEVENSON UNIVERSITY

understated (p. 54). Koletar reasoned that law enforcement models, Koletar noted that a learning organization4 is very similar to a com-
theories of social deviance, and learning organizations can help foren- munity since their members volunteer in the organization, share a
sic professionals better understand motivating factors and perceptions common language, and engage in power and politics. Koletars con-
of employees as well as aid in the development of better strategies to tention was that until the forensic profession improves its statistics,
deter occupational fraud. definitions, and anchor[s] itself conceptually within the organization
and within the academic community, it will forever drift in a state
How can an organization avoid becoming the next victim of occupa- of weakness (p. 184). Koletar suggested that forensic profession-
tional fraud? According to Koletar, expanded and meaningful research als consider having a system in place to measure the problems that
is necessary to understand the causes of fraud. Koletar observes, they often face. Particularly, Koletar asserted, a vision is necessary to
[sadly] we in the forensic profession have [a] dirty little secret: we are provide guidance and direction, and to help an organization achieve
remarkably ineffective in dealing with fraud (p. xiv). A positive first its goals.
step, Koletar insisted, is to look at the criminal and law enforcement
response models and determine why these models have been suc- As forensic professionals, organizational pathologists and audit risk
cessful in the battle against crime. For example, in an effort to better managers, how do we effectively fight the battle against occupational
serve the community, law enforcement officials redefined the roles fraud? Koletar declared as forensic professionals, we must first for-
of its members and asked them to pay particular attention to what mulate answers to the most basic questions, increase our funding
is going on in the environment, whether that environment is the and research efforts, and continually deliver our anti-fraud message.
community or the police department (p. 28). In response, Herman While all of the aforementioned observations are open for discus-
Goldstein, a former executive assistant to O.W. Wilson (the Superin- sion, Koletar acknowledged the fact that it could take several years to
tendent of Police in Chicago, 1960) recognized the need for change raise research funds and aggressive efforts taken before our anti-fraud
and subsequently developed a community policing model to address message is delivered effectively. Koletar observed that in order to
these concerns. Goldstein emphasized, [community policing was] an gain control of the fraud problem, [forensic professionals must first]
effort to conceptualize the police as part of the community (As cited understand three things [about occupational fraud]: what it is, what it
in Koletar, p. 19). is not, and why it is important (p. xv).

It is time for the forensic professional to reconsider his role in the In order to minimize fraud in organizations, it is critically important
organization, prioritize his tasks, organize a professional body of to implement an effective reporting mechanism, (e.g. a fraud hotline)
knowledge, and help organizations revisit their fraud efforts to cur- where employees can report a fraud suspect or fraudulent activity.
tail the opportunity for fraud. While these guided efforts are laud- Thomas A. Buckhoff, CFE, pointed out that forensic accounting is a
able in writing, Koletar did address the reality that people do not rapidly growing field: the demand for forensic accounting began to
always embrace change and how to offset the challenge. Additionally, increase in the mid-1970s when fraud detection experts were needed
in order to revitalize the field, extensive training and cooperation to assist various law enforcement agencies in the rapidly-growing area
between field experts and regulators is necessary, but these subjects are of white-collar crime (p. 1).
not fully examined by Koletar.
Although Koletar posed some convincing arguments, the reality is
To understand the underlying reasons why fraudsters commit fraud that the forensic profession is still evolving, expanding its sphere
in the first place, Koletar urges forensic professionals to think about of influence and continually attracting newly optimistic members
research concerning punishment and deterrence [and try to increase] into its community. Creating a forensic community with shared
the possibilities for cooperation (p. 152-153). He stated they should mores and beliefs remains an impressive challenge. Noticeably, more
be mindful of a fraud perpetrators lifestyle and begin to think about universities are educating students about fraud prevention and detec-
profiling organizations (p. 164). By focusing on the organization, tion due to the seriousness of the fraud problem. As perplexing as
Koletar failed to emphasize the importance of developing a profile of the updated 2008 fraud figure of $600 billion may seem, perhaps
a fraud suspect. This profile would be composed of a financial and the only way to truly appreciate the field of forensic accounting is to
personal profile that captures financial data and lifestyle habits of the redefine leadership roles within our community to effectively lead,
suspect. Although Koletar raised a compelling point that organiza- guide and monitor our newest members.
tions are just like communities, he did not specifically state whether
organizations that foster this type of culture are more prone to
employee collusion.3

36
FORENSICS JOURNAL

REFERENCES NOTES

Association of Certified Fraud Examiners. (2008). 2008 Report to the 1


U.S. Securities and Exchange Commission defines a Ponzi scheme
Nation on Occupational Fraud and Abuse. Retrieved from http://acfe. as, an investment fraud that involves the payment of purported
com/documents/2008-rttn.pdf returns to existing investors from funds contributed by new investors.
Ponzi scheme organizers often solicit new investors by promising to
Buckhoff, T. A. (n.d.). Forensic Accountants: the fraudbusters. In invest funds in opportunities claimed to generate high returns with
North Dakota State University. Retrieved September 26, 2009, from little or no risk. In many Ponzi schemes, the fraudsters focus on
http://www.ndsu.nodak.edu/ndsu/buckhoff/couses/ACCT410610/ attracting new money to make promised payments to earlier-stage
Forensic.Accountants.The.Fraudbusters.doc investors and to use for personal expenses, instead of engaging in any
legitimate investment activity. From Frequently Asked Questions.
Creswell, J., & Thomas, L., Jr. (2009, January 25). The talented Mr.
Madoff. The New York Times. Retrieved from http://www.nytimes. 2
The Association of Certified Fraud Examiners 2008 Report to The
com/2009/01/25/business/25bernie.htm Nation on Occupational Fraud and Abuse defines occupational fraud
and abuse as, the use of ones occupation for personal enrichment
Koletar, J. W. (2003). Fraud Exposed: What You Dont Know Could through the deliberate misuse or misapplication of the employing
Cost Your Company Millions. Hoboken, New Jersey: John Wiley & organizations resources or assets. In Introductory section, 6.
Sons, Inc.
3
Employee collusion occurs when an employee acting alone or col-
Otto, R. (2008, June 27). Fraud prevention - the perception of detec- lusion with others engages in dishonest or fraudulent acts in order to
tion. In Minnesota Office of the State Auditor. Retrieved September 28, steal from their respective employing organization.
2009, from http://osa.state.mn.us/default.aspx?=page20090724.056
4
A learning organization is characterized as a decentralized structure
What is a Ponzi Scheme? (n.d.). U.S. Securities and Exchange Com- that fosters change, facilitates learning, and continually communicates
mision [Frequently Asked Questions]. Retrieved from http://www.sec. its objectives to its organizational members.
gov/answers/ponzi.htm

37
STEVENSON UNIVERSITY

Book Review:
Investigating Identity Theft: A Guide for Businesses, Law Enforcement,
and Victims by Judith M. Collins
Veronica Arze

As individuals and businesses rely more on technology and technol- Following these initial chapters are two chapters dedicated to edu-
ogy continues to advance, new methods to commit identity theft have cating readers on configuring their computers for Internet security
surfaced. With the introduction of and the growing reliance on the and online investigations. These two chapters are primarily written
Internet for everyday tasks such as online banking, online shopping, for investigators new to the internet. Regardless, the information
and loan applications, identity theft via the Internet is becoming provided is useful for any reader as a check to ensure proper com-
more popular. In her book, Investigating Identity Theft: A Guide for puter security is enabled. Exercises and tutorials are included in these
Businesses, Law Enforcement, and Victims, Judith M. Collins provides chapters and serve as how-to steps for any reader not familiar with
guidance for investigators and victims investigating identity thefts settings on their computer. Collins dedicates part of chapter four to
with the assistance of the Internet itself. an introduction to search engines and directories. Search engines are
critical to online investigations when the investigator has minimal
Collins is a highly regarded expert on identity theft and a former information on the crime, i.e. an address, phone number, or name.
associate professor at the School of Criminal Justice at Michigan Collins provides excellent examples of this in chapter seven where she
State University. She has written what she labels a how-to book presents a case example of an identity theft investigation performed
for investigators, criminal justice teachers, and victims who wish to with search engines.
investigate their own identity thefts. According to Collins, Even
novice investigators can become professionals at online investigations In chapters five and six, Collins advises readers of two important
(p. 14). Investigating Identity Theft provides readers with instructions steps: The first includes preparing for the investigation. Victims must
on conducting investigations and includes exercises using the tech- take some steps immediately subsequent to discovering the identity
niques shared in the book. Additionally, the book contains many case theft. Chapter six is primarily for investigators because it touches on
examples which assist the reader in understanding how the methods the second important step of any investigation, the authentication
work in real investigations. process. According to Collins, authenticating simply means verifying
the identity theft claims before launching full-scale into the investiga-
In her opening message, Collins states that her book was written for tion (p. 89). All investigators should take this step in order to ensure
a broad audience from investigators new to the Internet to those with that they are not wasting valuable resources on a criminal rather
advanced knowledge of computers. Its main purpose is to educate than a victim. Collins explains the layout of credit reports and points
individuals to use the Internet as a tool to gather, retain, and orga- out potential red flags that could appear on the reports. Exhibits are
nize information pertaining to the crime (p.14). provided to explain further the importance of the review of a credit
report.
The book is divided into five sections: the first two provide an intro-
duction to identity theft and steps for preparing and configuring Collins begins her introduction to Internet investigations in chapter
computers for investigations; the remaining three sections contain eight with an introduction to the World Wide Web for more hands-
information critical to a successful identity theft investigation. Besides on experience. One valuable tool that Collins presents to readers is
being a comprehensive guide for this process, it provides an extensive the Internets Wayback Machine. This tool allows investigators to
list of useful websites in the appendix. locate and view web sites that have been changed, discontinued, or
removed. If identity thieves are attempting to try and cover their
In the first chapter, Collins introduces four identity theft case online tracks, this tool can assist the investigators by uncovering
examples from investigations performed at the Identity Theft Crime the online information the thieves are trying to hide. Chapter nine
and Research Lab at Michigan State University. All four cases differ continues Collins explanation with the steps to trace IP addresses
in complexity, investigation methods used, and outcomes. The next and URLs and an exercise to learn how to conduct a trace. Collins
chapter expands on the authors introduction with a definition of the explains that if an investigator has an IP address, that is valuable
crime. According to Collins, identity theft evolves continuously as information since the IP address is a computers unique identifier.
thieves find new ways to commit the crime (p. 17). In this chapter, Chapter ten is dedicated to tracing e-mail addresses. Again, Collins
Collins discusses the theory that identity theft is a network crime. She takes time to provide a background on the topic (how e-mail works)
explains that neither personal identity thefts nor business identity and exercises to assist readers with hands-on experience.
thefts are committed by a single criminal operating alone; rather,
identity thefts typically involve networks of individuals who are more Finally, chapter eleven focuses on the investigators role during search-
or less organized and who operate in cells that perform different but ing and seizing. Collins addresses the future of identity theft and
interrelated functions (p. 18). To a reader who has little experience investigations by stating that identity theft can be expected to increase
or knowledge in this area, this information is especially beneficial in in the coming years (p.179). Large numbers of businesses and data-
order to understand the investigation process. bases contain pieces of personal information about individuals that

38
FORENSICS JOURNAL

makes them susceptible to identity theft. The lack of security for these From victims with no experience in identity theft investigations to
databases, Collins feels, is another reason why identity theft crimes law enforcement officers with little knowledge of performing inves-
will increase. While there are many federal and state laws aimed at tigations on the Internet, this book provides useful information for
protecting consumers from identity theft, such as the Identity Theft a wide audience. Containing a wealth of information on the topic of
and Assumption Deterrence Act of 1998 and the Health Insurance identity theft, it includes excellent case examples to assist the reader
Portability and Accountability Act (HIPPA), Collins believes that IT in understanding how the crime works, and helpful instructions on
security alone cannot prevent identity theft (p.180). using the resources available to all individuals who wish to perform
an identity theft investigation. These resources include the Internet,
Collins experience with identity theft investigations is apparent lists of credit agency contacts and check verification contacts included
throughout the book. She shares many case examples and offers in chapter five. The exercises illustrate information Collins provides
numerous hands-on exercises throughout. Collins dedicates part of throughout the book and they can easily be followed by readers to
each chapter to providing explanations for information technology assist in their own identity theft investigations. Any reader who is
concepts, from firewalls and anti-virus software to Universal Resource interested in learning about identity theft and investigations would
Locators (URLs). With this information, an individual with very little benefit from this book.
computer experience can understand and perform an identity theft
investigation.
REFERENCE
The only weakness of this book lies within the order of chapters. Col-
lins begins the introduction to computers in chapters three and four Collins, J. M. (2006). Investigating Identity Theft: A Guide for Busi-
where she explains how to properly configure a computer to secure it nesses, Law Enforcement, and Victims. Hoboken, New Jersey: John
during online investigations and to document key details (i.e., time Wiley & Sons, Inc.
and date stamps) in order to preserve the chain of evidence. After
these chapters, Collins shifts from the technology aspect to the first
two steps of an identity theft investigation, preparation and investi-
gation. Chapter eight resumes discussing technology and continues
through chapter ten. It would be beneficial to readers to keep the
technology topics together in order to grasp the full concept of online
investigations.

39
STEVENSON UNIVERSITY

Invitation to Contribute Articles


to the Stevenson University
Forensics Review Journal

The Stevenson University Forensics Review Journal is


seeking articles from professionals and scholars in the
fields of forensic studies and science.

Articles should be approximately 2,000-4,000 words and


should be submitted to: Chjohnson@stevenson.edu

40
DESIGN & LAYOUT
Chip Burkey
Matthew Laumann

Stevenson University Marketing


and Public Relations Office

Copyright 2010, author(s) and Stevenson University Forensics Journal.


No permission is given to copy, distribute or reproduce this article in any
format without prior explicit written permission from the articles author(s)
who hold exclusive rights to impose usage fee or royalties.
School of Graduate and Professional Studies 100 Campus Circle, Owings Mills, Maryland 21117 1-877-468-6852 accelerate.stevenson.edu

Anda mungkin juga menyukai