You are on page 1of 80

10+

DETECTIVE
DETECTIVE
#FDPNFBGPSFOTJDTTVQFSTMFVUI 
XJUIEPJUZPVSTFMGBDUJWJUJFT

8I<P.:FKK


LONDON, NEW YORK,


MELBOURNE, MUNICH, AND DELHI
Editor Jenny Finch
Designer Spencer Holbrook

$0/5&/54
Senior Editors Francesca Baines, Claire Nottage
Senior Art Editor Stefan Podhorodecki
Managing Editor Linda Esposito
Managing Art Editor Diane Thistlethwaite
Design Development Manager Sophia M. Tampakopolous Turner
Publishing Manager Andrew Macintyre
Category Publisher Laura Buller
Picture Researcher Liz Moore
DK Picture Library Claire Bowers
Production Controller Claire Pearson The detective work 6
DTP Designer Siu Chan
Jacket Editor Mariza O'Keeffe
The crime scene 8
Jacket Designer Neal Cobourne Forensic photography 10
US Editor Margaret Parrish
Photography Dave King Collecting evidence 12
Consultants Peter Whent, Jonathan Wright
First published in the United States in 2007
by DK Publishing
375 Hudson Street
New York, New York 10014
07 08 09 10 11 10 9 8 7 6 5 4 3 2 1
CD170 – 12/06

Copyright © 2007 Dorling Kindersley Limited


All rights reserved under International and Pan-American
Copyright Conventions. No part of this publication may be
reproduced, stored in a retrieval system, or transmitted in any form
or by any means, electronic, mechanical, photocopying, recording,
or otherwise, without the prior written permission of the copyright
owner. Published in Great Britain by Dorling Kindersley Limited.
A catalog record for this book is
available from the Library of Congress.
ISBN: 978-0-7566-2558-0
Printed and bound by Leo Paper Products Ltd., China BE SAFE! IMPORTANT NOTE TO PARENTS
Some of the activities in this book require adult
Discover more at supervision. Symbols are used to indicate where an activity
www.dk.com must only be done with the help of an adult. Please
check carefully which activities require adult supervision
and supervise your child where indicated.

CHILDREN—BE SAFE!
READ THIS BEFORE STARTING ANY ACTIVITIES!  Take extra care when doing this activity.
1. Tell an adult before you do any of the activities in this
Activities shown with this symbol must only be done
book as you may need an adult to supervise the activity.
with the help of an adult.
2. Pay attention to the following symbols:
Always ensure that your child follows instructions carefully.
 Take extra care with an activity. The author and the publisher cannot take responsibility for
any accident or injury that occurs because the reader has
You need an adult to help you with an activity. not followed the instructions properly and will not be
responsible for any loss or damage allegedly arising from
3. Follow the instructions carefully. any of the activities in this book.


$3*.&4$&/&'03(&3: 40
$3*.&4$&/&30##&3: 14 Forgery: crime scene analysis 42
Robbery: crime scene analysis 16 Fakes and forgeries 44
Recovering fingerprints 18 Identifying a criminal 46
Matching prints 20 Serology 48
Toxicology 22 Forgery: case overview 50
Trace evidence 24
Robbery: case overview 26 $3*.&4$&/&.63%&3 52
Murder: crime scene analysis 54
$3*.&4$&/&"340/ 28 DNA fingerprinting 56
Arson: crime scene analysis 30 Forensic anthropology 58
Fires and bomb blasts 32 Firearms 60
Tracks and marks 34 Murder: case overview 62
Computer and
document forensics 36 History of forensics 64
Arson: case overview 38 Glossary 68
Solutions 70
Index and acknowledgments 72

5)&
%&5&$5*7&803,
In a criminal
investigation, a team of crime scene investigators
(CSIs) gather evidence at the crime scene. But it is
the detective in charge who directs the inquiry,
drawing on knowledge and intuition
for the task. In this book, you
will be the detective. You’ll
pick up the knowledge $E:FLIK
Forensic science means science
you need as you read. intended for a court of law.
So, trust your intuition In court, forensic evidence
is presented alongside
and get ready to conventional evidence,
such as witness
be a detective! statements, to try to
establish proof beyond
a reasonable
doubt.

.<8I:?@E>=FI:CL<J
The first task is to search
for any evidence
and information
at the crime
scene.

'F:8I;XJ<O:?8E><GI@E:@GC<
In the early 1900s, Frenchman Edmund
Locard formulated a theory that underpins
forensic science to this day: “every contact
leaves a trace.” A criminal always leaves traces
at a scene and takes traces of the scene away.

F UFDUJWF  NFT

# F UI F E
 DBOZPVTPMWFUIFGPVSDSJ
 


30##&3: EK<IK?<:I@D<J:<E<
21/
19/9/06

JT
FBOBMZT
NFTDFO Take a look around and read the
/1

$ SJ
The closed-circuit television
camera has been immobilized. It
You are called to the scene has been knocked to point up at
of a robbery at the Holbrook Gallery. the ceiling, so it has not recorded
The gallery is housed in the former apartment
of 1960s pop-art painter and art collector
Stefan Holbrook, and it displays his own
paintings and his personal collection of art
the robbery. How did the criminal
reach the camera to do this?
analysis to find out what has
objects. The gallery’s security officer lies
unconscious on the floor, and one of the
most valuable Holbrook paintings, Blue
Mood, is missing. Look at the items that
SOCOs have selected for forensic analysis
happened. By the time you arrive at
below. Meanwhile, the police are conducting
enquiries. Follow the investigation, then turn
to pages 26–7 for the police reports and
forensic results. Examine them carefully
and see if you can uncover the art thief.
the crime scene, CSIs have identified
+@:KLI<=I8D<
The empty picture frame will be
carefully examined to find out
how the painting was removed. If
and isolated the items they want
*/5&3&45*/($-6&4
tool marks or cuts are found,
these could be used as evidence.
Turn to pages 34–5 to read about
tool marks. forensic experts to examine.
are discussed in .LJG<:KC@HL@; /I8:<JF=>C8JJ / !$'
2?FJ<=@E><IGI@EKJ
more detail A hot drink is spilled Broken glass from the picture
In the gallery, SOCOs are dusting those on the floor beside the frame litters the sofa and floor.    Mona Lisa 
items that the thief may have touched. unconscious security guard. If glass fragments are found on a 
 
Fingerprint examiners will record the Could he have been suspect’s clothes or shoes, they  !! ! 

"$5*7*5*&4let you try out


prints of the security guard as well as drugged? A sample will be could be matched with these
   
those of everyone else who works in the taken to the lab so a crime scene shards to prove
gallery. See pages 18–21 to find out toxicologist can run tests. they were at the scene. Read !     
how investigators recover and To find out about toxicology, about trace evidence    !
match fingerprints. turn to pages 22–3. on pages 24–5.

the forensics for yourself



'PSFOTJD"OBMZTJT

."5$)*/(13*/54 3&$03%'*/(&313*/54

?<:BFLKK?<=FI<EJ@:J Fingerprints have been used


hundred years. But matchi
task, which became longer
to identify suspects for
ng prints was a skilled and
and more difficult still as
more than a
time-consuming
4FL:8EG<I=FID8E@EB8E;IFCCL
=FLE;FEK?<A8:B<KF=K?@J9FFB
4FLN@CCE<<;ink pad
• magnifying glass
J@E>K?<@K<DJ

• fingerprint record pad

collections of
After studying the crime scene, read on fingerprints grew. In 1975,
identification system (AFIS)
Today, AFIS can search and
the first automated fingerp
revolutionized fingerprint
rint
matching.
 +I<JJK?<=@E><IK@G@EKFK?<@E
one side to the other so
B rolling from
that it is evenly coated.
 +I<JJ8E;IFCCK?<=@E><IK@Gi
n the same way
1

compare a million records onto a sheet from your

to find out about the relevant areas of


fingerprint record pad.
every second. Make prints of the index
$EB8E;IFCC your family in this way,
fingers of everyone in
The traditional, universal so you end up with
method prints on several sheets.
of taking fingerprints is Don’t forget to write
!@E><IGI@EKKPG<J called “ink the person’s name at the

forensic science. Case analysis boxes keep Fingerprints are classified


basic pattern, of which
by their
there are
four: whorls, loops, arches,
and roll”. The suspect’s fingertips
rolled in black ink from
the nail to the other. The
fingertips are then rolled
one side of
are

ink-covered
 O8D@E<K? <GI@EKJ:8
magnifying glass. How many
can you identify? If you
top of each sheet.
I<=LCCPusing your
of the four types
2

and on a white have two fingerprints

you posted on the investigation, and combinations. Each type


broken down into further
according to tiny details,
the number and direction
is then
groups
such as
'FFGJ
Loops are the most
common pattern, making
chart to produce prints. of the same type, can you
between them? Note down
each fingerprint.
see differences
your results next to

of ridges. up about 60–70% of 3


activities along the way will help you to FD9@E8K@FEFIFDGFJ@K<
Characteristics of the other
all fingerprints.

!@E><IGI@EKJ:8EE@E>
Today, fingerprint scanners

understand the science. After this,


fingerprint types exist are
together in these taking over from the ink
and roll
rare prints. method. Fingertips are scanned
electronically and added
to a
computer database. Prints

you’ll be ready to crack the case. retrieved from a crime scene


can be scanned, too. The
process
is fast, clean, and efficient.
2?FICJ

3P##&3: $"4&"/"-:4*4
Around 25%
of fingerprint
patterns are a
0E@HL<=<8KLI<J
$"4&"/"-:4*4 boxes
whorls.
6aai]Zeg^cihiV`ZcVii]Z
=daWgdd`<VaaZgn]VkZcdlW Fingerprint examiners look
ZZc at two
main features: bifurcatio
hXVccZYVcYVYYZYidi]Z
6;>H places where the ridges
ns (a) – the FDGLK<ID8K:?@E>
keep you updated YViVWVhZ#6;>Hl^aaVaZgii
deZgVidg^[^iadXViZhVbV
l^i]V`cdlcXg^b^cVa#Eg^c
]Z
iX] directions of the ridges
divide into
two – and the ridge endings
in the
(b). The
Automated fingerprint identifica
systems (AFIS) plot the features
crime scene fingerprint,
tion
of a
ih bifurcations and where and compare
on forensic tests d[Vaai]Z\VaaZgnZbeadnZZh
VgZWZ^c\hXVccZY!idd#

ridges begin
and end are noted. A fingerprin
expert will select a number
t
of these
them with the character
the fingerprints in their
istics of all
database.
These systems cannot come
I:?<J tiny details and then give up
relevant to the crime Only about 5%
of fingerprint
patterns are
expert opinion on whether
there is a match.
his or her
or not
b
with one perfect match,
a list of the closest ones.
but present
Fingerprint
experts then study the results
arches.
to confirm a match.
20_21_matching_prints.indd
20-21


4&$63*5:

4VTQFDU1SPGJMF

3:
F
4VTQFDU1SPGJM
&
Name: Jimmy 5SBDF&WJEFODF

#
O’Brien

#


0
en Age: 37 Traces of paint and glass analyzed
Name: Karoter

3
Sho guard at the gallery,
„ Securityunco nscious at the Name: Jimmy Traces of white paint were found on the
Age: 52 n
found
O’Brien lamp in the gallery. Tests show the paint
ler. Had bee g crime scene. came from the security camera on the
„ Art dea Finger:Index finger

SWJFX
the paintin Name:Karen
at 4:20pm he went ceiling, suggesting the lamp was used to

$ B
TF0WF
pursuing
for month
a wealthy
s on behalf
client.

at the gall
of

ery that
Shooter r
Finger:Index
finge
„ He sayskitch
to the
cup of tea, but
unattended for
en to make a
left the
a few
cup

went to the
knock the camera away.

No tool marks were found on the picture


frame. The painting was simply unclipped
.KL;PK?<
:8J<FM<IM@<N
„ Wasrno on, mee ting wit h
moments as he
from its frame.
afte ke the tea back
to ma bathroom. Took All the suspects’ shoes and clothing were
the director on the y but
r to the main galler and then examined for trace evidence. Microscopic
another offe e Mood. faint fragments of glass were found embedded
Blu started to feel ng more.
painting, can recall nothi in the shoes of two of the suspects –
w that collapsed. He
F records sho er
Jimmy O’Brien and Ed Kolowski.

4VTQFDU1SPGJM Here you’ll find the results


y
„ Police ntly und but ed at the galler
was rece
in stolen
artworks, „ Has only work ZNK
she
suspicion
of dealing
evidence
to prosecu
te.
for a few mont
hs
. U] JOJZZNK
not enough OYTUZKGY_  and has kept hims
elf
ZNOKZO LMK [ZUL
Name: Ed owski
Kol
there was KTG c Z]Uc QY [YH[Z
9KRROTMYZUR K_Gc K\Kc _LGSUZU
GIZY JUOZ
to himself. TMU OTM%
VGOT H[ORJ 4VTQFDU1SPGJMF of the investigation. Start
Age: 45 KYVKIOGRR_OLZN
NG\KZNKIUTZ ZNK
tor of the Hol
brook Name: Ed 9NUUZKX]U[RJ Name: Anna
„Direclery Kolowskifinger Berkhout
Gal .

„Spenent the
afternoon
with Finger: Index HOLBROOK GALL
ERY FLOOR PLAN Age: 23
„Art Student, works part
by reading the police
Shooter, from
Kar
il she left
3:30pm unt ained in his
at
e time as a receptionist at
the gallery.
Name: Anna
reports on the various
4:40pm. Rem pm when Berkhout
MAIN ENTRANCE

office unt
il 5:10 GALLERY 1
GALLERY 2
„Says she was at the Finger: Index finger
red the main RECEPTION
reception all afternoon.
he ente
gallery and e.
the crime
discovered
scen
kruptcy due
to his HALLWAY VGOTZOTM
The last group of visitors
left at 4:15pm, and noone
else left the building after
suspects. The answer to
verge of ban . OFFICE
YZURKT
„On the
extravagan
t lifestyle

=U[RJ1URU]
YZKGR
YQOc KGRR_TOLNK
K\K
WC KITCHEN LXUSNKXK
Karen Shooter at 4:40pm.
„Loves Holbrook’s work the crime is in the
TMGRRKc _ UTK_% and is critica wl of the
Lc USNOYU]R_TKKJKJZNKS
JKYVKc GZK
^i
5PYJDPMPHZ3FQPSU
Analysis of tea spills near body
of Jimmy O’Brien
director.
5TIKINGOTKJNKc YKRL
ZUGLGSU[YVGOTZOTM
forensic reports, but it’ll
Zc GLZKXOZ]GYYKZZUHK
'JOHFSQSJOU3FQ
PSU
lifted from
the lamp
in the Holbrook
Gallery
A@=:46?@E6D
The spilled tea found next to
body was analyzed and found
Jimmy O’Brien’s
to contain traces
of a sedative drug, easily available
over the
YURJZUGHOJJKXOT
GTUZNKXIU[TZc _ take all your detective
Fingerprint to all EYVXR]]VcjYRd`_]j`_Va`Z_e`W counter in most pharmacies.

four suspects
belonging
Fingerprints were found in the
only one set
gallery, but lamp used to
were
V_ecjgZReYVcVTVaeZ`_2]]eYV
hZ_U`hdhVcV]`T\VUR_UeYVcVhRd
_`dZX_`WeR^aVcZ_X
The level found was sufficient
deep sleep but were not enough
to induce a
to cause
skills to work it out. You
L found on
the
6XOTZUTMKc camera. serious harm.
VOQKJ =NUNGY
LO
OTJK^ GZZNK
LU[TJ TK
YIK
disable the

Compare
CCTV

the print
left, to
lifted from
those of the
%+"&=RdeXc`fa`WgZdZe`cd]VRgVdeYV
SfZ]UZ_XEYVaRZ_eZ_XZddeZ]]`_
eYVhR]]
=NUIU[R JNG\KYZN
ZNKZKG%.U]
JOJ K_
]U[RJSGQK
Zc GIKYZNGZ
ROTQZNKSZU
ZNKYIKTK%
can check your answer
the scene,
QTU]NK
who
to find out %+$!;Z^^j@Ä3cZV_eR\VdYZdeVRZ_e`
four suspects era. GI[V%
moved the
cam eYVXR]]Vcj
%+%!<RcV_DY``eVc]VRgVdeYVSfZ]UZ_X
on pages 70–1.
&+"!EYVTcZ^VdTV_VZdUZdT`gVcVUSj 3:18:54 pm
21/9/06 11:53:36
19/9/06
am
6U<`]`hd\Z

5)& 13*03*5*&4

$3*.&4$&/& „Ensure the crime scene is safe to enter.


Check that criminals have left the
scene, and carry out safety checks, such
as searching for suspicious packages.

„Provide emergency first aid to any


injured victims, but avoid washing or
removing clothing so as not to destroy
The wail of police sirens pierces the airwaves, a crowd possible evidence.
of bystanders surrounds the area, and the scene is
„Protect and secure the crime scene,
crawling with uniformed officers. A crime scene does and establish the crime-scene
boundaries, which should include
not remain as the criminals left it for long. In order to suspects’ likely entry and exit points.

minimize disturbance to the crime scene and preserve „Record evidence and take steps to
preserve any perishable evidence.
fragile evidence, it is vital that CSIs follow crime-scene
procedure in a methodical, systematic, and orderly way. „Start an evidence log—a list of
everybody who studies each piece of
evidence. Keep a record of everybody
who enters the crime scene.

„Identify witnesses for interviews.


„Document the whole procedure,
using notes, sketches, photographs,
and possibly videotape.

.<8C@E>K?<J:<E<
Depending on its size, a crime scene may
be cordoned off with crime-scene tape,
barricades, vehicles, or police officers.


P<N@KE<JJ
<M@;<E:<
Ideally, eyewitnesses
are interviewed right
away, while details of
the incident are still
/8B@E>:8I< fresh. If this is not
If there are injured people at a crime scene, possible, CSIs will
the first priority is to get them to a hospital. separate the witnesses
To avoid corrupting any evidence, a CSI will from each other
try to determine the suspect’s and the to prevent them from
victim’s entry and exit points and direct discussing the incident.
paramedics to a different route.

!@E><IK@GJ<8I:?
If the crime scene is small enough, CSIs may
carry out a fingertip search for evidence. Kneeling
shoulder-to-shoulder and moving forward together,
officers search the ground in front of them so that
every inch of the crime scene is examined. They wear
coveralls, surgical gloves, and masks to prevent
contamination from their own clothing or even from
their hair or skin particles. Other CSIs photograph,
video, and make notes about the crime scene.

$EK?<98>
Before any evidence is removed from the crime scene, it is
photographed, its location is recorded, and then it is
bagged, sealed, and labeled. Careful record-keeping helps
to show that evidence has not been tampered with.


'03&/4*$
1)050(3"1):
A photograph is said to be CFJ< LGJ
worth a thousand words, and Each item of evidence is
photographed in close-up
this is as true in forensic to produce detailed records.
photography as in any other Items are placed on a white
background for maximum
field. In a court of law, visibility, and a written
photographs of crime-scene record is kept of the camera
evidence are more reliable settings for each image.

than any written or verbal


statements could be. It is vital
to any criminal investigation
that a comprehensive visual
record of the crime scene is
made quickly, before it can
be altered, and meticulously,
for absolute accuracy.

5)&4&561
„Equipment for producing maximum
clarity includes a 35-mm camera.
Macro (magnifying) lenses are used
for close-ups.

„White paper makes a plain


background, to capture more details.

„Scale comparison is used to measure


the object and record its true size.

„Tripod keeps the camera steady and


at right angles to the object.

„Flash and floodlights are used for


capturing greatest detail.

$EGFJ@K@FE
Each piece of evidence is first photographed in
the place it was found. Here, a CSI photographs a
gun against an evidence marker, so that the gun’s
exact location is recorded.

(<8JLI@E>K?<<M@;<E:<
In order to record the size of objects,
each piece of evidence is photographed
against a photographic scale. If a scale
is not available, familiar items, such as
keys, can give an estimate.

!@CD@E>K?<J:<E<
Video footage of the crime scene might
be used to brief other investigators, so
fewer people need to enter the scene.
The footage may also be produced in a
trial to show jurors the crime scene.

'@>?K@E>LGK?<
<M@;<E:<
It is especially important
that clear photographs
are taken of evidence
that cannot be removed
or might be destroyed.
Floodlights have been
used to illuminate
these tire tracks to
show greater detail.


$0--&$5*/(&7*%&/$&
CSIs usually have just one opportunity to search a crime scene, !8JK<M@;<E:<
so there is no room for error. Quick decisions must At a serious crime scene,
CSIs mark out key
be made about exactly what constitutes useful evidence. evidence with yellow
This becomes more difficult as the field of forensic science letter cards. Crime scenes
in public places have to
widens. Incredibly, even smells can now be packaged be searched quickly so
and labeled as evidence. that they can be returned
to public access.

130$&%63&
„Prevent contamination. Searchers
wear coveralls and surgical gloves to
stop clothing fibers or the searcher’s
own genetic material from mixing
with any evidence found.

„Assess appropriate search type.


Depending on the crime and the
size and layout of the scene, CSIs
may carry out a fingertip or on-foot
search, and may use tracker dogs.

„Mark key evidence. Numbered or


lettered yellow markers are used
to map the location of key pieces
of evidence.


/I8:B<I;F>J
Dogs are trained to sniff
out explosives, illegal
drugs, missing people,
and corpses. Here, an
officer uses a metal .N899@E>
probe to assist an Tiny spots of suspicious fluids are removed
underground search. from a crime scene by swabbing. The swabs are
He sticks it into the taken by an investigator wearing disposable
ground and offers it gloves to prevent contamination.
to the dog to smell
the escaping odors.

.:<EKJ:@<E:<
A forensic officer uses a
device called a Scent
Transfer Unit to transmit
the human smell from a
gun onto a sterile gauze
pad. The pad might then
be used by dogs to sniff
out a suspect, or kept
in a scent bank to be 1@IKL8C:I@D<J:<E<
used as evidence. In murder cases the bullet trajectory, or
flight path, can be plotted on a 3-D
computer model of the crime scene to show
investigators where the killer was standing.

:063&7*%&/$&$0--&$5*0/,*5
/FGLKKF><K?<IPFLIFNE<M@;<E:< .<8C89C<98>J
:FCC<:K@FEB@K K8B<K?<@K<DJ=IFDK?< Important for preserving
small pieces of evidence,
A8:B<KF=K?@J9FFB8E;=@E;K?<FK?<I such as fibers or hair.
@K<DJ=IFD8IFLE;PFLI?FLJ<
-<D<D9<I PFLJ?FLC;8CN8PJ  /N<<Q<IJ
CF>PFLI<M@;<E:<:8I<=LCCP Useful for collecting pieces
JF=@E;8G<E8E;G8;F=
$EBG8;  of trace evidence, such
Your vital fingerprinting tool. as carpet fibers.
G8G<I=@IJK Use with the paper pad to
record suspects’ prints.
(8>E@=P@E>>C8JJ
This can be used to search +8G<IG8; /8G<D<8JLI<
for trace evidence and to For recording fingerprints. So that you can keep a
examine fingerprints Always write down the note of the size of pieces
and other marks. suspect’s name at the top. of evidence.




30 ##& 3: MZTJT
OFB OB
S JNFTDF
$ You are called to the scene
of a robbery at the Holbrook Gallery.
The gallery is housed in the former apartment
of 1960s pop-art painter and art collector
Stefan Holbrook, and it displays his own
paintings and his personal collection of art
objects. The gallery’s security officer lies
unconscious on the floor, and one of the
most valuable Holbrook paintings, Blue
Mood, is missing. Look at the items that
CSIs have selected for forensic analysis
below, and read up on the tests that will
be performed back at the lab. Meanwhile,
the police are conducting inquiries. Follow
the investigation, then turn to pages 26–7
for the police reports and forensic results.
Examine them carefully and see if you can
uncover the art thief.

.LJG<:KC@HL@;
2?FJ<=@E><IGI@EKJ A hot drink is spilled
In the gallery, CSIs are dusting those on the floor beside the
items that the thief may have touched. unconscious security guard.
Fingerprint examiners will record the Could he have been
prints of the security guard as well as drugged? A sample will be
those of everyone else who works in the taken to the lab so a
gallery. See pages 18–21 to find out toxicologist can run tests.
how investigators recover and To find out about toxicology,
match fingerprints. turn to pages 22–3.


/1
The closed-circuit television
camera has been immobilized. It
has been knocked to point up at
the ceiling, so it has not recorded
the robbery. How did the criminal
reach the camera to do this?

+@:KLI<=I8D<
The empty picture frame will be
carefully examined to find out
how the painting was removed. If
tool marks or cuts are found,
these could be used as evidence.
Turn to pages 34–5 to read about
tool marks.

/I8:<JF=>C8JJ
Broken glass from the picture
/ !$'
frame litters the sofa and floor. In 1911, Leonardo da Vinci’s Mona Lisa was
If glass fragments are found on a stolen from the Louvre in Paris. One of the
suspect’s clothes or shoes, they gallery’s employees had simply walked out
could be matched with these
with the masterpiece under his coat. Two
crime-scene shards to prove
they were at the scene. Read years later, the painting was recovered. The
about trace evidence thief claimed he wanted to return it to Italy.
on pages 24–5.

'PSFOTJD"OBMZTJT

3&$07&3*/('*/(&313*/54
Every person on the planet has different patterns on their fingertips—
even identical twins. These patterns are evidence of our unique
identities, and every time we touch a surface we leave some of this
evidence behind, in the form of fingerprints. When criminals leave
their fingerprints at a crime scene, the prints are often invisible, or
latent. Investigators use a range of techniques to recover them.

CLD@ELDGFN;<I
LJK@E>=FI=@E><IGI@EKJ The investigator dusts the
Fingerprints left on shiny surfaces, such suspect area with aluminum
powder using a brush. The
as glass, are the easiest to recover. These
powder sticks to moisture left
surfaces are nonporous, which means they by sweat from the skin’s ridges,
do not absorb moisture. The sweat or making the prints visible.
grease that our fingers leave behind
stays on the surface, and can
usually be revealed fairly
easily using powders.

+IFK<:K@E><M@;<E:<
Investigators always wear
latex gloves to prevent
contamination from their
own fingerprints. '@=K@E>=@E><IGI@EKJ
The investigator carefully lifts
the print with adhesive tape.
The print is then mounted onto
a transparent sheet so that it
can be preserved as evidence.


3P##&3: $"4&"/"-:4*4

6ii]Z=daWgdd`<VaaZgn!8H>hVgZ
Wjhna^[i^c\[^c\Zgeg^cih#
6aai]Zhjg[VXZhVgZcdcedgdjh!
VcYVajb^cjbedlYZg^hjhZY
^cbdhiVgZVh#6a^\]i"XdadgZY
edlYZg^hVeea^ZYidgZkZVa
bd^hijgZdci]ZYVg`Zghjg[VXZh!
hjX]Vhi]ZhiVcY^c\aVbe#

.LG<I>CL<=LD@E>
Small items can easily be removed from the crime
scene and taken to the laboratory, where different
treatments can be used to reveal latent fingerprints.
One of these is called superglue fuming. The suspect
object is placed in an airtight container, and fans inside
it circulate superglue fumes. The glue vapor sticks to
the sweat left by fingers, making it visible.

.G<:@8C@CCLD@E8K@FE
3&7&"-*/('*/(&313*/54 After superglue fuming, chemicals are
applied to make the fingerprints glow
$EM<JK@>8KFIJLJ<8CLD@ELDGFN;<IKF;LJK=FIGI@EKJ when certain lights, such as ultraviolet
FEEFEGFIFLJJLI=8:<J 9LKPFL:8ELJ<:F:F8GFN;<I (UV), are shone on them. This improves
KF;F8J@D@C8I8:K@M@KP8K?FD< contrast and enhances the print.
1
4FLN@CCE<<;cocoa powder „ mug or drinking glass
„ small, clean paintbrush „ transparent tape
„ light-colored paper or posterboard
 !@IJK D8B<8=@E><IGI@EKon a shiny surface, such
as a mug or glass. You will get a clearer fingerprint
when more body oils are present, so rub your finger
along your nose or through your hair first.
 '@>?KCPJGI@EBC<K?<:F:F8GFN;<Iover the
2
fingerprint. Then gently blow or brush the loose
powders away, using a soft, clean paintbrush.
 '@=KK?<GI@EK=IFDK?<DL>by placing the sticky
side of a piece of tape on the dusted print and then
carefully lifting up the tape. Stick the piece of tape '8J<I9<8D
onto a sheet of white paper. Laser light is sometimes used for
revealing prints previously treated
N.B. To lift prints from dark surfaces, use talcum
3 powder and stick the print onto dark paper.
with a fluorescent powder. Laser light
is particularly useful for revealing
old fingerprints.

'PSFOTJD"OBMZTJT

."5$)*/(13*/54
Fingerprints have been used to identify suspects for more than a
hundred years. But matching prints was a skilled and time-consuming
task, which became longer and more difficult still as collections of
fingerprints grew. In 1975, the first automated fingerprint
identification system (AFIS) revolutionized fingerprint matching.
Today, AFIS can search and compare a million records every second.

!@E><IGI@EKKPG<J
Fingerprints are classified by their
basic pattern, of which there are
four: whorls, loops, arches, and
combinations. Each type is then 'FFGJ
Loops are the most
broken down into further groups common pattern, making
according to tiny details, such as up about 60–70% of
the number and direction of ridges. all fingerprints.

FD9@E8K@FEFI:FDGFJ@K<
Characteristics of the other
fingerprint types exist
together in these
rare prints.

2?FICJ
Around 25%
of fingerprint

3P##&3: $"4&"/"-:4*4
patterns are
whorls.

6aai]Zeg^cihiV`ZcVii]Z
=daWgdd`<VaaZgn]VkZcdlWZZc
hXVccZYVcYVYYZYidi]Z6;>H
YViVWVhZ#6;>Hl^aaVaZgii]Z
deZgVidg^[^iadXViZhVbViX]
l^i]V`cdlcXg^b^cVa#Eg^cih
d[Vaai]Z\VaaZgnZbeadnZZh
I:?<J
VgZWZ^c\hXVccZY!idd# Only about 5%
of fingerprint
patterns are
arches.

3&$03%'*/(&313*/54
4FL:8EG<I=FID8E@EB8E;IFCCLJ@E>K?<@K<DJ
=FLE;FEK?<A8:B<KF=K?@J9FFB
4FLN@CCE<<;ink pad • fingerprint record pad
• magnifying glass
 +I<JJK?<=@E><IK@G@EKFK?<@EB rolling from
1
one side to the other so that it is evenly coated.
 +I<JJ8E;IFCCK?<=@E><IK@Gin the same way
onto a sheet from your fingerprint record pad.
Make prints of the index fingers of everyone in
$EB8E;IFCC your family in this way, so you end up with
The traditional, universal method prints on several sheets. Don’t forget to write
the person’s name at the top of each sheet.
2
of taking fingerprints is called “ink
and roll.” The suspect’s fingertips are  O8D@E<K?<GI@EKJ:8I<=LCCPusing your
rolled in black ink from one side of magnifying glass. How many of the four types
the nail to the other. The ink-covered can you identify? If you have two fingerprints
fingertips are then rolled on a white of the same type, can you see differences
chart to produce prints. between them? Note down your results next to
each fingerprint.
3

!@E><IGI@EKJ:8EE@E>
Today, fingerprint scanners are
taking over from the ink-and-roll
method. Fingertips are scanned
electronically and added to a
computer database. Prints
retrieved from a crime scene
can be scanned, too. The process
is fast, clean, and efficient.

a
0E@HL<=<8KLI<J
Fingerprint examiners look at two FDGLK<ID8K:?@E>
main features: bifurcations (a)—the Automated fingerprint identification
places where the ridges divide into systems (AFIS) plot the features of a
two—and the ridge endings (b). The crime-scene fingerprint and compare
directions of the ridges in the them with the characteristics of all
bifurcations and where ridges begin the fingerprints in their database.
and end are noted. A fingerprint These systems cannot come up
expert will select a number of these with one perfect match, but present
tiny details and then give his or her a list of the closest ones. Fingerprint
expert opinion on whether or not b experts then study the results
there is a match. to confirm a match.

'PSFOTJD"OBMZTJT

509*$0-0(: 3P##&3: $"4&"/"-:4*4

6hVbeaZd[i]Zhe^aaZYiZV
[gdbi]Z=daWgdd`<VaaZgn^h
The human body retains traces of cdlVlV^i^c\VcVanh^hVii]Z
everything that is ingested, sometimes idm^Xdad\naVW#6c^bbjcdVhhVn
for months afterward. Toxicologists iZhil^aaWZXVgg^ZYdjiVcY!
^[edh^i^kZ![jgi]ZgiZhihl^aa
are trained to find and analyze these ZhiVWa^h]i]ZcVijgZd[i]Z
traces, in order to identify athletes Ygj\dged^hdcegZhZci#
using performance-enhancing drugs,
illegal drug users, or, more rarely,
victims of poisoning. A snip of hair, a
drop of blood, a deep breath—all can
reveal chemical abuse.

/<JK@E>?8@I
Here, a technician prepares a sample of
hair for drug testing in a toxicology lab.
Traces of chemicals from drugs and poisons are
stored in the hair shaft, and they stay in a
fixed position as the hair grows. So, long
hair cut from the scalp can contain a
timeline of drug history.

'F:BF=?8@I
The hair is taped to 1@8CJ
a record sheet on which Each hair sample
the suspected drug user’s is placed into a vial.
details are recorded. A solvent is then added
to draw out any
drug extracts.

#8@IJ8DGC<
The hair is cut into
1
/3-inch (1-cm) pieces
to make a calendar
of drug use.


IL>K<JK (<8JLI@E>HL8EK@K@<J
The simplest, most common Two machines linked together—a
drug test is usually carried out gas chromatograph and a mass
on blood or urine with an spectrometer (GC/MS)—measure
immunoassay kit. If drugs or exact quantities of drugs or poisons
poisons are present, the sample present. Liquid samples are inserted
changes color when mixed and the results appear as a series of
with the kit’s chemicals. colored peaks on a screen.

5&45$)&.*$"-$)"3"$5&3*45*$4
JB8E8;LCKKF9F@C /F@;<EK@=P8ELEBEFNEJL9JK8E:< =FI<EJ@:J:@<EK@JKJ CFN?<I<
K?<I<;:8998>< G<I=FIDD8EPK<JKJ *E<@JKFK<JK=FI:?<D@:8C The most common toxicological test
:?8I8:K<I@JK@:JTN?<K?<I8JL9JK8E:<@J8:@;FI8CB8C@E< measures a legal drug, alcohol, and
1 #<I< :8998><N8K<I@JLJ<;8J8:?<D@:8C@E;@:8KFI8:@; is carried out at the side of the road.
N@CCKLIE@KI<; 8CB8C@E<JKLIE@KGLIGC< The breathalyzer measures the
amount of alcohol in drivers’ breath.
4FLN@CCE<<;a saucepan „ a colander „ a pitcher
„some clean water „ 2 red cabbage leaves „ 3 tablespoons
(45 ml) lemon juice „ 3 tablespoons (45 ml) vinegar
„ 1 tablespoon (15 ml) baking soda

2  !@CC8J8L:<G8Ewith 1½ quarts (1.5 liters) of water. Tear


the cabbage leaves into small pieces and add them to the
pan. Ask an adult to boil the water for 5 minutes, then
allow to cool for half an hour and strain into a pitcher.

 /8B<K?I<<>C8JJKLD9C<IJand label them from


1 to 3. Divide the cabbage water equally between the
three tumblers.
3  ;;K?<C<DFEAL@:<to jar 1, the vinegar to jar 2, and
?<D@:8C8KK8:B
the baking soda to jar 3. Note down the color that each Poison attacks carried out by
substance turns the cabbage water. Now you can tell terrorists in order to kill and cause
which substance is acid and which is alkaline. panic are a real threat. In 1995, a
nerve gas attack on Tokyo’s subway
killed 12 and injured thousands.

'PSFOTJD"OBMZTJT

53"$&&7*%&/$&
Locard’s exchange principle—“every contact leaves a trace”—is the
idea behind trace evidence. At a crime scene, there will be traces of
the criminal, and the fleeing criminal will unwittingly carry away
traces of evidence from the scene. Tiny particles, such as hairs,
clothing fibers, flecks of paint, or soil, can link a suspect to a crime
scene and may even enable police to nail a criminal.

/I8:B@E>KI8:<J
A criminal always leaves some
trace evidence at a crime
scene. Investigators have to
be especially vigilant to /<CC K8C<?8@I
find the tiny specks and A strand of hair can be used
fragments that could to link a suspect to the
be vital evidence. scene, if the color can be
matched. If the hair root is
present, DNA could be
extracted. Many criminals
wear hats to keep from
leaving hairs at the scene.

.?<;;@E><M@;<E:<
Our clothing sheds tiny
fibers all the time. To find a
match between a crime
scene and a suspect sample,
experts examine minute
details such as the diameter
and shape of each fiber, the
shape of the weave and the
number of fibers it contains,
and the type of dye used.

.?F<KI8:<J
Footprints left at a crime scene can
add to evidence against a suspect.
A shoe sole containing traces of
carpet fiber or flecks of paint that
match those at the crime scene is
much more incriminating.


+8@EKC8P<IJ
Vehicle paintwork
is often applied in
three layers, and
police keep databases
of manufacturers’
compositions and color
ranges. A link can be
made if a crime-scene
and suspect sample
have identical layers.
FCC<:K@E>KI8:<J
Wearing gloves to prevent contamination,
CSIs use a suction device, much like a tiny
household vacuum cleaner, to collect hair
and fiber trace evidence. The material is
sucked onto a filter paper, which is then
placed in a sealed, labeled plastic bag ready
for analysis in the lab. If hairs and fibers
are concentrated in a small area, CSIs may
lift them with tape.

8)&3&)"4"4641&$5#&&/ C<:KIFED@:IFJ:FG<
Sometimes, objects are removed to
the lab for analysis. Experts examine
/?@J8:K@M@KPJ?FNJ?FNPFLD@>?K9<89C<KF traces under an electron microscope
1 =@E;FLKN?<I<8JLJG<:K?8J9<<E9P8E8CPQ@E> to identify them and study their
J<<;JFEK?<@IJ?F<J8E;:CFK?<J surface detail. Here, a researcher
4FLN@CCE<<; an old pair of socks „ tweezers examines traces of powder on
clothing. Electron microscopes can
„ white paper „ magnifying glass
reveal details 10,000 times smaller
 +LK8EFC;G8@IF=JF:BJover your shoes and than a hair’s breadth.
walk around your yard, or ask an adult to go
with you to the local park. Back at home, pick

3P##&3:
off any seeds stuck to your socks with tweezers
and put them onto a piece of white paper. $"4&"/"-:4*4
 O8D@E<K?<J<<;JN@K? your magnifying
2
glass and sort them into types. How many >ci]ZaVW![dgZch^XZmeZgih
different types are there? Can you VgZZmVb^c^c\i]ZXadi]^c\
identify which plants they came
ldgcWni]Z=daWgdd`<VaaZgnÉh
from? Ask an adult to help you, or
ZbeadnZZhdci]ZYVnd[i]Z
plant the seeds in soil-filled pots to
see what plants sprout.
gdWWZgn#6cn[gV\bZcihd[
\aVhh^ci]ZhZVbhd[V_VX`Zi
dgi]ZhdaZhd[Vh]dZXdjaYWZ
^cXg^b^cVi^c\Zk^YZcXZ#


30 ##& 3: 4VTQFDU1SPGJMF
Name: Karen
Shooter
Age: 52

 0WF S WJ FX Had been


„ Art dealer.the painting
F
BT
pursuing

$
Name:Karen
of
for months on behalf Shooter
a wealthy client. Finger:Index finger

llery that
„ Was at the ga
meeting with
afternoon,
the director to make
another offer on the
painting, Blue Mood.
4VTQFDU1SPGJMF show that
„ Police recordens tly under
she was rec but
Name: Ed suspicion of de aling in stolen artworks,
Kolowski evide nce to prosecute.
there was not enough
Age: 45
9KRROTMYZURKTGc Z]Uc QYOYT UZKGY_
„Director of the Holbrook Name:
GSU[YH[Z
KYVKIOGRR_OLZNK_Gc K\Kc _LGIZ
Ed YZUJUOZ
Gallery. Kolowski 9NUUZKX]U[RJNG\KZNKIUTZ
ernoon with Finger:Index finger
„Spent the aftter, from
Karen Shoo
3:30 pm until she left at
4:40 pm. Remained in his
e
office until 5:10 pm when
he entered the main
gallery and discovered
the crime scene.
of bankruptcy due to his
„On the verge
extravagant lifestyle.
KGRR_YZKGR
=U[RJ1URU]YQOc_
c K\KTOLN
K
Lc USNOYU]TMGRRKKJ NKSUT K_%
JKYVKc GZKR_TKKJ Z

'JOHFSQSJOU3FQPSU c
ry
p in the Holbrook Galle
Fingerprint lifted from the lam
A@=:46?@E6
D
g to all
Fingerprints belongin EYVXR]]VcjYRd
`_]j`_Va`Z_e
nd in the
four suspects were fou V_ecjgZReYVc `W
was VTVaeZ`_2]]eY
6XOTZUL c bu t on ly on e set
gallery, hZ_U`hdhVcV]` V
p use d to T\VUR_UeYVcV
MK found on the lam
OTJK^LOT
ZZN K dis abl e the CC TV cam era. _`dZX_`WeR^aV
cZ_X
hRd
LU[TJG K %+"&=RdeXc`fa
YIKT Compare the print lift
ed from `WgZdZe`cd]VRg
VdeYV
lef t, to tho se of the SfZ]UZ_XEYVaRZ
the sce ne, _eZ_XZddeZ]]`_
to fin d ou t who eYVhR]]
four suspects
moved the camera. %+$!;Z^^j@Ä3
cZV_eR\VdYZdeV
eYVXR]]Vcj RZ_e`
%+%!<RcV_DY`
`eVc]VRgVdeYV
&+"!EYVTcZ^V SfZ]UZ_X
dTV_VZdUZdT`gV
6U<`]`hd\Z cVUSj
4VTQFDU1SPGJMF 4&$63*5:

Name: Jimmy
O’Brien
Age: 37 5SBDF&WJEFODF
„ Security guard at the gallery, Traces of paint and gla
ss analyzed
found unconscious at the Name:
crime scene.
Jimmy
O’Brien Traces of white paint wer
e found on the
„ He says at 4:20 pm he went Finger:Index finger lamp in the gallery. Tests
came from the security
show the paint
to the kitchen to make a camera on the
ceiling, suggesting the lam
cup of tea, but left the cup knock the camera away.
p was used to
unattended for a few
moments as he went to the No tool marks were fou
nd on the picture
bathroom. Took the tea back frame. The painting was
simply unclipped
from its frame.
to the main gallery but
started to feel faint and then All the suspects’ shoes and
clothing were
collapsed. He can recall nothing more. examined for trace evid
ence. Microscopic
fragments of glass were
found embedded
„ Has only worked at the gallery in the shoes of two of the
suspects—
for a few months ZNK Jimmy O’Brien and Ed Kol
.U]JOMJ
owski.
and has kept himself ZNK
to himself. ZNOKL TMKZU[ZUL
VGOTZOH[ORJOTM% 4VTQFDU1SPGJMF
ZNK
Name: Anna
HOLBROOK GALLERY FLOOR PLAN Berkhout
Age: 23
„Art Student, works part-
time as a receptio
MAIN ENTRANCE

nist at
RECEPTION GALLERY 1 GALLERY 2
the gallery. Name:
Anna
„Says she was at the Berkhout
reception all aftern Finger:
oon. Index finger
HALLWAY The last group of
visitors
OFFICE VGOTZOTM left at 4:15 pm, an
d no one
WC KITCHEN YZURKT else left the buildin
g after
LXUSNKXK Karen Shooter at
4:40 pm.
„Loves Holbrook’s work
5PYJDPMPHZ3FQPSU and is critical of th
e
director.
Analysis of tea spills near body of Jimm
y O’Brien 5TIKINGOTKJNKc YKRL
ZUGLGSU[YVGOTZOTM
The spilled tea found next to Jimmy O’Brie GLZKXOZ]GYYKZZUHK
n’s
body was analyzed and found to contain
traces
YURJZUGHOJJKXOT
of a sedative drug, easily available over the GTUZNKXIU[TZc _
counter in most pharmacies.

The level found was sufficient to induce


a deep sleep but was not enough to cause
serious harm.

=NUIU[RJNG\KYVOQKJ =NU
ZNKZKG%.U]JOJZNK_ Zc GIKYZNNGGYZ
QTU]NK]U[RJSGQK ROTQZNKS
GI[V% ZNKYIKTK% ZU
9/U2WARE(OU
IN&,AMESIFSEYOISGINGUP
UDN³T
 /


" 3 40 OFB OB MZTJT


S JNFTDF
$ A late night phone call
informs you of a suspicious fire at
the Glad Rags Clothing Company’s warehouse.
Luckily, a passerby saw the flames and called
the fire department before too much damage
was caused. CSIs arrived on the scene early
the next morning and have identified some
suspicious items for analysis by forensics.
It looks as though the fire was started
deliberately. Take a look at the items, below,
and see if you agree. You’ll need to read up
on the relevant forensic tests to see what
these clues might reveal. As forensic tests are
carried out, the police will be interviewing all
those connected with the warehouse, as well
as the passerby. The results appear on pages
38–9. Check them out and see if you can
identify the arsonist.

!FI:<;<EKIP
The lock on the door
has been broken with
a crowbar or other
large tool. The damage
to the door frame
might tell investigators
what kind of tool was used.
Find out how on pages 34–5.

!@I<JK8IK<I
A cigar has been lit
(L;;PJ?F<GI@EKJ and discarded on the
A clearly visible shoeprint floor, close to the seat,
could be an important or origin, of the fire.
piece of evidence if Could it have been used to
it can be matched start the blaze? Could it prove
to a suspect’s shoe. a link with any of the suspects?
See pages 34–5 for Turn to pages 32–3 to find out
more about shoeprints. about investigating fires.
FDGLK<I?8I;;I@M<
The computer is to be removed
immediately, and its hard drive
examined by forensic experts. It
could hold clues to a possible
motive. See pages 36–7 to find
out about computer forensics.

+F@JFEG<EC<KK<I
A letter threatening arson lies on
the desk, undamaged by the fire.
The handwriting will be analyzed
and compared with that of any
suspects. Turn to pages 36–7 to
read about document forensics.

::<C<I8EK / !$'
Investigators have identified
the seat, or origin, of the fire. In 2004, a devastating fire tore through
They will test the air around the a London warehouse containing priceless
seat for traces of gasoline or other works of modern art. The blaze was so
accelerants. Samples of partly
destructive that experts claimed it was
burned clothing and furniture will
be taken to the lab for analysis. impossible to tell whether the fire was
Go to pages 32–3 to read about accidental or incendiary (deliberate).
the techniques used.

'PSFOTJD"OBMZTJT

'*3&4"/%#0.##-"454
When a fire rips through a building or a bomb blast tears it apart, the
crime scene will be severely damaged. Efforts to extinguish the flames
may make matters worse, leaving just a charred wreck for the forensic
investigators. But even the most fire-damaged building is likely to
contain clues. After an explosion, bomb fragments and traces of
explosives can help investigators trace the culprits.

!@>?K@E>K?<=C8D<J
Firefighters’ first priority is, of
course, to save lives, but their
second is incident stabilization—
to preserve the crime scene as
much as possible.
8E@E<;<K<:KFI
Over the last decades, arson
investigators have started
using trained sniffer dogs
to detect accelerants.

/FFCJF=K?<KI8;<
Fire investigators’ equipment
helps them negotiate unsafe "8J O8E;:?8@EJ8N
buildings and remove evidence. 8E8CPJ@JB@K An ax is used to remove
This device is used to parts of structures inside
!C8J?C@>?K detect the presence of fire-damaged buildings for
In a fire-damaged building, accelerant at the scene. examination elsewhere.
usually unsafe and Crystals inside the tube Chainsaws may be used
without lighting, the change color when traces to remove flooring soaked
simple flashlight is of accelerant are present in in accelerant, for analysis
an essential tool. the air drawn through it. back in the lab.


.@=K@E>K?IFL>?:?8II<;I<D8@EJ
To investigate a fire, patterns of soot are
followed to their origin, or “seat.” Accidental
fires usually start in one place, so more than
one seat is suspicious. Once the seat is located,
investigators look for traces of accelerant.

"S TPO $"4&"/"-:4*4

6ii]ZXg^bZhXZcZ!8H>hYZYjXZY
i]Vii]Z[^gZlVhegdWVWan
^cXZcY^VgnYZa^WZgViZ#>ci]Z
VgZVl]ZgZi]Z[^gZhiVgiZY! !FI<EJ@:8E8CPJ@J
i]Zn[djcYVeVgianWjgcZY Remains suspected of containing
X^\Vg!Va^`Zan^cXZcY^VgnYZk^XZ# accelerants are taken to the lab in
I]ZnVahdhjheZXii]ViVc sealed glass jars. There, scientists
VXXZaZgVci]VhWZZcjhZY# detect any accelerants using a
technique called mass spectrometry,
which identifies chemicals by
the mass of their molecules.

.",&"'*3&&95*/(6*4)&3
1 !@I<E<<;JK?I<<K?@E>J@EFI;<IKF9LIET?<8K =L<C
8E;FOP><E 8I9FE;@FO@;<@JDFI<;<EJ<K?8E
FOP><E D<8E@E>K?@E>J:8EXK9LIE@E@K /?@JD8B<J
@K8E@;<8CD8K<I@8C=FI8=@I<<OK@E>L@J?<I
4FLN@CCE<<;small candle „ shallow bowl „ match
„ bottle „ bicarbonate of soda „ vinegar
 +C8:<K?<:8E;C<@EKFK?<J?8CCFN9FNCand
2
carefully light the wick. Mix the ingredients for
your fire extinguisher by pouring the bicarbonate
of soda into a bottle, followed by some vinegar.
 /?<D@OKLI<N@CC=@QQand give off carbon
dioxide, an invisible gas. Make sure you cover
the bottle with your thumb to hold in the
3 carbon dioxide gas. E8KFDPF=89FD9
 /F<OK@E>L@J?K?<=C8D< carefully Members of the Irish Republican
bring the open end of the bottle over Army made this bomb with
the burning candle and remove your batteries, lighter fuel, and a
thumb. The dense carbon dioxide circuit board. Fragments of bomb
gas sweeps away the oxygen, JB8E8;LCKKF components, collected after an
putting out the fire. JLG<IM@J<8JPFL
explosion, can sometimes be
C@>?KK?<:8E;C<
traced to their source.

'PSFOTJD"OBMZTJT

53"$,4
"/%."3,4
Most criminals take precautions to avoid
detection. They might wear gloves so
they don’t leave fingerprints, masks to
cover their faces, and hats to avoid
shedding hairs. But the shoes criminals
wear, the tools they use, and their
/@I<KI8:BJ getaway vehicles can all leave distinctive
In a rural area, a getaway car fleeing marks at the crime scene. These marks
from the crime scene is likely to leave
tire tracks. By measuring the distance are clues that forensic investigators
between the two lines of tracks and are sometimes able to turn into
the width of each tread mark,
investigators can tell what type of
hard evidence.
vehicle the tracks came from.

/@I<:8JK
A cast of tire tracks might be made
after they have been photographed.
If the tires are worn, they will
produce unique marks, which will
show up clearly on the cast.

/FFCD8IBJ
Damage to a window frame
by a burglar’s screwdriver
may not seem like
important evidence. But
differences in the
manufacturing process
and wear from use mean
that no two tools are
alike, so they all leave
different impressions. 2<8I8E;K<8I
Casts can be made of tool The same scuffs and marks have been
marks (usually in the lab), identified on this crime-scene print
making comparisons with (right), and a suspect’s shoe sole (left). To
suspect tools easier. prove a link, investigators must find the
same marks of wear and tear on both.

"S TPO $"4&"/"-:4*4


.?F<;8K898J<
Records of crime-scene
I]ZiddabVg`hdci]ZYddg shoeprints and of
[gVbZVgZVcVanoZY[dgjc^fjZ manufacturers’ sole
bVg`h!VcYi]ZbjYYnh]dZeg^ci styles are stored on
^he]did\gVe]ZYVcYhXVccZY databases, allowing
^cidi]Zh]dZYViVWVhZ#CdbViX] investigators to identify
l^i]di]ZgXg^bZ"hXZcZeg^cih shoe styles and to
^h[djcY!Wjii]Zeg^cibVnhi^aa match prints found at
bViX]dcZd[i]ZhjheZXihÉh]dZh# crime scenes to those of
known criminals.

.",&"$"450':0634)0&13*/5
$EM<JK@>8KFIJD8B<:8JKJF=J?F<GI@EKJC<=K8K8:I@D<  (@OK?<GC8JK<IF=+8I@Jwith
J:<E<@EFI;<IKFJKL;PK?<LE@HL<D8IBJK?8KD@>?K water according to the
C<8;KF8JLJG<:K /?@J8:K@M@KPJ?FNJPFL?FNKFD8B< instructions and pour over the
8:8JKF=PFLIFNEJ?F<GI@EK LJ@E>GC8JK<IF=+8I@J shoeprint. Leave the plaster to
dry for about one hour.
4FLN@CCE<<;a well-worn sneaker 2
1
„ plaster of Paris „ water  /8B<K?<:8JKFLKand bring
„ an old shoe box with the it indoors. Leave it to harden
bottom cut out „ soft soil overnight on a piece of
„ brush „ magnifying glass newspaper. Brush the loose soil
3
off and look at your cast using
 !@IJKD8B<8=FFKGI@EKin your magnifying glass. Can you
the soil, wearing your old identify any unique marks?
sneaker. Surround it with the Make casts of friends’ prints
bottomless shoe box. and compare them.

8EB@E>=I8L;
Here, fraud squad officers study a
bank’s computer records. Siphoning
off tiny amounts of money from
thousands of bank accounts, known as
the “one-half-cent crime,” has
become a popular banking fraud.

::<JJ@E>K?<D<DFIP98EB
A computer’s hard drive is its memory.
All the data composed on the computer,
including material that has been deleted,
is stored there, at least temporarily. When
a computer is seized, investigators make a
copy of the hard drive in order to avoid
corrupting the original.

'PSFOTJD"OBMZTJT

$0.165&3"/%
%0$6.&/5'03&/4*$4
From bank fraud to hacking, the massive increase in computer use means
that many crimes are now committed in cyberspace. Criminals planning a
conventional crime are likely to use computers, too. Computer forensics is
a new science combatting computer-related crime. Document examiners
have also been extending their expertise—literary forensics is another field
that is opening up in the fight against crime.

.",&"$)30."50(3"1):5&45
?IFD8KF>I8G?P@J8K<:?E@HL<LJ<;9PJ:@<EK@JKJ  KK8:?<8:?JKI@GKF8>C8JJso that the bottom of the
KFJ<G8I8K<K?<:FDGFE<EKJF=8D@OKLI< $K:8E?<CG strip touches the water. The water should not quite reach
@EM<JK@>8KFIJKF@;<EK@=P;@==<I<EK@EBJ 9<:8LJ<<M<E the circle you’ve drawn. Watch as the water creeps up the
@EBJF=K?<J8D<:FCFI8I<D8;<LGF=;@==<I<EK paper strip and reaches the top.
HL8EK@K@<JF=:FCFI<;G@>D<EKJ  /8B<K?<JKI@GJFLKF=K?<N8K<I and place them on
a piece of paper towel. You will see that the ink colors
4FLN@CCE<<;coffee filter paper cut into strips have separated into different patterns, called
1 inch (2–3 cm) wide „ three water-soluble felt-tipped chromatography patterns.
pens „ three glasses or jars containing about
1
/3 inch (1 cm) of tap water „ paperclips
„ pencil „ a piece of paper towel
 FCFI8:@I:C<½ inch (1–2 cm) from
the end of one of the coffee filter strips.
For each pen, take a new coffee filter
strip and color another circle.

"S TPO $"4&"/"-:4*4


<

3&"- '@K<I8IP8E8CPJ@J
<

Handwriting experts assess


whether two documents, such as
I]Zed^hdceZcaZiiZg^hV
the signatures shown left, were
kVajVWaZe^ZXZd[Zk^YZcXZ#6
written by the same person.
They study spacing, letter ]VcYlg^i^c\ZmeZgi^hZmVb^c^c\
heights, and slope. When i]Zh]VeZd[i]ZaZiiZghid
anonymous letters are received by [^cYVbViX]l^i]hjheZXihÉ
lg^i^c\#>ckZhi^\VidghXde^ZY
<

police, a literary forensics expert may


'" , & i]ZXdbejiZg]VgYYg^kZVcYVgZ
examine the type of language used
<

to establish the author’s identity. hijYn^c\^ihXdciZcih#

a
-<M<8C@E>8E@DGI<JJ@FE
b Writing on a pad of paper impresses a
copy onto the following sheet. Some
people press the pen hard, making a
visible copy, but when the impression is
very light an electrostatic detection
apparatus (ESDA) can reveal it. Toner is
dusted onto the suspect sheet (a), and
a static charge is applied that sucks
the toner into the indentations (b),
showing the indented writing.
 /


"340 WF S WJ FX
$PNQVUFS'PSFOTJDT3FQPSU
Financial data found on

WAREHOUSE ACC
the hard drive

OUNTS PRINTOUT
An examination of the
computer hard drive sho
that the company is in
ws
severe

F  0 wever,

BT
financial difficulty. Ho

$ 100 gold buttons


Nylon thread black
Cash withdrawal
50 hangers (plastic)
42 yards interlining
$148.00
$45.00
$575.50
$26.50
$160.75
it also looks as though
someone has been sip
off money from the
honing
com
accounts over a long per
of time. The spread sheet
pany
iod
on
$265.40 the
30 yards paisley (tea
l)
$450.00 the left shows some of
Cash withdrawal
im
$845.50 large cash withdrawals.
60 yards bleached den $65.00
ps
10 boxes assorted sna

4VTQFDU1SPGJMF
Name: Michael
Age:
Beasley
37
4VTQFDU1SPGJMF
who was Name: Karl
„The passerby
e night walk Caudwell
taking a lat
ze
when he spotted the bla Age: 49
and ale rte d the fire
ouse „ Manager of the warehouse,
department. The wareh has worked there for years.
far
is at an industrial park,
from the tow n cen ter an d „ Responsible for the day-to-
day running of the business
Beasley’s home.
and all the bookkeeping.
minal,
„He’s a pettythecripo lice for theft „ Says he was at home with
known to
and vandalism arges.
ch his wife, Louise, at the time
GXKG of the fire, but they were
=NGZT]OMNGYZ%N'KcYUJTOUOTYZMYOTYUZSNKZKOSKYYZG_ both in bed asleep.
YURGZKGZ N KO X IXOSKYGRKXZOTM
YIKT KUL Z
GZZN K ZOTUXJKXZU 4( 4UZGc KROGHRKGROHO
ZNKLOXKJKVGXZSKT
HKIUSKZNK›NKc Uœ”

U
'JSF*OWFTUJHBUPSšT3FQPS H:E?6DDDE2E
6>6?E
e scene
Ciga r found at the crim ;`jTV6gR_dÀ4]
VR_Vc
DYVdRjdeYVcV
hRdRÍXYeeYV
SVW`cVeYVÍcV _ZXYe
d traces CZTYRcU8ZSSd
rned material showe dY`hVU
The samples of bu ga sol ine. Empty gas faReeYVhRcVY`
fdVR_UeYVcVhR
pro ba bly
of an accelerant, but they RYVReVUViTYR d
tside the building, _XVSVehVV_YZ
cans were found ou <ReYVcZ_V9`]UV ^R_U
s on them. _9VhR_eVUY
had no fingerprint dV]]eYVT`^aR_j Vce`
cigar e`YZ^ReRc`T\
bly ignited with the Cigar found at scene S`ee`^acZTVD 
The fire was proba s de duced that YVdRZUdYV\_Vh
. Investigator YRgVe`dV]]Sfe dYVÄU
found at the scene ke d on to the gas- Zeh`f]U_VgVcS
d flic Ve`
the cigar was lit an YZ^<Rc]4RfUh
V]]hRdR]d`acV
ck.
soaked boxes of sto dV_e
4VTQFDU1SPGJMF 
Name: Katherine
Holden
AGE: 32
.BSLTBOE5SBDLT
„ Owner of Glad Rags. Footprints and toolmarks left
behind by the arsonist
„ Admits that the company
was in serious trouble and An examination of the ma
rks around the
she was in danger of losing door frame shows that it
was forced open
with a crowbar. A crowb
her house. made these marks was fou
ar that could have
nd outside
Richard Gibbs’s garage.
„ Stands to cash in on big
insurance claim. The shoeprints found at
the scene
were smudged but the clea
„ Mentions her fight with photographed and is sho
rest was
wn in this picture.
Richard Gibbs the night
before, says he was aggressive.
„ Confirms she received a malicious letter *OJUTKIZ UL
threatening arson on the day of the fire. She ZNKY[YVK OYY
assumed it was from Richard Gibbs. RKG\KZN 
VXOTZ%
„ Says she had been at the warehouse earlier in
the evening but claims to have been at home in
bed at the time of the arson.
4VTQFDU1SPGJMF
W A RE O USE IS G  IN G U P Name: Richard
9/U2 (
D  N ³T
Gibbs

IN& ,A M E S IF YO U AGE: 41
„Owner of rival clothing
3ELL5P
company, Allstar Ap
parel.
„Common knowledge that
G N O RE T H IS A T Y O U R he wants to put hi
) out of business.
s rival

PERIL :NKVUOYUKTX „Was at a charity auction on


the night of the fir
VKTRKZZGZ other side of town.
e, on the
%PDVNFOU'PSFO LU[TJYIKTK seen half an hour
Last
TJDT IXOSK fire department w
before the
Poison pen as called
letter to put out the blaz
e.
9SUQKYZ
HXGTJIOMGXNKYGSK
No match w
as found be GZZNKYIKTKšGYLU[TJ
twee H
]U[RJNKRK[GZ]N_
handwriting
on the poison n the
and samples pen letter
four suspects
taken from
each of the OTIXOSOTGZOT \K
. MK\OJKTIK%
However, us
e of an ESDA
revealed an machine
impression of
on the pape in
r the letter w dented writing
(see left). No as w
match was fo ritten on
handwriting un
either, and no d with this
suspects’ na ne of the
mes begin w
ith L.
 &3:


'0 3 ( OFB OB MZTJT


S JNFTDF
$ Police making a regular
patrol in the area spot unusual
activity at the Night Fly Printers’ workshop
on a Sunday afternoon. The door is wide
open, and the policeman enters. He can
hardly believe his eyes: piles of forged
bills are stacked up around the room. The
press, which usually prints catalogs and
leaflets, is churning out counterfeit cash.
Turning to the window, the policeman
glimpses a shadowy figure outside. He calls
you to the crime scene. Look below to see
what the team of CSIs has identified for
forensic analysis. Follow the investigation,
then when you’re ready, go to pages 50–1
for the full reports, and use your detective
skills to finger the forger.

P<N@KE<JJ
The person outside was out
walking his dog when, as
the police car approached,
he saw someone run out of
Night Fly’s back door. Police
will see if he can help them
with their inquiries. Read about
eyewitness evidence on pages 46–7.

.<I@8CELD9<IJ
FDGLK<I?8I;;I@M< Real bills are numbered
A laptop screen displays a sequentially, but forgeries
forged bill. Forensic carry the same serial
experts will copy and numbers. This is one of a
examine the hard disk number of security features
to find out what role that are usually missing from
it played in the crime. forged bills. To find out more
See pages 36–7 for more about fake money and how to
on computer forensics. spot it, take a look at pages 44–5.
!@E><IGI@EKJ
The press is covered with prints.
These will be matched against the
prints of Night Fly’s employees. To
read about how investigators
recover and match fingerprints,
turn to pages 18–21.

.LGGC@<J
The forger needed paper and
inks to commit the crime.
If investigators can find out
where these came from, it could
take them one step closer to
catching the criminal.

CFF;JK8@E / !$'
A suspicious stain covers some
of the bills. It looks as if the US-born master con-artist Frank Abagnale
forger has cut him or herself on forged checks to the tune of $2.5 million in
the machinery. But this is just a the 1960s. Abagnale started his forgery
hunch, and scientific evidence is
career aged only 16 and by age 21 he was
needed to back it up, so the money
will be taken to a serology lab for wanted in 26 countries. He now advises
forensic testing. Find out about banks on how to avoid fraudsters.
serology tests on pages 48–9.

'PSFOTJD"OBMZTJT

'",&4"/% (8B@E>DFE<P

'03(&3*&4 These euro notes were all identified as


fakes by experts. Banks continue to
introduce more sophisticated security
features on money to fight currency
forgery. Although these could be copied,
Publishing software—the same that it would be so expensive to do so that it
produced this book—and computer printers would make the forgery unprofitable.
and scanners have made currency forgery
relatively simple. Counterfeit goods are
produced in huge quantities and sold all over
the world. Famous paintings change hands
for tens of millions of dollars, making forging
them hugely profitable. Forensic investigators
and detectives work together to find $EK8>C@F
An expensive printing
the forgeries and foil the fakes. technique, intaglio uses
engraved plates to produce
a raised image. Other,
cheaper printing
techniques do not produce
the same results and can
easily be spotted.

#FCF>I8DJ
Three-dimensional images
visible on a flat surface—
holograms—have been
used as a security feature
on currency since 1989.
They are produced by a
unique photographic
process and are very
difficult to replicate.

.<:LI@KPK?I<8;
It is very difficult to fake the metal
thread that is woven through, or
printed onto, the paper. Some paper
currency, such as the US dollar bill, also
has text identifying the bill’s
denomination printed along the
thread for additional security.


'PSHFSZ $"4&"/"-:4*4

8djciZg[Z^iZmeZgihVgZ
ZmVb^c^c\i]Z[V`ZW^aah
Y^hXdkZgZYViC^\]i;ancdl#
I]ZnVgZadd`^c\Vii]ZbidhZZ
]dl\ddYi]ZXde^ZhVgZ!VcYWn
ZmVXianl]VibZi]dYhi]ZnlZgZ
IK=FI><IP egdYjXZY#I]^hl^aa]Zaei]Zbid
British artist Tom Keating, shown here in his studio, claimed hedih^b^aVg_dWh^ci]Z[jijgZ#
to have produced more than 2,000 paintings in the style of
various famous artists. Ironically, after his death, his forged
works became valuable collectibles in their own right.

.:8EE@E>=FI=8B<J
Passport scanners shine an
ultraviolet light to detect hidden
security features that would be
missing on a fake. They can
enhance the portrait to check for
tampering and can connect to a
wanted people database.

$"/:0641055)&'03(&3:
ATION CARD $K@J;@==@:LCKKFD8B<G<I=<:K
STUDENT IDENTIFIC
=FI><I@<J8E;KI8@E<;
@EM<JK@>8KFIJN@CC<8J@CP
JGFKD@JK8B<J
FIRST NAME: ;fR_
LSAT NAME: 4Rde
R]Z_` 'FFB:CFJ<CP8KK?<:8I;J
TU
0[GT)GYZGRO
Can you tell which one is
the authentic identity
DATE ISSUED:
!% $" #!!(
S IC document and which one
is the fake? Take a look at
9664 664 5647 483
the security features.

.GFKK?<D@JK8B<J STUDENT IDEN


TIFICATION CA
Compare the two cards
RD
FLEK<I=<@KN8K:?<J
and see how many A US customs agent drives a
mistakes you can spot FIRST NAME: steam roller over 17,000 fake
>Rcj
on the fake card. LAST NAME: designer watches. Many people
=j_YR^
To check you found will buy a fake Rolex watch for a
them all, turn to 3GX_2_TNGS fraction of the real price. But the
page 72. market in counterfeit goods robs
DATE ISSUED:

SIC
!% "' #!!( designers of copyright fees and
helps fund organized crime.
9664 6645 4643
7 2352

'PSFOTJD"OBMZTJT

*%&/5*':*/("$3*.*/"-
Criminals are rarely convicted by forensic evidence alone. In court,
identification by an eyewitness or CCTV footage carries more weight than
footprints in mud or stray hairs left at a crime scene. Without eyewitnesses,
detectives identify their suspects by eliminating the innocent. Once a
suspect is in the interview room, the job of finding out whether they
have something to hide begins.

'PSHFSZ $"4&"/"-:4*4

HVb7VgcZh!l]dhVlhdbZdcZ
gjcc^c\[gdbi]ZhXZcZVh]Z +IF=@C@E>
The way that crimes are committed
eVhhZYi]ZC^\]i;anlVgZ]djhZ! can tell investigators whether the
^hcdll^i]VYZiZXi^kZVi culprits are career criminals or 8L>?KFE:8D<I8
i]ZadXVaeda^XZhiVi^dc#Jh^c\ wayward teenagers. Studying Closed-circuit television (CCTV) can prove
heZX^VaXdbejiZghd[ilVgZ!]Z that a criminal was at a crime scene. Some
patterns in the methods of repeat systems use facial recognition software to
^hXgZVi^c\Va^`ZcZhhd[i]Z offenders can help investigators to match the faces of people filmed against
[VXZ]ZhVl# identify the criminal. photographs of criminals in its database.
$ )/$!4$)".0.+ /.4 '$($)/$*) 
EK@I<+FGLC8K@FE

1. Before any
elimination,
everyone is a
suspect.

CCD<E

2. All women
may be
eliminated,
reducing the
pool by half.

(<E8><;S
3. Those under
-<:I<8K@E>8=8:<
15 and over 35 Modern software allows an eyewitness to recreate the face
years old may of a suspect by putting individual features together. The
be eliminated.
computer holds a massive database of features, so that a
 likeness can be made. The flaw in the system is the witness’s
(<E8><;S FM<I=KK8CC memory—eyewitness identifications are famously unreliable.
4. All those
under 6 ft
(1.8 m) tall
may be
eliminated
'@<;<K<:KFI
When a suspect is
<=@E@E>K?<J<8I:? interviewed, officers
Narrowing down a pool of possible suspects need to find out if he
to a few individuals is achieved through a or she is telling the truth.
process of elimination. Physical characteristics A polygraph, shown left,
such as gender, height, and age quickly reduce monitors a speaker’s heart
the pool. If any unusual features, such as rate and blood pressure,
left-handedness, are known, detectives can which are likely to increase
narrow the pool much further. when the person is lying.

"3&:06"(00%8*5/&44
<@E>8>FF;N@KE<JJ@JEFK8J<8JP8J
@KD8PJ<<D !FCCFNK?<@EJKIL:K@FEJ
9<CFNKFK<JK?FN>FF;PFLIGFN<IJ
F=F9J<IM8K@FE8E;;<J:I@GK@FE8I<
2?@:?JLJG<:K
Choose one of the three pictures on
the right. Study it closely for a minute
and then cover it up. From memory,
describe the physical characterstics of
the person to a friend. Your friend
should draw a picture of the person
you’ve described. Can your friend tell
which one of the pictures you were .LJG<:K
describing? How similar is his/her .LJG<:K
picture to the one you picked? .LJG
<:K

'PSFOTJD"OBMZTJT

4&30-0(:
The science of serology aims to identify a suspect through bodily fluids.
Although sweat, tears, and other bodily fluids may all be examined, blood
is more usually found at a crime scene. When analyzing blood, serologists
seek to answer three questions: Is it blood? Is the blood human? Whose
blood is it? Since the discovery of blood groups, many differences within
them have been found, making blood analysis an exacting tool in
a criminal investigation.

/<JK@E>K@D<
At the lab, serologists carry out a
series of tests on blood samples.
A presumptive test determines
whether a sample is blood. If
this is positive, a precipitin test
establishes that the blood is
human. Then, the ABO test
determines blood group.

$JK?<9CFF;?LD8E
The precipitin test involves
introducing an antibody that locks
on to human blood in the sample. If the
test is negative, antibodies that lock on
to the blood of different animals can be
introduced to find out what animal
the blood came from.

CFF;KI8:<J
Sometimes, items like
this handgun are
removed from the
crime scene and taken
to the lab, where they
can be examined for
blood traces more
methodically. If traces are
found, presumptive tests
are carried out.

'PSHFSZ $"4&"/"-:4*4

I]ZWaddYhiV^cZYcdiZh]VkZ
WZZcgZbdkZY[gdbC^\]i;an
VcYiV`ZcidVhZgdad\naVW#6
hZgdad\^hil^aaXVggndjii]gZZ
iZhihÅegZhjbei^kZ!egZX^e^i^c!
VcY67D#DcXZi]ZWaddY\gdje^h
`cdlc!i]ZhiV^cXdjaYWZXdbZVc
^bedgiVcie^ZXZd[Zk^YZcXZ#
I@D<J:<E<K<JK
At the crime scene, CSIs may collect samples of blood
for lab analysis (as above) and carry out a presumptive test
to find out if a stain is blood. A tab moistened with a test
chemical is rubbed onto the stain. If the tip of the tab
turns from yellow to green, the stain is blood.

.?FN@E>LG9CFF;
A chemical called luminol is
capable of exposing tiny
quantities of blood, so even
bloodstains that have been *K<JK
scrubbed can sometimes be There are four major blood groups: A,
revealed. Here, what looks like B, AB, and O. To find out which group
a clean carpet (far left) is a sample belongs to, scientists carry
shown to have the impression out this test. A serum is dropped onto
of a bloody footprint (left). the samples, which react in specific
ways depending on their group.

3&7&"-4&$3&5.&44"(&4
!FI<EJ@:J:@<EK@JKJLJ<:?<D@:8CI<8:K@FEJKFI<M<8C 2
9CFF;JK8@EJK?8K?8M<9<<EN8J?<;8N8P /?@J8:K@M@KP  +LKJFD<N8K<I@E the spray
J?FNJPFL?FNKFD8B<8E;I<M<8CPFLIFNEJ<:I<K bottle and mix in a little iodine.
D<JJ8><J $KNFIBJ9<:8LJ<K?<@F;@E<I<8:KJN@K?K?< Spray the mixture evenly onto
G8G<I 9LKEFKFEK?<8I<8JD8JB<;9PK?<C<DFEAL@:< the paper, being careful not to
use too much.
4FLN@CCE<<;a friend „lemon juice
„water „iodine tincture  /?<J<:I<KD<JJ8>< should
„pump spray bottle 1 be revealed! Tell your friend
„white paper „thin clean what you think he or she wrote,
paintbrush then swap roles and draw a
secret symbol or write a 3
 JBPFLI=I@<E;to paint
message yourself.
a short message on a piece
of white paper, using the FEFKJN8CCFN
paintbrush dipped in the
lemon juice. Wait for the
paper to dry.
 @F;@E<T@KD8P
D8B<PFLJ@:B
 &3:
 *EFOUJGJDBUJPO3FQPSU

3 (
eyewitness

0
e-fit picture provided by

' BT
F  0WF S WJ FX
Sam Barnes, the eyewit
on the sce

very good
ne,

loo
has

k,
giv
police a description of
person he saw. He did
but
have put together an
en

pol
ness
the
the
n’t get a
ice
e-fit

$ with his help (see left


).

OYHK
)U[RJUZLNZNK
UTK KIZY%
Y[YV
4VTQFDU1SPGJMF
Name: Pete
Morelli
G
Age: 34
Blood Group: O
nager of
Name: Pete
„Owner and ma
nters. He
Morelli
Night Fly pri Finger:Index finger
owns several other small
and mostly unprofitable
businesses.
w sports
„Drives a bransndane
sec ond
car and ow
home abroa d.
on an early
„Was booked ht ation home the day
VXjghdgn^cheZXi^dc! VgZ ]VcYZY ^h \Zc ^
morning flig to his vac
following the crime.
ve been with his accounta
„He claims tomehawa
nt at the
ve no
4VTQFDU1SPGJMF
time the cri s taking place, and to ha
at the workshop. Name: Ray
knowledge of the crime
Wallace
Age: 55
$PNQVUFS'PSFOTJDT3FQPSU Blood Group: B
computer hard drive „ The production worker Name:
Examination of the at Night Fly. Has only
Ray
company’s
Wallace
The criminal has used the worked there for Finger:
Index finger
ing sof twa re to enhance the scan
publish three months.
of the bill.
d drive has turned „ A very hard worker, but a
Examination of the har police search reveals he
d files—e arlier versions
up several delete
forger. They were has a criminal record for
of the bills made by the
d by som eon e goi ng by the fraud, which he did not
all create
username “Monday.” reveal to his employer.
„ Says he was at home by himself
/YZNS OY  at the time of the incident.
KG <KX_TKc \U[YJ[c OTMVUROIK
[YKc TGZUZNK OY
IR[K Vc OZ% OTZKX\OK]/YZNOYP[YZHKIG[YKULN
Z
I[R Ic OSOTGRc KIUXJUXNGYN KMU
YUSKZNOTMKRYKZUNOJK%
4VTQFDU1SPGJMF 
Name: Erin
Lee
Age: 32
Blood Group: A
'JOHFSQSJOU3FQPSU
„Night Fly’s graphic Name:
Prints lifted from scene
of crime
designer. Erin
Lee Three distinct sets of
„Has worked at the company Finger:Index finger
fingerprints were
part-time for 18 months. recovered from around
Keeps to herself. the scene. The clearest
were found on the
„Admits that she is a printing press (see right).
gambler and has big debts.
Needs money quickly. It’s likely that one of the
prints belongs to the
„Claims to have been at the culprit. Check the suspec
prints and see if you can
ts’
races at the time.
find whose matches.
.GYGRRZNKK^VKc ZOYKTKIKYYGc _
ZUV[ZZUMKZNKXZNKLUc MKc _

3FQPSUPO'PSHFE#JMM
Bills recovered from the scene 4VTQFDU1SPGJMF
•The counterfeit bills found at the Name: Monica
crime scene match the ones already found
in circulation in the local area.
Day
Age: 25
•The copies have been made by scanning
real currency, improving the image
Bloodgroup: A
using software, then running them out
on the press in huge numbers.
„The PA at Night Fly.
•The paper and inks used in the
process were ordered through the
„Started a graphic design Name:
Monica
Note found at scene course but droppe
company account with the d out. Day
Finger:
company’s usual supplier. Now sometimes he Index finger
lps Erin
with the design w
RVcOZ
:NKZI[N
ork.
K „Has an expensive lifestyle
S[Y IIKGYY\ZU
NGJKGLOcSžY given her poorly pa
id job.
ZN U[TZY
4FSPMPHZ3FQPSU GII
Bloodstains fr
om scene of cr
ime
The stain on th
e forged bills at
was swabbed an the scene
d taken for an
alysis at the la
b.
The stains were
found to be hu
and further te man blood,
sts revealed th
to blood group em to belong
A.

Bl o
2UUQYROQKZNKLUXMKXI[Z

od
fo
NOS NKXYKRL)U[RJ un
d
at
IR[SYOTKYYY[MMKYZ sce
ne
OTK^VKXOKTIK]OZNZNK
KW[OVSKTZ%
 %&3


.6 3 OFB OB MZTJT
S JNFTDF
$ Landscaping work on the grounds
of Beech House has stopped abruptly
after a grisly discovery: a human skeleton has
been found buried beneath an old rock
garden. You arrive at the country house with
the team of CSIs, ready to investigate. No one
knows how long the skeleton has lain there,
but the house has been in the same family
for more than a hundred years, so family
history may hold a clue. Soon you discover
that 25-year-old Jack Macadie disappeared
in 1918 and was never seen again. Could the
skeleton be his? Look at the clues below,
then study the full investigation on pages
62–3. Find out who the victim is, then
track down the murderer.

.BLCC
A hole in the skull looks
like a bullet wound, and
this is confirmed when a
bullet is found inside the
skull. The bullet will be
examined in the lab by a
firearms expert. For more on
firearms analysis, see pages 60–1.

.F@CJ8DGC<8E8CPJ@J E>I8M<;9LKKFE
The soil around the A copper button lies on the
skeleton is being sifted to skeleton’s ribs, and a buckle
see if any other personal is found by the pelvis.
items were buried with After quickly cleaning it, CSIs
the body. A sample will can see the button is engraved
also be examined in the with a bird. What can it mean?
lab for trace evidence. These items will be taken to a
To find out more about trace historian who will identify the
evidence, see pages 24–5. period they came from.
L==C@EB
Sifting the soil, a CSI has found a
gold cufflink. It is initialized but
years under the soil have made
the letters unclear. It will be
cleaned with chemicals in the
lab to enhance the letters.

(LI;<IN<8GFE
An old-fashioned pistol has been
wrapped in an oilcloth and buried
with the body. It is almost
certainly the murder weapon, but
forensic tests are needed to
confirm this. See how such tests
are carried out on pages 60–1.

FE<J8E;)
The whole skeleton will be taken to the
!/!$'
lab and examined by a forensic More than 3,000 years after his death, the
anthropologist, who will be able to skeleton of Egyptian pharaoh Tutankhamen
determine the sex and estimate the was X-rayed. Analysis showed that he did
age of the victim. Turn to pages 58–9
not die of natural causes, as was believed,
to find out how. If DNA can be
extracted, it could confirm the but had been brutally murdered. The likely
victim’s identity. Find out more assassin succeeded him to the throne.
about DNA on pages 56–7.

'PSFOTJD"OBMZTJT

%/"'*/(&313*/5*/(
The discovery of DNA fingerprinting in 1984 changed forensic science
forever. Inside the nuclei of the trillions of cells that make up the different
parts of our bodies is a map of the features and characteristics that
compose individual identity. It was created by a unique combination of our
parents’ maps. Experts can record this map as a DNA fingerprint—even from
a flake of skin left at a crime scene.

'8;;<IF=C@=<
DNA, or deoxyribonucleic
acid, is made up of two linked strands
that coil around each other like a twisted
ladder. The rungs that link the two strands
are made of four different chemicals, shown
here in different colors. It is the sequence of
these chemicals that is different in
every person and that forms their
DNA fingerprint.

CFE@E>)
Here, an expert carries
out a technique called
Polymerase Chain
Reaction (PCR). When
only a fragment of
DNA is found, PCR
duplicates it until
there is a sufficient
amount for analysis.
PCR works by
mimicking the way
that DNA copies itself
naturally when a
cell divides.


(FK?<IJX)
Mitochondrial DNA (mtDNA) is found in a different
part of a cell from nuclear DNA. It is inherited only
from the mother, so there is little change in it from
parent to child. It survives for centuries in bone
material (above), and is used to trace female ancestors.
(8K:?@E>)

. 63%&3
DNA fingerprints are recorded as sequences of rungs, which
look similar to a supermarket barcode. Today, crime-scene $"4&"/"-:4*4
and offenders’ DNA is recorded on national computer
databases around the world. The computer software matches
thirteen different sequences to find a positive result. B^idX]dcYg^Va9C6lVhZmigVXiZY
[gdbi]Zh`ZaZidc[djcY^ci]Z
gdX`\VgYZc#I]^h^hWZ^c\iZhiZY
V\V^chiBgh#AVlgZcXZ!i]Z
."5$)"%/"4".1-& egZhZcidlcZgd[7ZZX]=djhZ#
>[h]ZXVgg^Zhi]ZhVbZbi9C6!
M<IPG<IJFE?8JK?<@IFNELE@HL<)=@E><IGI@EK i]Zh`ZaZidcWZadc\ZYid?VX`
#FN<M<I DL:?F=K?<@E=FID8K@FE@E8)J<HL<E:<@JK?<
BVXVY^Z!l]dY^hVeeZVgZY^c&.&-#
J8D<=IFDG<IJFEKFG<IJFE <IK8@EI<G<8K@E>J<:K@FEJ
8I<:FDG8I<;@EFI;<IKF=@E;8D8K:?

2?@:?JLJG<:K
Look at the crime-scene sample of DNA shown on
the right. Study the possible suspects from the police
database, below, and see if you can find a match.
To check your answer, go to page 72. I@D< J:<E<
J8DGC<

/N@E)
DNA analysis has shown that
identical twins are just that—
exact copies of each other. If a
crime was committed by an
.LJG<:K .LJG<:K .LJG<:K .LJG<:K identical twin, DNA fingerprinting
could not identify the guilty one.

'PSFOTJD"OBMZTJT

'03&/4*$ /?<:Q8IXJ9FE<J
The last Russian czar, Nicholas II, and

"/5)3010-0(: his family, were believed to have been


murdered by Bolshevik forces on the
eve of the Russian revolution.
In 1998, their skeletons were
examined (below) in an
Human bodies quickly decompose, leaving attempt to prove the story.
only skeletons. When human remains are Damage to their bones
showed that they had
found, forensic anthropologists get to work. indeed been killed in a
These experts know how to find evidence hail of gunfire.
of identity retained in bones and teeth.
If death was violent, they may be able to
discover what happened. And if dental
records can be traced, experts can discover
exactly who inhabited the bones.

/8CB@E> JBLCC

9FE<J
A human skeleton
reveals information
about its gender and
height in life. Women’s
pelvises are visibly G<CM@J
wider than men’s,
while three muscle
attachment sites on
the skull are more
prominent in men
than in women.
Adding around 4 in =<DLI
(10 cm) to the length of
a skeleton gives height,
but, if the skeleton is
incomplete, experts can
estimate height by the
length of the thighbone
or the foot alone. =FFK

0E@HL<K<<K?
Dental treatments, such as
. 63%&3 $"4&"/"-:4*4

fillings, are clearly visible 6[dgZch^XVci]gdedad\^hi^h


under X-ray. And tooth
ZmVb^c^c\i]Zh`ZaZidc[djcY
enamel is the hardest
Vi7ZZX]=djhZ#H]Z^hadd`^c\
substance in the body,
so teeth are sometimes the Vii]Zh^oZd[i]ZeZak^hVcY
only remains of those killed in h`jaaidYZiZgb^cZ\ZcYZg!VcY
explosions and fires. Matching X]ZX`^c\^[i]ZXdaaVgWdcZ^h
X-rays of teeth to dental records [jaan\gdlc#>[cdi!^ibZVchi]Z
can reliably identify the dead. eZghdclVhjcYZg'-nZVghdaY#

"IFN@E>9FE<J
These X-rays show the hands
of a three-year-old and an
adult. The child’s bones have
big gaps between them. Inside
the gaps is a tough elastic (FE>FCF@;
tissue called cartilage, which is
replaced by bone in adulthood.
In older people, bones can show
signs of deterioration, such as
wear and tear on the joints.

803,065"4641&$5š4)&*()5 )<>IF@;

/?<C<E>K?F=8>IFNEG<IJFEXJ=FFK@J89FLK
F=K?<@I?<@>?K $=E<:<JJ8IP 8=FI<EJ@:
8EK?IFGFCF>@JK:8E<JK@D8K<?<@>?K9PK?<
9FE<JF=K?<=<<K8CFE<

4FLN@CCE<<;three adults „ a tape measure


„ a calculator „ a pen or pencil
„ a piece of paper 8L:8J@8E

 JBPFLI8;LCKJto take off their shoes. Measure K?E@:?<8;J


their left feet and write the results on your piece of The skull can be a guide to
paper next to their names. ethnicity. Mongoloid skulls
(Asian origin), have high
 )FNDLCK@GCPK?<C<E>K?F=<8:?=FFK9P Write cheekbones and wide, flat faces;
down your results next to the person’s name. Negroid skulls (Afro-Caribbean
origin) are long and narrow
 (<8JLI<K?<8;LCKJX?<@>?KJwith your tape with a broad nose cavity;
measure. How accurate were your results? Caucasoid skulls (European
origin) are wider than others
and have less protruding jaws.

'PSFOTJD"OBMZTJT

'*3&"3.4 .?8KK<I<;G8KK<IE
Finding out how many shots were fired is the
When a gun is fired, along with a firearms investigator’s first task. If the bullets have
deadly ball of lead it releases a chain hit reinforced glass, like this car windshield, a clear
of evidence. Tell-tale residue is left on record is left. The pattern caused by bullet marks in
glass can also reveal in which order the shots were
the shooter’s hand. The shape and size fired. Cracks caused by subsequent bullets will not
of the bullet indicates the type of gun cross over existing cracks.
it was manufactured for. Tiny markings
on the bullet, made by grooves in the
gun’s barrel, can even lead investigators
to the very gun that fired it. Ballistics—
a bullet’s flight path—can provide
valuable evidence too.

8CC@JK@:J
Laser beams can help investigators discover the
flight path of a bullet, showing them exactly
where the shooter was standing. The laser is
attached to a rod inserted in the bullet hole, and
the beam indicates the direction and angle of the
bullet’s source. The beams can be photographed
and produced as evidence in court.


. 63%&3 $"4&"/"-:4*4

I]Ze^hidaVcYWjaaZi[gdbi]Z
\gVkZVgZcdlViVWVaa^hi^Xh
aVW#6c^ckZhi^\Vidgl^aaiZhi"
[^gZi]Ze^hidal^i]VcjcjhZY
WjaaZi[gdbi]Z\jcÉhWVggZa!VcY
i]ZcXdbeVgZbVg`^c\hdci]Z
ildWjaaZihidXdc[^gbi]Vii]Z
e^hidalVhi]ZbjgYZglZVedc#

I8JJ:8K:?<I LCC<KD8K:?@E>
To match a crime-scene
Cartridge cases are as distinctive as
bullet with one from a
the bullets they carry, since the shape
suspect gun, investigators
of the dent caused by firing varies
fire the gun and compare
from gun to gun. The US Brasscatcher
the two bullets. The gun is
database stores images of cartridge
fired into a water tank so
cases from guns used in crimes.
the bullet isn’t damaged by
Cartridge cases collected from a crime
impact (as above). Markings
scene are compared with those on the
on the two bullets are
database in case a match is found.
then compared under a
comparison microscope.

."5$)"$3*.&4$&/&#6--&5
2?<E<O8D@E@E>9LCC<KJ =@I<8IDJ<OG<IKJCFFB=@IJK8KK?<
:8C@9<IF=K?<9LCC<K .<:FE; K?<P<O8D@E<K?<I@;><JFE
1K?<J@;<JF=89LCC<K BEFNE8JI@=C@E>D8IBJ K?8K8I<
:8LJ<;9PK?<>IFFM<JFEK?<@EJ@;<F=K?<>LE98II<C
!@E;K?<9LCC<K=@I<;=IFDK?<J8D<>LE
To match the bullet fired at a crime scene with one
fired in the lab, first find a bullet of the correct size,
I@D< J:<E< 2
9LCC<K or caliber, then match the rifling marks. To check
your answer, turn to page 72.
#8E;JN89
When a gun is fired, the
mechanism sprays invisible
residues of explosive onto the
shooter’s hand, which remain for
3 about six hours. When suspects are
found at the scene of a shooting, a
CSI swabs their hands to collect
any gunshot residue. The area
LCC<K LCC<K between fingers and thumb is most
LCC<K LCC<K LCC<K LCC<K likely to be contaminated.
 %&3


.6 3 F  0WF S WJ FX
4VTQFDU1SPGJMF
Name: Colonel Ar
Macadie
Age in 1918:
55
thur

„Last in line of a respected

$ BT
military dynasty. W
on
medals of bravery
in the
Spanish-America
n War.
„All but disowned his son
Jack over his antiw
ar views.
„ Very ill at the time of the
disappearance, hi
doctor did not expe s
ct him to live long
.

=U[RJZNK)URUTKRXKGRR_
S[XJKXNOYU]TYUT%

%/"3FQPSU
mtDNA test and Macadie Fam
ily Tree
Arthur Macadi
e (1863–1933)
m. The mitochondrial DNA sample
Lily Hooke (1 taken from the
868-1913)
victim’s skeleton matched that
of Mrs. Anne
Lawrence, the present inhabita
nt of Beech House.
Elizabeth Maca This proves that there is a dire
die Jack Macadie ct female line
(1897–1979)
m. (1893–1918) between the victim and Ann
Freddie Sarson
s
e Lawrence.
(1891-1931)
ZNK
YQKRKZU
The family tree on the left show
s that Anne is
T the daughter of Elizabeth. This
skeleton is highly likely to be
means that the
that of Jack
Judith Anne Sarsons Macadie, Elizabeth’s brother.
Sarsons (b. 1930)
(1923–80)
m.
Bill Lawrence
(1926–1999)

5SBDF&WJEFODF3FQPSU
next to victim
Items unearthed
by Cufflinks found at
evidence was found
No significant trace ske let on , or through
scene
und the
sifting the soil aro
/Y
LOXYZOZTNK
lab.
analysis back at the

0UX7O%ZOGR
re
th the skeleton we
The items found wi torian who identified
a military his
examined by I army issue,
ckle as World War
the button and bu cadie wo uld have worn
k Ma
identical to those Jac
rm.
as part of his unifo
grave,
s retrieved from the
A single cufflink wa e ba g.
in an evidenc
shown on the right
4VTQFDU1SPGJMF =RhcV_TV

eWc`^>cd
DeReV^V_
Name: Freddie eYVWR^Z]j

Sarsons _TV\_`hd
2__V=RhcV V c+
^YVc^`eY
Age in 1918: 27 YZde`cjWc` "*$$UVda
ZeV
] df cg ZgVUf_eZ] j d
. Could not EYV4` ]` _ V
9VhRd R ]h R
„ A local tailorlita dUZRX_`dZd Z_X
enlist for mi ry service YZdU`Te`cÄ gV _edacVTVU
V _ eV U SjeYVV
due to poor eyesight. e` c^
RaaVRcR_T
V
;RT\ÄdUZd ]gVdZ_
„Cocky, confident type. U d W ` f _UeYV^dV dd
EYV_Vh]j
h V fXYSfdZ_V
eth while ec ` f S ]V VgV_eY` _ U S j
„ Married Elizab
ssing in action. Known
locally Í_R_TZR ]
cZ gZ _ X  2SR]R_TVS
``\W`

f
Jack was mi hRd eY cVXf]R c
_TVdY`hd
as a womanizer. >cd=RhcV cR h R]d
UhZeYU
that he expected to inherit Beech f_Via]RZ_V _RecRXZT
„ Widely believed dY ` e R_U\Z]]VUZ
the Colonel’s death. 7cVUUZVh
R d YV_eYV
House after V _ e Z_"*$"H 
Yf_eZ_X R T T ZU c6]ZkRSVeY
 `jVRcd]ReV
=NUZNUGJ V ] U ZV U e h
4`]`_
ZNK Z_YVcZeVUV
gVcjeYZ_X
GIIKYYYZUR%
VO

#BMMJTUJDT3FQPSU 4VTQFDU1SPGJMF
Name: Elizabet
Colt .45 pistol recovered next to victim h
Macadie
Age in 1918:
Ballistics testing has confirmed that 21
the bullet found in the victim’s skull „Jack’s younger sister.
was fired from the gun buried beside
the body. „She was very upset at the
rift between Jack an
The pistol is a Colt .45 Automatic, a d
their father.
standard issue army pistol. It is
engraved with a serial number that has
been traced to Colonel Macadie.
„She married Freddie
Sarsons in 1917 af
ter a
whirlwind courtsh
ip. They lived in th
Macadie family ho e
me as Elizabeth w
4VTQFDU1SPGJMF nursing her ailing
father.
as

Name: John
Farrow
Age in 1918:
"OUISPQPMPHZ3FQPSU
59
„The gardener. Examining the bones

„The rock garden where the Forensic anthropologists have been able
skeleton was burie
d was to establish that the victim was male,
under constructio aged over 12 and under 40 years. Bone
n at the
time of the disapp scarring shows that he had once broken
earance. his arm.
Farrow had been
digging it the mor
Jack was due to ar ning
rive home. Damage to the skull indicates that a
„A modern police trace has found gunshot wound to the head was the
probable cause of death. The bullet was
the disappearance, that shortly after
he left Beech Hou found inside the skull. The fact that it
his own home in se, bought did not exit the skull suggests that the
a seaside town, an
worked again. d never weapon was fired from a distance.

=N_JOJZNKMGc JKTKX
RKG\KYUGHc [VZR_%

3FGFSFODF

)*4503:0''03&/4*$4
Science has been used to help solve crime since crimes were first
committed, but forensic science is more specialized and precise than it
has ever been before. Over the last 100 years, major advances have been
made in many forensic disciplines, making crime harder than ever to
get away with. These advances have also enabled experts to shed light
on some historical mysteries, and to solve seemingly impossible cases.

'*/(&313*/5*/( $BTFTUVEZ
„In 1856, Sir William Herschel, a British
officer in India, began to use thumb
prints on documents as a substitute
for written signatures for illiterates.
„Before fingerprinting, a system of
identification called anthropometry
was used by police forces all over the
world. It used a complex series of
measurements of the body.
„In 1892, Argentina became the first
country to replace anthropometry rglar Harry Jackson
In 1902, 41-year-old bu
with fingerprints. to be convicted by
became the first person
Britain. After stealing
„The Federal Bureau of Investigation fingerprint evidence in
a London house,
some billiard balls from
(FBI) introduced the Automated fingerprints on the
Jackson carelessly left his
Fingerprint Identification System otographed and a
windowsill. They were ph
known criminals’ prints
(AFIS) in 1975. search of police files of
kson, who had just
revealed a match with Jac
„In 1999, the FBI integrated AFIS so for burglary. The
completed a prison term
s found guilty and
that submission, storage, and search unfortunate burglar wa
en years in prison. This
could all be carried out electronically sentenced to a harsh sev
tish newspaper of the
article (above) from a Bri
using just one system. azing new technique.
same era explains the am


$BTFTUVEZ
509*$0-0(: Napoleon I of
„In 1813, 26-year-old Spanish doctor France died in
exile in 1821 and
Mathieu Orfila published Treatise of
the cause of
General Toxicology. Orfila became death was
known as the father of toxicology. recorded as
stomach cancer.
„Before tests for identifying arsenic, it But in 1955 the
was used so frequently to bump off diaries of
family members that it became known Napoleon’s valet
were published,
as “inheritance powder.”
and his
„In 1836, British chemist James Marsh description of his
master’s final
first used toxicology in a jury trial, to
months led experts to believe he had in fact
detect arsenic in a murder victim’s body. been killed by arsenic, given to him in regular
doses over a long period. In 2001, a lock of
„In 1954, R. F. Borkenstein, a police Napoleon’s hair was cut into segments and
captain in Indiana, invented the analyzed by toxicologists. The diagnosis was
Breathalyzer, for detecting alcohol. long-term arsenic ingestion.

$BTFTUVEZ
'*3&"3.4
„In 1835, Henry Goddard, one of
Scotland Yard’s first police officers, used
bullet comparison to catch a murderer.
He found a visible flaw in the bullet,
and traced it back to a mold.
„In 1898, German chemist Paul Jeserich
used microphotography to compare the
markings on a bullet fired from a
suspect’s gun to one recovered from the
On February 14, 1929, in Chicago, seven gang crime scene. The killer was convicted by
members were gunned down by rival mobsters.
The killers left behind 70 cartridge cases, and his evidence.
from these investigators were able to identify the
type of machine guns used. Months later, police
„The comparison microscope was
raided the home of one of the hitmen and seized
invented in 1925 in the US by Philip
two guns. An investigator test-fired them and Gravelle and Calvin Goddard, greatly
proved them to be the guns used in the St. simplifying the comparison of bullets.
Valentine’s Day Massacre.


$BTFTUVEZ
%0$6.&/54 In 1983, German
magazine Stern
„In 1910, American Albert Osborn paid a vast sum
published Questioned Documents, which for the supposed
is still consulted by experts today. diaries of Nazi
leader Adolf
„Two American murderers were convicted Hitler from the
in 1924 by forensic evidence proving 1930s and‘40s.
They published
that a typewriter owned by one of them
the first extracts,
had been used to type a ransom note. and experts and
ordinary readers
„British scientists Bob Freeman and alike furiously
Doug Foster invented the electrostatic debated their
detection apparatus (ESDA) in 1978. authenticity. To end speculation, Stern passed the
diaries to forensic experts. They reported that
„In 1998, literary analyst Professor Don polyester bindings, manufactured in 1953, had
Foster helped convict serial bomber Ted been used, and the paper contained a chemical
Kaczynski by studying documents the that was not introduced until 1954. Some of the
capital letters were different from Hitler’s real
killer had composed.
handwriting. Stern had been swindled.

$BTFTUVEZ
„
%/ "
In 1953, scientists James Watson and
Francis Crick discovered the double helix
structure of DNA, paving the way for
DNA analysis.
„In 1984, British geneticist Alec Jeffries
discovered DNA fingerprinting, which
uses variations in the genetic code as
In 1995, the world’s first DNA database—a
collection of DNA fingerprints of suspects and identification.
convicted criminals—was begun in Britain. By
2006, the database held profiles for 3.5 million „In 1986, Polymerase Chain Reaction
people. Today, DNA databases are a major (PCR), a method of duplicating parts of a
weapon in the fight against crime all over the DNA molecule, was developed by
world. Advances in searching techniques have scientist Kary Mullis.
made it possible for police to obtain DNA profiles
of suspects from past, unsolved crimes, and many „DNA was first used to solve a crime in
cases have been reopened as a result. Britain in 1988. Murderer Colin Pitchfork
was convicted using DNA fingerprinting.


53"$&&7*%&/$& $BTFTUVEZ
„In 1784 in Lancaster, England, John Toms
was convicted of murder on the basis of
the torn edge of a wad of paper in a
pistol matching the remaining piece in
his pocket. This was one of the first times
physical matching was used to convict.
„Edmund Locard, professor of forensic
medicine at the University of Lyons,
France, established the first police crime
laboratory in 1910. Some ten years later,
Locard formulated the basic principle
of forensic science: “every contact
leaves a trace.” On December 21,
1988, Pan Am Flight
flying from London 103,
„In 1916, Albert Schneider of California, midair over the Sc
to New York, explod
ottish town of Lock
ed in
first used a vacuum apparatus to collect Examination of the er bi e.
debris revealed that
trace evidence. bomb had caused a
the explosion, but
investigation failed the
to progress any furth
„The tape lift method of collecting trace More than a year lat
er, a passerby foun
er.
evidence was developed in 1950 by fragment of gray T- d a
shirt close to the cra
Incredibly, the blas sh site.
Swiss criminalist Max Frei-Sulzer. t had left the label
enabling detective intact,
s to trace the store
„The first high-resolution scanning sold the T-shirt. Th
e store owner clear
that had
ly
electron microscopes, used to identify remembered the pu
rchaser because th
had bought clothes e man
trace evidence, were produced at without considerin
size or style. With th g their
Cambridge University, England, in 1965. e store owner’s
description, detecti
ves tracked down th
buyer of the T-shirt e
„In 1977, Masato Soba of Japan first had bought it to pa
. They discovered th
at he
developed latent prints by superglue ck around the bom
b.
fuming, a method now commonly used.


(-0 44"3:
!FI<EJ@:J:@<E:<
Science that is used in an
I@D<J:<E<@EM<JK@>8KFI.$ investigation to find evidence linking
*K<JK A person employed by the police to
a suspect to a crime.
A test to determine gather forensic evidence at the
which of the four crime scene.
major blood groups a sample
"LEJ?FKI<J@;L<
Microscopic powder sprayed onto
belongs to. 8K898J< the hands of a person firing a gun.
An organized collection of
::<C<I8EK information on a subject, usually
A substance, such as gasoline,
#8I;;@JB
held on computer.
A computer’s storage unit. It retains
used to make a fire burn more
the computer’s information when
quickly. )=@E><IGI@EK the machine is switched off.
The pattern of repeating sequences
IJFE in DNA that is unique to each person,
The crime of deliberately starting a
$DDLEF8JJ8PK<JK
and can be used as identification.
A test that determines whether
fire to cause damage to property.
drugs or poisons are present in a
C<:KIFED@:IFJ:FG< sample of blood or urine.
8CC@JK@:J A powerful microscope that uses
The science that studies the flight of a stream of electrons to magnify
projectiles. In forensic science it
$E:<E;@8IP
an image.
An incendiary fire is one that was
usually refers to bullets.
started deliberately. In forensics, the
C<:KIFJK8K@:;<K<:K@FE word refers to crimes of arson.
@FK<IIFI@JK 8GG8I8KLJ .
A person who releases deadly A device that can reveal indented
poisons, viruses, or bacterium in
'8J<I9<8D
writing on paper using static
A thin intense beam of light used in
order to kill and cause panic. electricity and particles of toner.
forensic science to reveal latent
fingerprints, and to trace the
8IKI@;><:8J< M@;<E:<D8IB<I trajectory of bullets.
A tube that contains a bullet and A card for marking the location of
explosive charge for a gun. key evidence at a crime scene.
'8K<EK=@E><IGI@EK
One that is not visible and requires
FDG8I@JFED@:IFJ:FG< P<N@KE<JJ special techniques to reveal it.
A double microscope used for A person who has firsthand
viewing two similar items, such as knowledge of a crime or other event,
bullets, together, so that a match because he or she saw it happening.
can be made.
!CLFI<J:<EKGFN;<I
FDGLK<I?8:B<I In forensic science, fluorescent
Someone who uses their computer powder is applied to latent
programming expertise to illegally fingerprints to make
break into computer systems and them glow.
change or steal the data there.


'@K<I8IP=FI<EJ@:J
A new forensic science that can help
identify a suspect by examining the
type of language he or she uses in +I<:@G@K@EK<JK /I8:<<M@;<E:<
written documents. A lab test to establish whether a Small but measurable amounts of
sample of blood is human. evidence gathered from the crime
'LD@EFC scene, typically hair, fibers, and soil.
A chemical spray used by forensic +I<JLDGK@M<K<JK
investigators to detect tiny particles A test that determines whether or /I8A<:KFIP
of blood. It can even show up not a liquid is blood. The curving path of a projectile—
years-old traces of blood. usually a bullet—through the air.
.:8EE<I
(8JJJG<:KIFD<KIP A device that converts a picture 0CKI8M@FC<KC@>?K
A technique used to discover into digital information to be stored A light used in forensic science to
quantities of drugs present in a on a computer. make fingerprints glow and to
sample, and to identify accelerants. detect hidden security features.
.<IFCF>P
(@KF:?FE;I@8C) The study of blood and other body 3 I8P
DNA found outside the nucleus of fluids, usually to identify a suspect. A type of radiation used to image
some of the body’s cells, and bones. In forensic science, X-rays are
containing genetic material passed .F=KN8I< used to make dental identifications.
down from the mother only. Programs that run on a computer,
telling it what tasks to perform.
)L:C<8I)
DNA found in the nucleus of cells, .LG<I>CL<=LD@E>
and containing an equal amount of A method of revealing latent
genetic material from each parent. fingerprints using vapors given
off by the glue.
+8I8D<;@:
A person trained to give emergency .LJG<:K
medical treatment. Someone who investigators believe
is involved in a crime, but who has
+FCP>I8G? not been proved guilty.
An instrument for detecting when a
suspect is lying, by recording their /FO@:FCF>P
pulse rate and blood pressure. The study of the nature, effects, and
detection of drugs and poisons and
+FCPD<I8J<:?8@EI<8:K@FE the treatment of poisoning.
A method of duplicating fragments
of DNA to make a sample large
enough for analysis.

5)& "3 40 /

40-65*0/4 30 ##&3:

The fire investigator’s report concluded


that the fire was probably started
using gas as an accelerant and a
cigar butt to ignite the blaze.

At first glance, Richard Gibbs


seems to be the prime suspect. He
has a long-running feud with Katherine
Holden, the owner of Glad Rags, and
The robbery at the Holbrook Gallery has the letter received the day
had police perplexed. Anna Berkhout before the fire seems to point
claims to have been at reception to him, not to mention the
when the painting disappeared, incriminating cigar butt.
and would have seen anyone However, none of the hard
entering or leaving the gallery. evidence points to him. So
who has tried to frame Gibbs?
The evidence tells us that only
two people had traces The answer is in the forensics. The
from the crime scene on muddy footprints left by the door match Karl
their shoes—Ed Kolowski and Jimmy Caudwell’s shoeprint and the indented “L”
O’Brien. If he had been unconscious on the poison pen letter points to
before the robbery took place, his wife, Louise. He could have
O’Brien could not have walked on the written the letter on a pad she
glass shards. The fingerprints on the lamp had previously used, leaving
stand show that it was he who knocked the her writing ghosted
security camera away. underneath.

He waited until the gallery was empty, The computer records show that
put the sedative drug into his own someone had been stealing from
tea, and drank it after having the company. Karl was the only person to deal with
unclipped the painting from its the accounts. On the night of Katherine’s fight with
frame. He couldn’t have removed Richard Gibbs, he realized that she was planning to
the painting from the sell up, and that if she did he would be found out.
building, so he must He needed to get rid of the evidence.
have stashed it in the Using the argument as a cover, he
room, intending to collect it sent the letter to implicate Gibbs.
later. Behind one of the other The next night, while his wife
paintings would be the was asleep, he returned to the
perfect place… warehouse and started the fire.
'03 (&3: 
.6 3% &3

The counterfeiting operation at Night Fly Printers Forensic anthropology and DNA reports identified the
was an ambitious crime. Police found thousands of skeleton as that of Jack Macadie, who went missing
bills, and it is likely that this is not the first in the fall of 1918.
time the forger had been at work
at Night Fly. Who had the skills The missing person’s report
to carry off this crime? states that a young soldier was
seen getting off a train at the
Can it be true that Pete station on the day Jack was
Morelli was unaware of what due to arrive home. The
was happening on his likelihood is that this was Jack,
premises? He has the trappings but he was killed before he ever
of success while his companies are reached the house.
failing. Is he making his money another way? He
was due to board an early morning flight The pistol found in the grave was
the next day, but he has an alibi for traced to Colonel Macadie.
the time the crime took place. Would the shame of Jack’s
antiwar views have led the
Ray Wallace is a suspicious Colonel to take the life of his only
character, with a son? Anyone in the house could
track record of have had access to the pistol.
fraudulent
activity. Is his The cufflink found in the grave is the only concrete
nervousness caused by guilt, or clue. The initials engraved on it read FS—Freddie
simply because his criminal Sarsons. The money missing from the family accounts
record has been revealed? suggests the gardener stumbled on the
While both his and Pete’s truth and blackmailed Freddie,
fingerprints have been found on explaining his disappearance and
the machinery, the eyewitness subsequent life of comfort.
identified the fleeing suspect as a female.
What could Freddie’s motive
To catch the criminal, we must turn to the forensic have been to commit such a
evidence. Who matches the e-fit photo provided by terrible crime? With Jack out of
the witness, has blood type A, and left their the way, and the Colonel very ill, he
fingerprints at the scene? and Elizabeth would have been in line to inherit the
The answer is contained in the estate. Ultimately though, the plan did not work out.
username that investigators The Colonel lived on despite his illness, so Freddie
found on the deleted never received any of his money or the country
computer files: MONDAY, or house. And, in a twist of fate, Freddie himself was
Monica Day. shot in a hunting accident 13 years later.
*/%&9
 crime scene 8–9 forgery 42–45, 50–51, 66 photography, forensic 10–11
accelerants, fires 31, 32, 33 criminals, identifying 46–47 fraud 36 poison pen letters 31, 37
acids, testing 23 cyber crime 36 poisons, toxicology 22–23, 65
AFIS (automated fingerprint " polygraphs 47
identification system) 20, 21  gas chromatographs 23, 32 profiling criminals 46
alcohol, breathalyzers 23 dental records 58, 59 genetic fingerprinting 56–57,
alkaline substances, testing 23 DNA fingerprinting 55, 56–57, 66 -
arson 30–33, 38–39 66 guns, firearms analysis 54, 55, robbery 16–17, 26–27
art forgery 44, 45, 66 documents, literary forensics 60–61, 65
36, 37 .
 dogs, tracker 13, 32 # secret messages 49
ballistics 60 doors, forced entry 30, 35 hair 22, 24 security threads, currency 44
bank fraud 36 drugs, toxicology 22–23 hand swabs, explosives 61 seeds, trace evidence 25
bills, forgery 42–43, 44 handwriting analysis 31, 37 serial numbers, bills 42
blood stains 43, 48–49 holograms, bank notes 44 serology 43, 48–49
bombs 32, 33 electron microscopes 25 shoeprints 30, 35
bones 54–55, 56–57 electrostatic detection $ skeletons 54–55, 56–57
breathalyzers 23 apparatus (ESDA) 37 immunoassay kits 23 skulls, forensic anthropology 59
bullets, firearms analysis 54, evidence inks, chromatography 37 soil sample analysis 54
60–61, 65 collecting 12–13 intaglio printing, currency 44 superglue fuming, revealing
fingerprints 18–21 fingerprints 19
 trace evidence 24–25 ' swabs 13, 61
cabbage water, testing eyewitnesses 9, 42, 46, 47 lasers 19, 60
chemicals with 23 letters, poison pen 31, 37 /
cars, tire tracks 34 ! lie detectors 47 teeth, dental records 58, 59
cartridge cases 61 fakes 44, 66 literary forensics 36, 37 television, closed-circuit 17, 46
casts, shoeprints 35 fibers, trace evidence 24 Locard’s exchange principle 6, terrorism 23, 33
CCTV (closed-circuit television) fingerprints 16, 43 24 tire tracks 34
17, 46 history 64 luminol 49 tool marks 35
chemicals, toxicology 22–23 matching 20–21 toxicology 22–23, 65
checks, forged 43 recording 21 ( trace evidence 24–25, 67
chromatography 37 recovering 18–19 mass spectrometry 23, 33 tracks 34
clothing, trace evidence 24 revealing 19 microscopes, electron 25 twins, identical 18, 55
cocoa powder, revealing fingertip searches 9 money
fingerprints 19 fire bank fraud 36 0
colors, chromatography 37 arson attacks 30–31, 38–39 forged bills 42–43, 44 ultraviolet light 19, 45
computers fire extinguishers 33 murder 54–55, 62–63
bank fraud 36 investigating 32–33 2
computer forensics 31, 36, 42 firearms analysis 54, 55, 60–61, + watches, counterfeit 45
identifying criminals 47 65 paint, trace evidence 25 witnesses 9, 42, 46, 47
matching fingerprints 21 footprints 24 paintings, forgeries 44, 45, 66 writing
counterfeit goods 44, 45, 66 forensic anthropology 58–59 paper, impressions on 37 handwriting analysis 31, 37
courts 6, 10 forensic photography 10–11 passports, forgeries 45 impressions on paper 37

"$,/08-&%(.&/54
Dorling Kindersley would like to thank Precision Smith 6bl; Brownie Harris 36–37c; Ed Kashi 19tl, King–Holmes 21cl; Robert Longuehaye, NIBSC 56b;
Printing Ltd. for help with the forgery photoshoot, 19br; Thom Lang 6t; Reuters 23br; Tom Salyer 45cr; Jerry Mason 46bl; Alfred Pasieka 20br; Philippe
and Ron Cook for advising on fingerprint patterns. Joseph Sohm 9tr; Bill Stormont 32c; Zefa 2–3, 18, Psaila 44bc; Sandia National Laboratories 19cr;
27cra. DK Images: The British Museum 44cr. ECB: Dr. Jurgen Scriba 22; Tek Image 9bl, 66b; Sheila
Index: Hilary Bird 44cb. Empics Ltd: AP 58; AP / Elise Amendola 33tr; Terry 35tl; Geoff Tompkinson 23tr; Michel Viard/
Proofreader: Kitty Nosworthy AP/Douglas C. Pizac 60r; John Giles 9c; Mike Peter Arnold Inc. 25cr. TopFoto.co.uk: 45tl.
Illustrator: Mark Walker Hutmacher 32cr; PA Photos 13tl, 67; Chris Parkiap
11cl; Chris Young 12. Picture courtesy of Foster & All other images © Dorling Kindersley
Picture Credits Freeman Ltd: 37bl, 37bc, 45cla. Getty Images: For further information see: www.dkimages.com
The publisher would like to thank the following for Peter Dawson 11br; Sam Diephuis 34c; Hulton
their kind permission to reproduce their images: Archive 63bl; Fernando Laszlo 59bc; Steve Liss 61t, Solutions to the activities
61c. Mary Evans Picture Library: 64. Esther Neate Page 45 The authentic identity card is the
(Key: a=above; b=below/bottom; c=center; f=far; (www.neateimaging.com): 49c, 49cl. popperfoto. one belonging to Mary Lynham. There are five
l=left; r=right; t=top) com: 10–11c. Reuters: Viktor Korotayev 60l. Rex mistakes on Juan Castalino’s card: the hologram
Academic Press: 35tr. Alamy Images: Bloom Features: Lehtikuva Oy 44clb; Sonny Meddle 55fcr, is wrong; the card number is too short; the
Works Inc. 4, 6; Simon Clay 46c; IIene MacDonald 71cr; MGG 11cra; Sipa Press 9tl. The Ronald Grant issue date is nonexistant; “last name” is spelled
57br; SHOUT 49tl; Stock Connection 47c; Jack Archive: 65b. Science Photo Library: 21tl, 24cb, incorrectly; the stamp over the photograph
Sullivan 23cr; Phil Talbot 34tl. Camera Press: 48bc, 59tl, 59c; Dr. Jeremy Burgess 25tr; Michael is missing.
Gamma 13tr. Corbis: Nogues Alain 34bl; Archivo Donne 11tl; Mauro Fermariello 13cr, 21br, 25tl, Page 57 Suspect 2.
Iconografico, S.A. 65tr; Bettmann 66t; Andrew 49cra, 61br; Spencer Grant 13cl; Steve Page 61 Bullet 3.
Brookes 23tl, 57tl; L. Clarke 24bl; Richard Hamilton Gschmeissner 24cr; Insolite Realite 57tr; James
There’s a crime
wave in the city:
robbery, fraud,
arson, and murder!

Using the tools of forensic science,


along with tricks of the trade
developed by real detectives, you’ll
WARNING! Do not look into the
investigate each crime, assemble direct sunlight with the magnifying glass
as this can severely damage your eyes.
Do not leave the magnifying glass in
the evidence, and find the culprit. direct sunlight–danger of fire.
Conforms to ASTM D-4236.

Are you ready to get


DK Publishing
375 Hudson Street, New York, NY 10014
Tourmaline Editions Inc.
662 King Street West, Suite 304

on someone’s case?
Toronto ON M5V 1M7
Keep address for reference.
Made in China.

Discover more at
www.dk.com

You might also like