Professional Documents
Culture Documents
(eTextbook)
Visit to download the full and correct content document:
https://ebookmass.com/product/criminal-investigation-11th-edition-pdf-etextbook/
| CONTENTS
4 5
Physical Evidence 80 Interviewing and
Introduction 81 Interrogation 121
Class versus Individual Characteristics 81 Introduction 122
Comparison Samples 82 Interviews and Interrogations: Similarities and
Differences 122
Soil and Pollen 83
Locating and Handling Soil Evidence 84 Objectives of Interviewing 123
Footwear, Foot, and Tires: Prints and Impressions 84 Objectives of Interrogation 124
Preserving Residue Prints 85 Qualifications of Interviews and Interrogators 124
Preserving Impressions 86 Time, Place, and Setting of Interviewing and
Preserving Shoe Impressions in Snow 87 Interrogation 125
Paint 87 The Interrogation Room 126
Glass 89 Preparation for the Interview or Interrogation 127
Handling Glass Evidence 91 The Witness 127
Fibers, Cloth Fragments, and Impressions 92 The Offense 127
String, Cord, Rope, and Tape 93 The Victim 127
The Suspect 127
Fingerprints 93
Basis for Fingerprint Identification 94 Witnesses: Motivations, Perceptions, and
Latent Fingerprints 94 Barriers 128
Conditions Affecting the Quality of Latent Persons with Physical Infirmities 129
Fingerprints 95
Locating Latent Fingerprints 96
Methods of Developing Latent Fingerprints 96
Chemicals 97
Developing Latent Fingerprints on Bodies 99
Collecting and Preserving Latent Prints 99
Marking and Identifying Print Lifts 100
Forensic Odontology 100
Identification 101
Dental Profiling 101
Bite Marks 102
Hair 104
viii CO N T E N TS
Guidelines for Conducting Photo Lineups, Live ATF Forensic Science Laboratories 222
Lineups, and Field Show-Ups 184 The FBI Crime Laboratory 223
Photo Lineups 184 Reference Files 225
Live Lineups 186
Problems in Crime Laboratories 226
Show-Ups 186
Lack of Training 227
Staged Crime Scenes 186 Lack of Accreditation 227
Cold Case Investigation 190 DNA Contamination 228
Investigative Support and Analytical Sentencing Mistakes and Poor Training 228
Tools 191 Backlog of Cases 229
Fusion Centers 191 Scandals and Mistakes within the FBI Crime Lab:
Intelligence Units 191 The Madrid Bombing Case 229
The Intelligence/Analytical Cycle 191 Code of Ethics 231
1. Planning and Direction 192 Key Terms 232
2. Collection 192 Review Questions 232
3. Processing 193
Internet Activities 232
4. Analysis and Production 193
5. Dissemination 193
6. Reevaluation 193 9
Surveillance Cameras and Facial Recognition Injury and Death
Software 193 Investigations 233
Crime Analysis 194 Introduction 234
Crime Scene Reconstruction 195 The Law 234
Criminal Profiling 198
The Medico-Legal Examination 235
Geographical Profiling 200
Remote Sensing 200 The Autopsy 235
Time-Event Charting and Link Analysis 201 Dead Body Evidence Checklist 235
The Internet 202 Postmortem Changes and Time of Death 236
Key Terms 203 Estimating Time of Death 236
Algor Mortis (Body Cooling) 236
Review Questions 203
Ocular Changes 237
Internet Activities 203 Stomach Contents 237
Rigor Mortis 237
Livor Mortis 237
8 Cadaveric Spasm 238
The Crime Laboratory 204 Decomposition 238
Introduction 205
Forensic Entomology 240
Crime Laboratories 206
Evidence from Wounds 242
The Morgue 207
Firearm Wounds 242
Digital Crime Labs 207
Incised and Stab Wounds 247
Expectations 208
Puncture Wounds 247
Measures of Crime Laboratory Effectiveness 209 Lacerations 247
Quality 209 Defense Wounds 249
Proximity 209 Strangulation Wounds 249
Timeliness 211
Responding to the National Academies of Science
(NAS) Report 212
Admissibility of Examination Results 212
Technologies 213
DNA Analysis 214
The Innocence Project 217
Next Generation Identification (NGI) Program 220
National Integrated Ballistic Information Network
Program 221
Handling Evidence in the Laboratory 222
Human Factors 222
Instrumental Analysis 222
x CO N T E N TS
Internet Crimes against Children 326 Information That Helps Identify Trafficking
Bullying and Cyberbullying 328 Offenders 353
Child Abduction 328 Search Warrants 353
The Parental Interview 329 A Single Lawyer for Multiple Trafficking Victims 353
Victimology of the Missing Child 329 The Role of Nongovernmental Organizations in
Abduction Patterns 330 Sex-Trafficking Cases 354
Checklist for Law Enforcement 330 Key Terms 354
Amber Alert Plan 331 Review Questions 354
Sex Offender Registration and Notification 332 Internet Activities 355
Crime in Schools 333
Threat Assessment 333 13
Classification of Threats 336 Robbery 356
The Role of Law Enforcement 337
Introduction 357
Investigating School Violence 337
Elements of the Crime 357
Key Terms 340 Taking 357
Review Questions 340 Carrying Away 358
Internet Activities 340 Personal Property 358
Another 358
Intent to Deprive Permanently 358
12 Use of Force, Fear, or Threat of Force 358
Human Trafficking 341
Overview: The Offense, the Victim, and the
Introduction 342 Offender 359
United States Law 342 Typology of Robberies 360
State Law 343 Visible Street Robberies 360
Antitrafficking Task Force 343 Use of Surveillance Cameras to Prevent Street
Training of Law-Enforcement Officers 343 Robberies 360
Carjackings 360
Trafficking versus Smuggling 344
Home-Invasion Robberies 361
When Smuggling Becomes Trafficking 344
Automatic-Teller-Machine Robberies 362
Forced Labor, Involuntary Servitude, Peonage, Taxicab Robberies 362
and Debt Bondage 345 Convenience-Store Robberies 364
Estimated Numbers of Victims 345 Truck-Hijacking Robberies 365
Types of Victims 345 Bank Robbery 365
Typical Characteristics of Traffickers 345 Bank Robbery Prevention 367
Industries Involved in Forced Labor 346
Responding to the Scene 370
Sex Trafficking 347 Action Stereotyping 371
Recruitment of Foreign Women for the Sex Trade 347 Physical Stereotyping 371
Delivery and Marketing of Trafficked Women 348 Situational Stereotyping 371
Locating Sex-Trafficking Victims 349
Follow-Up Robbery Investigative Procedures 372
Investigative Considerations in Sex-Trafficking Initial Investigation 372
Cases 349 Generating a Likeness of a Suspect 373
Victim-Centered Approach 349
Victim Interview Considerations 350
Interview Preparation 350
How to Dress 350
Immigration Status 351
The U-Visa 351
The T-Visa 352
Victim Living/Working Conditions 352
Confirming the Type of Employment 352
Things Victims May Be Lacking 352
Physical Indicators of Sex Trafficking 352
Psychological Effects of Sex Trafficking 352
Indications of Brothels 352
Social Networks and Personal Safety 353
xii CO N T E N TS
17 19
Arson and Explosives
Cybercrime 472 Investigations 509
Introduction 473
Introduction 510
Cybercrime: An Overview 473
Preliminary Investigation 511
Cybercrime Tools and Services Related to
Where and How Did The Fire Start? 511
Theft and Fraud 474
Two Factors Needed to Cause A Fire 511
Offenders and Offenses 475 Accidental Fires 512
Computer Intrusions 475 Spontaneous Heating and Ignition 513
Investigation of Cybercrimes 480 Burn Indicators 513
Federal Efforts 480 Alligatoring 513
State and Local Efforts 482 Depth of Char 513
Legal Considerations 482 Breaking of Glass 514
Consent Searches 482 Collapsed Furniture Springs 514
The Crime Scene 485 Distorted Light Bulbs 515
Computer and Peripheral Evidence 485 Temperature Determination 516
Crime Scene Processing 485
Key Terms 487
Review Questions 487
18
Agricultural, Wildlife, and
Environmental Crimes 488
Introduction 489
Dimensions of Agricultural, Wildlife, and
Environmental Crimes 490
Timber Theft 492
Theft of Agrichemicals 493
xiv CO N T E N TS
As with the previous editions, the first purpose of mentary, suggestions to a victim on how to avoid further
this book is to provide a useful tool for those on law- loss. Criminal Investigation’s crime-prevention sections
enforcement’s front lines. Thus, Criminal Investigation is give investigators the tools to accomplish this task.
once again filled with practical “how to” information, Finally, most investigative books tend to blur the dis-
case studies, and color photographs that illustrate impor- tinction between the roles of uniformed officers and detec-
tant points and checklists that can be adapted to the tives; we draw this line distinctly. Although everyone may
needs of local agencies. not agree with our dichotomizing, the uniformed officer’s
We have scrutinized all aspects of the book, downsiz- role must be recognized for the contribution it makes to
ing and deleting some content while elsewhere adding the ultimate success of an investigation.
new cutting-edge topics. The computer crime chapter
was dropped; an entirely new chapter, “Cybercrime,” THE ELEVENTH EDITION
takes its place. Another new chapter, “Human Traffick-
ing,” examines the crimes associated with it in the United
Criminal investigation is always evolving owing to scien-
States. Many portions of chapters have been substantially
tific, legal, and social developments, as well as to changes
or totally rewritten, including the guidelines for conduct-
in the behavior of criminals. Although many investigative
ing photo lineups, live lineups, and field show-ups; crime
techniques are fundamental and remain basically the same
scene reconstruction; and forensic odontology. These and
over time, significant changes also occur on a continuing
other changes are more fully identified shortly.
basis. In addition to having updated photographs, tables,
Criminal Investigation continues to differ from other texts,
figures, and citations, this edition reflects both the ongoing
and the differences are again reflected throughout this edi-
and the changing dimensions of criminal investigation by
tion. First, criminal investigation generally has been con-
including the following text updates and revisions:
ceived of, and touted as, an art. This approach depreciates
the precision required to conduct inquiries; it denies the • Chapter 1, “The Evolution of Criminal Investiga-
existence of, and adherence to, rigorous methods; and it tion and Forensic Science,” a historically oriented
associates criminal investigation with unneeded mysticism. chapter, has a revised introduction that provides a
Criminal investigation is in large part a science. The fact definition of the investigator and the investigation, as
that criminals are not always apprehended does not make well as an emphasis on the fundamental purpose of
it less so. The rational scientific method is, of necessity, investigation and forensic science and its role in dis-
supplemented by initiative and occasional fortuitous cir- covering the truth. A new section on jurisdiction has
cumstances, but it is the application of the method rather been added that discusses the geographic area and
than shrewd hunches that most frequently produces results. the legal/enforcement responsibility. The section
The most successful investigators are those who know how on personal identification now includes a focus on
to apply the rational scientific method; therefore, it is this biometrics.
method that we consistently use in Criminal Investigation.
• Chapter 2, “Legal Aspects of Investigation,”
A second major difference between this text and others
addresses legal topics that uniformed officers and
arises from our belief that writing about techniques takes
investigators encounter on a daily basis and that are
on more substance if one understands something of the
essential for the successful resolution of every crimi-
nature of the event being investigated. Thus we have dis-
nal case. The chapter includes updated information
cussed typologies—including offenses, offenders, and
on case law, including the scope of search of an auto-
victims—in depth, so that our readers not only take away
mobile (Arizona v. Gant), legality of a search based on
a more comprehensive understanding of criminal inves-
erroneous information officers received from another
tigation than they would from another textbook but also
jurisdiction (Herring v. United States), legality of an
have substantial information to use later as a reference.
arrest and search of a motorist even though state law
Third, because crime-prevention technology has been
required only the issuance of a summons (Virginia v.
a significant milestone for both the police and the public,
Moore), and legality of a search based on exigent cir-
we have inserted short sections on prevention in chapters
cumstances (Michigan v. Fisher).
where appropriate. The complexity of crime prevention
dictates that it is a specialization within police depart- • Chapter 3, “Investigators, the Investigative Process,
ments. Yet at the scene of a crime, the investigator may and the Crime Scene,” includes crime scene sketching
be in a unique position to make a few helpful, if rudi- and forensic mapping. There are revised and expanded
xvii
xviii PREFACE
discussions of infection diseases, digital video and • Chapter 10, “Sex-Related Offenses,” includes new
photography, Digital Image Management Systems sections on elder sexual abuse and the early recogni-
(DIMS), and Automated Digital Imaging of Crime tion and detection of sexual assault of the elderly.
Scenes using panoramic and laser scanning. A number
• Chapter 11, “Crimes against Children,” contains
of new photographs have been added, including those
expanded coverage of assaults against children,
pertaining to crime scene control and coordination,
including the signs that indicate abuse, shaken baby
detection using sense of smell, latent fingerprint kits,
syndrome, sex tourism, and Internet crimes against
and the use of a privacy screen to shield bodies. The
children. New sections cover unexplained child fatali-
chapter continues to emphasize its strong crime scene
ties, traumatic brain injuries, and child pornography.
and preliminary investigation focus.
• Chapter 12, “Human Trafficking,” is new to this
• Chapter 4, “Physical Evidence,” has been thoroughly edition and discusses U.S. and state laws concerning
revised and streamlined and includes new material human trafficking, the National Anti-Trafficking Task
on forensic odontology, questioned documents, and Force, forced labor, involuntary servitude, peonage,
new photographs pertaining to electrostatic dust print debt bondage, the delivery and marketing of women,
lifter (EDPL) and Hexagon OBTI. conducting victim interviews, the psychological
• Chapter 5, “Interviewing and Interrogation,” effects of sex trafficking on the victims, and informa-
includes new sections on witness intimidation, the tion on identifying brothels.
use of electronic recordings for interrogation, why • Chapter 13, “Robbery,” includes expanded discus-
people confess, the detection of deception, and recent sions of taxi cab robberies, various crime prevention
Supreme Court rulings relating to the rights of defen- strategies, and convenience store robberies. A new
dants to remain silent under the provisions of the section on police robbery prevention recommenda-
Miranda ruling. tions for convenience stores has been added.
• Chapter 6, “Field Notes and Reporting,” has been • Chapter 14, “Burglary,” The references and data in
completely reorganized so that it moves through the this chapter have been updated. Portions of this chap-
process of collecting information, recording notes, ter were rewritten for clarity.
understanding and completion of incident reports,
supervisory review and alternative dispositions, • Chapter 15, “Larceny/Theft and White-Collar Crime”
follow-up investigations, and finally, the preparation includes new sections on mortgage frauds, Internet
of supplementary reports. frauds and scams, and senior citizens as fraud vic-
tims. The section on organized retail crime (ORC)
• Chapter 7, “The Follow-Up Investigation and Inves- includes a new case box on Target that explains their
tigative Resources,” has been thoroughly updated and approach to dealing with ORC. The section on how
includes revised sections on reinterviewing victims and identity theft occurs includes information on FBI
witnesses and the use of facial recognition software. scam letters as well as examples of these letters, debit
The section on conducting photo and live lineups has card skimming, and social security number theft. The
been updated to include new standards as well as section on health care fraud has been expanded to
forms to be used with each of the three types of line- include coverage of Medicare fraud. The section on
ups. The section on crime scene reconstruction now security and investment frauds includes updates on
includes a step-by-step guide to using each of the the Bernie Madoff scandal.
CSR models as well as examples of each. This chapter
also includes a number of new visuals pertaining to • Chapter 16, “Vehicle Thefts and Related Offenses,”
geoprofiling maps, the use of trained dogs to detect All statistics have been updated and show a contin-
odors of cadavers, and a link/association diagram. ued decrease in the number of reported auto thefts
in this country but the problem is still of national
• Chapter 8, “The Crime Lab,” includes an updated importance. Cloning of vehicles and obtaining titles
and expanded section on the measures of crime lab using fraudulant paperwork continues to increase. A
effectiveness and includes recent BAS findings and paragraph on Automated License Plate Recognition
recommendations regarding the nation’s forensic sci- Systems has been added to the materials on Major
ence system. A new section on the Next Generation Investigative Resources along with materials on the
Identification (NGI) program has been added. major involvement of The National Insurance Crime
• Chapter 9, “Injury and Death Investigations,” Bureau regarding the theft of heavy equipment.
includes a new section on the law regarding criminal • Chapter 17, “Cybercrime,” has been completely reor-
homicides and felony assaults, a new “dead body ganized and rewritten with the objective of preparing
checklist,” and an updated section on serial murders first responders with the information needed to per-
that includes a discussion of the myths and misconcep- form until a specialist arrives and what to do if one
tions about, and the possible causes of, serial murder. is not available. The chapter distinguishes between
PREFACE xix
cyber- and computer crime; chronicles cybercrime changes already mentioned, we have added a host of new
tools and services related to thefts and frauds; and photographs, figures, and tables to reinforce and expand
covers computer intrusions, malware, blended threats, the text coverage. A visual presentation of the book’s many
drive-bys, herders and botnets, viruses and worms, lists—which are so critical in a text that teaches profession-
time, logic, and email bombs, denial of services als and future professionals “how to” investigate crime—
attacks (DoSs), ransomware, dead drops, keyloggers, makes this material easy to digest. The learning aids in the
rootkits, and scareware. edition go beyond these visual elements, however:
• Chapter 19, “Arson and Explosives,” includes a new • Chapter-opening photographs, outlines, and learn-
section called “Know Your Explosives” which includes ing objectives draw readers in and serve as a road
a detailed description of the characteristics of various map to the chapter.
types of explosives as well as the ways in which they
• Chapter-opening overviews provide readers with
can be scientifically analyzed and detected. An entirely
a snapshot of the entire chapter and are excellent
new module has been added on “Improvised Explo-
review tools for readers who are preparing for exams.
sive Devices” in which we discuss the components of
IEDs and provide a series of new photographs that • Detailed captions accompany photographs, clarifying
illustrate the various types of commonly used IEDs. precisely what readers should be looking for and
A detailed discussion and photos of two of the more learning when examining each piece of art.
infamous cases involving IEDs occurring in the United
• End-of-chapter review sections featuring key-term
States in the last couple of years have been added.
lists, review questions, and Internet activities make
• Chapter 20, “Recognition, Control, and Investigation preparing for exams easier than ever.
of Drug Abuse,” includes expanded coverage of
As mentioned, we have retained our plentiful, widely
“cheese” heroine, codeine, opiate overdoses, crystal-
acclaimed “cases” within every chapter, ensuring that the
lized methamphetamine, synthetic marijuana (K2),
eleventh edition is not only the most current, definitive
drug trafficking and violence in Mexico, and new
text on criminal investigation but also the most practical
methods for producing meth. There is a new section
and relevant. And with the enhancements we have made
discussing the paradigm shift in how our nation is
to the learning aids, Criminal Investigation is, simply put,
addressing the war on drugs.
the most mastery-oriented text available for the course.
• Chapter 21, “Terrorism,” has received many updates
to reflect recent events regarding Al-Qaeda in Iraq,
Afghanistan, Yemen, and Somalia, as well as here in SUPPLEMENTS
the United States The section on Hizbollah includes
updates on the current presidential administration’s As a full-service publisher of quality educational prod-
efforts to normalize relations with it, as well as its ucts, McGraw-Hill does much more than just sell text-
involvement in Mexico, Canada, and the United books. The company creates and publishes an extensive
States. The section on HAMAS has also been updated array of print, video, and digital supplements for students
to reflect recent events and activities, including and instructors. This edition of Criminal Investigation is
recruiting and fundraising. There are new sections accompanied by a comprehensive supplements package.
addressing the threat of the Mexican drug trade,
homegrown terrorism, and domestic right-wing ter-
rorism. The section on investigation of terrorist activi-
FOR THE STUDENT
ties now has an expanded discussion of investigative Online Learning Center Website: This unique, book-specific
tools and techniques, including reference cards devel- website features interactive cases that not only are fun to
oped by New York state and the use of technology to explore but also are terrific learning tools. The website
coordinate and disseminate intelligence. also includes self-grading quizzes and other exercises to
assist students in mastering the concepts in the book.
• Chapter 22, “The Trial Process and the Investigator
Visit it at www.mhhe.com/swanson11e.
as a Witness,” has an expanded section on evaluating
the case to include information the prosecutor needs
to evaluate the same case. FOR THE INSTRUCTOR
• Instructor’s Manual and Testbank: Includes detailed
LEARNING AIDS chapter outlines, key terms, overviews, lecture notes,
transparency masters, and a complete testbank.
Working together, the authors and the editors have devel- • Computerized Testbank: This easy-to-use computerized
oped a format for the text that supports the goal of a read- testing program is for both Windows and Macintosh
able, practical, user-friendly book. In addition to the computers.
xx PREFACE
• PowerPoint Slides: Complete chapter-by-chapter slide Colleagues who have contributed photographs, forms,
shows feature text, art, and tables. and other illustrations are identified beginning on page
xxiii; thank you one and all. We would also like to thank
• Online Learning Center Website: Password-protected
another group of individuals who helped out in a variety
access is provided for important instructor support
of ways: Ross Gardner reviewed the new section of foren-
materials and additional resources.
sic mapping and made helpful suggestions, as did Cap-
• Course Management Systems: Whether you use tain John P. Slater (retired), Training Director, National
WebCT, Blackboard, e-College, or another course Institute for Truth Verification with respect to the CVSA
management system, McGraw-Hill will provide you II System. Special Agent, Joe Navarro, FBI (retired) was
with a cartridge that enables you either to conduct kind enough to provide us with most of the information
your course entirely online or to supplement your discussing the detection of deception. Chief Jack Lumpkin
lectures with online material. And if your school and Sgt. David Leedahl, Athens Clarke County (Georgia)
does not yet have one of these course management Police Department; Chief Dwayne Orrick, Cordele (Georgia)
systems, we can provide you with PageOut, an easy- Police Department; Chief Rick Boren, Lt. Ronnie Griffin,
to-use tool that allows you to create your own and Sgt. Doug Shafer, Columbus (Georgia) Police Depart-
course web page and access all material on the ment; Major Tolbert and Lt. Zapal, Savannah Police
Online Learning Center. Department; Bob Hopkins, Hillsborough County, Florida,
Sheriff’s Office gave us information to strengthen the
• Primis Online: A unique database publishing system
section on follow-up investigations; Commander Michael
that allows instructors to create a customized text
Frazier, Phoenix, Arizona, Police Department, was help-
from material in this text or elsewhere and deliver
ful with information on arson and explosives, as were
that text to students electronically as an e-book or in
Chief Richard Pennington and Officer R. Bonelli from the
print format via the bookstore.
New Orleans Police Department; Chief Lee Donahue and
• Videotapes: A wide variety of videotapes from the Major William Gulledge, Honolulu, Hawaii, Police Depart-
Films for the Humanities and Social Sciences series is ment; Kenneth V. Lanning, Supervising Special Agent of
available to adopters of the text. the Federal Bureau of Investigation and the National Cen-
ter for Missing and Exploited Children allowed us to
All the preceding supplements are provided free of
reprint in Chapter 11 (“Crimes against Children”) from his
charge to students and instructors. Orders of new (versus
previously published material on the topics of child moles-
used) textbooks help us defray the cost of developing
tation and child pornography. Major Andy Garrison and
such supplements, which is substantial. Please contact
Frank Broadrick, Northeast Georgia Police Academy,
your local McGraw-Hill representative for more informa-
reviewed the chapter on report writing and made good
tion on any of the preceding supplements.
suggestions for its revision. Steven Gottlieb, executive
director of the Alpha Group Center for Crime and Intelli-
gence Analyst Training, allowed us to adopt portions of
ACKNOWLEDGMENTS his textbook to explain the critical role of crime analysis in
law-enforcement investigations. Ron French of the Ecorse,
Without the kindness of many people throughout the Michigan, Fire Department provided updated commen-
country—literally from Alaska to Maine—this book could tary on where and how fires start, as well as on fire setting
not have been written. We are grateful for the support of and related mechanisms. Leigh Herbst from the University
our colleagues around the country who have contributed of Nebraska helped with the new chapter-opening and
case histories, reviewed portions of the manuscript within closing material.
their areas of expertise, written sections for inclusion in Chief Robert Davis, Lt. Rick Martinez, and Police Artist
the book, contributed photographs, forms, and other Gil Zamora, San Jose California Police Department, pro-
illustrations, or otherwise gone out of their way to be vided photographs for the robbery chapter. Lt. Anthony
helpful. Our continuing concern in writing these acknowl- Traina, Paterson (NJ) Police Department, provided infor-
edgments is that, inadvertently, we may have omitted mation and a photograph on using street surveillance
someone. If this is so, let us know so that we may correct cameras to prevent street robberies.
this oversight, and also please accept our apologies. Our Gene Lazarus, Florida State Fire College, Ocala, and
acknowledgments include persons who have contributed Steve Mraz, formerly with the Pinellas County, Florida,
to this edition and those who helped with earlier edi- Fire Academy, reviewed and contributed to the arson
tions. Some of the people identified have retired or taken chapter. Bob Quinn, Tom Costigan, Mike Rendina, Jim
on new responsibilities since assisting us, but, unless oth- Wilder, and Richard Frank, presently or formerly with the
erwise requested, we include their organizational affilia- Drug Enforcement Administration. Richard Souviron,
tion and status at the time of the original contribution, Chief Forensic Odontologist, Dade County Florida, Medi-
since we feel that the agencies then employing them are cal Examiners Office, was an early major contributor
also deserving of continued recognition. of material dealing with bite marks and dental evidence.
PREFACE xxi
Dr. Wally Graves, Medical Examiner for Lee, Henry, and tion supplied us with considerable information about his
Glades Counties, Florida, provided information on dental agency’s “Team Approach” in dealing with robbery
evidence. John Valor, forensic artist and photographer, cases. Detective David Spraggs of the Boulder, Colorado,
provided illustrations for the dental section. Dick Williams Police Department provided us with material used in the
of the FBI Crime Laboratory read the questioned-documents discussion of opening a cold case homicide investigation,
section and made a number of suggestions to clarify and along with several photographs. Laurie A. Ward, Crime
strengthen it. Don Hampton of the Springfield, Missouri, Scene Administrator, Laura Sheffield, Forensic Artist,
Police Department did the same for parts of the crime and Sheriff Grady C. Judd, Jr., all of the Polk County
scene chapter. We benefited also from the reviews and Sheriff’s Department Office in Barstow, Florida, pro-
research materials provided by Jim Halligan, formerly vided us with information on the use of forensic artists
with the Florida Department of Law Enforcement and to re-create images of a robbery suspect along with a
then a professor at Florida State University’s School of picture of the suspect at the time he was arrested. Ser-
Criminology. He was a superb teacher and a real friend. geant Scott Whittington of the Colorado Springs, Colo-
Special thanks to Lt. Greg Terp, commander of the rado, Police Department supplied us with a video photo
Miami-Dade Auto Theft Task Force, and to some special of a robbery in progress. Maryellin Territo and Sal Territo
people with the National Insurance Crime Bureau— devoted long hours to researching sources for the most
Special Agent Lawrence “Dave” Dempsey; Regional current information relating to all facets of criminal
Manager Ron Poindexter; Vice-President and General investigation.
Counsel Robert H. “Bob” Mason; and Member Relations A special thank you is extended to Mr. Ed Hueske for
Manager Ed Sparkman. his invaluable help and assistance on the Physical Evi-
Thanks to professor Gail Anderson of Simon Frazer dence and Crime Laboratory chapters. His forensics
University in Burnaby, B.C., Canada, for providing us expertise was instrumental in helping acquire photo-
with updated information on forensic entomology. Robert graphs and addressing new techniques in the area. Also,
Aristarco, Assistant Vice President for Corporate Com- a very special thanks to Ms. Jennifer Davis for her hard
munications, American Re-Insurance Company in Prince- work, research, and assistance in developing the book.
ton, New Jersey, allowed us to reprint material on arson She was an important coauthor on the “Crimes against
investigation published by his company. Linda Brown Children” chapter. Chief Jimmy Perdue, North Richland
and Robyn Royall of Help A Child, Inc. and SAVE (Sex- Hills, Texas Police Department; Chief Richard Wiles, Dep-
ual Assault Victim Examination Program) in Pinellas uty Chief Dianna Kirk, and Mr. Stuart Ed, El Paso, Texas
Park, Florida, provided us with all the material they use Police Department; Chief Robert Lehner and Deputy
to collect the physical evidence of sexual assault cases. Chief Chuck Tilby, Eugene, Oregon Police Department;
Dave Crosbie of the Burnsville Minnesota Fire Depart- and Chief David Kunkle, Dallas Police Department, pro-
ment provided us with photos for the “Arson and Explo- vided opportunities within their departments for acquir-
sives” chapter. Michael Dorn of Dorn’s, Inc. provided us ing photographs and learning new techniques in the
with current information on crimes in schools. Dr. Thomas investigative process. Dr. Kall Loper has coauthored the
B. Kelley of Florida State University in Panama City “Computer Crime” chapter in previous editions, and
(Department of Criminology and Criminal Justice) pro- some of his work was continued in this edition. Dr. David
vided us with both narrative information on underwater Carter, Dr. Richard Holden, Dr. Jonathon White, and
crime scene investigation and photographs. Debbie Mr. Doug Bodrero, Institute for Intergovernmental Rela-
Lewis, Records Custodian, William A. Pellan, Director of tions (Tallahassee, Florida), offered important informa-
Forensic Investigations in Pasco and Pinellas Counties, tion on terrorism and intelligence gathering analysis that
Largo, Florida, and John R. Thogmartin, M.D. provided highlighted the “Terrorism” chapter.
numerous photographs for Chapter 9 (“Injury and Death We would also like to thank Professor Barry Glover
Investigations”) and Chapter 10 (“Sex-Related Offenses”). and Ashlee Castle of the Department of Criminal Justice,
Sergeant Jim Markey of the Sex Crimes Unit of the Phoenix, Saint Leo University, Saint Leo, Florida for providing us
Arizona, Police Department supplied us with informa- with the material in Chapter 9, Injury and Death Investi-
tion on how to reopen cold case sex crimes; he also pro- gation, on the discussion of the Utilization of Criminal
vided us with a photograph. Robert Parker, Director, and Justice College Students to Evaluate Cold Cases. “We also
Major Raul M. Ubieta, Miami-Dade (Florida) Police would like to thank Sharon Ostermann for graciously and
Department, supplied us with their agency’s Robbery cheerfully typing up major portions of this edition. Her
Standard Operating Procedure along with model form constructive criticism, research skills, and editing greatly
letters sent to robbery victims. Greg C. Pauley of the improved the final product.”
Temple Terrace, Florida, Police Department provided us This eleventh edition of the book benefited from a
with a computer-generated composite image as well as counsel of reviewers. Thanks to:
a police mug shot of a robbery suspect at the time he
was arrested. Lieutenant Ted Snodgrass of the Las Vegas, Preston Baity, Milwaukee Area Technical College
Nevada, Metropolitan Police Department Robbery Sec- Geriann Brandt, Maryville University
xxii PREFACE
We are grateful to our colleagues from around the country Columbus, Georgia, Police Department
who have been kind enough to contribute photographs, Georgia Bureau of Investigation
forms, and other figures to the text. The inclusion of such Savannah Police Department
material helps ensure the relevancy and usefulness of the
text for all readers in all states. For this, we are indebted Idaho
to the following individuals, departments, and agencies: Idaho Bureau of Investigation
Alaska Illinois
State of Alaska Scientific Crime Detection Laboratory Chicago Crime Laboratory
Chicago Police Department
Arizona Cook County, Illinois, Sheriff’s Department
Phoenix, Arizona, Police Department Illinois Environmental Protection Agency
California Illinois State Police
California Bureau of Livestock Identification
Indiana
Kern County, California, Sheriff’s Department
Indiana State Police
Los Angeles County Sheriff’s Department
Riverside County, California, Sheriff’s Department Iowa
San Bernardino County, California, Sheriff’s Iowa Criminalistic Laboratory, Department
Department of Public Safety
San Diego County Sheriff’s Department State Historical Society of Iowa
San Jose Police Department
Santa Ana, California, Police Department Kansas
Santa Barbara County, California, Sheriff’s Wichita, Kansas, Police Department
Department
Kentucky
Colorado Kentucky State Police
Westminster, Colorado, Police Department
Maine
Delaware Lewiston, Maine, Police Department
Delaware State Police
Maryland
Florida The SANS Institute
Big Bend Bomb Disposal Team, Tallahassee, Florida
Dade County Medical Examiner Department, Miami, Massachusetts
Florida Massachusetts Environmental Police
Florida Department of Law Enforcement National Fire Protection Association
Leon County Sheriff’s Department, Tallahassee,
Florida Michigan
Miami-Dade Police Department Ecorse, Michigan, Fire Department
Pinellas County, Florida, Public Health Unit, Sexual Sterling Heights, Michigan, Police Department
Assault Victim Examination Program Minnesota
Pinellas County, Florida, Sheriff’s Office Minneapolis, Minnesota, Police Department
Polk County Sheriff’s Office Minnesota Department of Health
Port Orange, Florida, Police Department
St. Petersburg, Florida, Police Department Missouri
Tallahassee Regional Crime Laboratory, Florida Regional Criminalistics Laboratory, Metropolitan
Department of Law Enforcement Kansas City, Missouri
Tampa, Florida Fire Department Springfield, Missouri, Police Department
Tampa, Florida Police Department St. Louis County, Missouri, Police Department
St. Louis Police Department
Georgia
Athens-Clarke County, Georgia, Police Department New Jersey
Atlanta Police Department New Jersey State Police
Cordele, Georgia, Police Department Paterson Police Department
xxiii
xxiv I N A P P R E C I AT I O N
1
The Evolution
of Criminal
Investigation and
Forensic Science
CHAPTER OBJECTIVES
m FIGURE 1-2 Pinkerton at work m FIGURE 1-3 Butch Cassidy’s Pinkerton record
Allan Pinkerton, President Lincoln, and General McClellan at Note the “P.N.D.A.” initials on the first line, which stand for
Antietam, Maryland, about October 3, 1862. Born in Scotland, Pinkerton National Detective Agency. Pinkerton agents were
Allan Pinkerton was the son of a police sergeant. He found highly successful in combating the bank and train robbers of
employment as a barrel maker and advanced to supervisor. the Old West, such as the Hole in the Wall gang, so named
At the same time, this red-headed, strong-willed man because of the small opening through rocky walls that led
advocated more voice in government for ordinary people, to the valley in Johnson County, Wyoming, used as their
a position that resulted in him becoming a wanted man. hideout. As many as 40 bandits may have lived there in
Narrowly avoiding arrest on his wedding day, Pinkerton six cabins. Butch Cassidy and the Sun Dance Kid were both
and his wife fled to America, surviving a shipwreck while members of the Hole in the Wall gang at various times.
en route. He started a successful barrel-making company. (Courtesy Wyoming State Archives and Historical Department)
While owner of that business, his initiative led to the arrest
of counterfeiters. This gave him an appetite for police work,
his father’s profession, and changed his life and American photograph them.21 He sent the photographs to Pinkerton
policing forever. (Courtesy Pinkerton’s Archives) files, and within a year the Reno gang was smashed.22
Pinkerton also collected photographs of jewel thieves and
other types of criminals and photographed horses to pre-
violent time, they sometimes used harsh and unwise vent illegal substitutions before races.23 The Pinkertons
methods. For instance, suspecting that they had found also pushed Butch Cassidy (Robert Parker) and the Sun
the hideout of Jesse James’s gang, Pinkerton agents Dance Kid (Harry Longabaugh) into leaving the United
lobbed in a 32-pound bomb, killing a boy and injuring a States for South America, where they were reportedly
woman.20 killed by Bolivian soldiers at San Vincente in 1909 (Fig-
Pinkerton understood the importance of information, ure 1-3.) Because of their better-known antilabor activi-
records, and publicity and made good use of all of them. ties, the Pinkertons’ other work often is overlooked. But
For example, in 1868, Pinkerton agent Dick Winscott took they were the only consistently competent detectives
on the Reno gang. Winscott located Fred and John Reno available in this country for over 50 years24 and provided
and, after a drinking bout, persuaded them to let him a good model for government detectives.
6 C H A P T E R 1 T H E E V O L U T I O N O F C R I M I N A L I N V E S T I G AT I O N A N D F O R E N S I C S C I E N C E
b FIGURE 1-4
NYPD rogues’ gallery
Uniformed officers of the New York
City Police Department maintaining
a rogues’ gallery in the detective
bureau, circa 1896. Police
departments have used rogues’
galleries since the late 1850s.
(Library of Congress)
State Highway Patrol and the State Bureau of Investigation bery and kidnapping.35 During the Depression, some
(SBI). In such arrangements the crime laboratory may be a people saw John Dillinger, “Pretty Boy” Floyd, and Bonnie
separate department or part of the state investigative agency. and Clyde (Figures 1-6 and 1-7) “as plain folks” and did
Similarly, casino gaming enforcement may be a function not grieve over a bank robbery or the kidnapping of a
of a state police agency or a state gaming commission.
After Prohibition was adopted nationally in 1920, the
Bureau of Internal Revenue was responsible for its
enforcement. Eventually the ranks of the bureau’s agents
swelled to a massive 4,000.34 Because the Bureau of Inter-
nal Revenue was lodged in the Department of the Trea-
sury, these federal agents were referred to as T-men.
In 1908 U.S. Attorney General Charles Bonaparte cre-
ated the embryo of what was later to become the Federal
Bureau of Investigation (FBI) when he ordered that inves-
tigations were to be handled by a special group. In 1924
J. Edgar Hoover (1895–1972) assumed leadership of the
Bureau of Investigation; 11 years later Congress passed a
measure giving the FBI its present designation.
When Prohibition was repealed by the Eighteenth
Amendment to the U.S. Constitution in 1933, many for-
mer bootleggers and other criminals turned to bank rob-
b FIGURE 1-8
FBI crime laboratory
In 2003 the FBI occupied its 463,000
square foot state-of-the-art crime
laboratory, which cost $130 million.
(© AP Photo/Charles Dharapak)
HISTORICAL MILESTONES OF FORENSIC SCIENCE 9
Supreme Court became unusually active in hearing cases uniquely identity, or verify the identity of, an individual
involving the rights of criminal suspects and defendants. through characteristics of the human body. Biometrics is
Its decisions focused on two vital areas: (1) search and superior to eye witness identification because it has a sci-
seizure and (2) the right to legal representation. Among entific foundation.
those cases was Miranda v. Arizona (1966), which estab- Historically, there have been three major scientific sys-
lished the well-known “Miranda rights.” Miranda and tems of biometric-based personal identification of crimi-
other decisions infuriated the police, who felt that the nals in wide use: anthropometry, dactylography, and
Supreme Court had “tied their hands.” deoxyribonucleic acid (DNA) typing. The first was rela-
So what did the due process revolution and subse- tively short lived. The second, dactylography, or finger-
quent Supreme Court decisions really change? Question- print identification, remains in use today throughout the
able and improper police procedures and tactics were world. The third, DNA, is a relatively contemporary
greatly reduced. In turn, this created the need to develop development.
new procedures and tactics and to make sure that officers
were well trained in their uses. To no small extent, this Anthropometry
cycle has hastened the continuing professionalization of Anthropometry was developed by Alphonse Bertillon
the police while also asserting the principle that the (1853–1914), who is rightly regarded as the father of crim-
action of police officers anywhere may be subject to close inal identification (Figure 1-9). The first method of criminal
scrutiny by the Supreme Court. identification that was thought to be reliable, anthropometry
“was based on the fact that every human being differs
from every other one in the exact measurements of their
HISTORICAL MILESTONES body, and that the sum of these measurements yields a
OF FORENSIC SCIENCE characteristic formula for each individual.”38 Figure 1-10
depicts a New York City police detective taking one type
of measurement used in the “Bertillon system.”
The origins of criminalistics or forensic science are largely
European. Forensic science draws from diverse disci-
plines, such as geology, physics, chemistry, biology, and
mathematics, to study physical evidence related to crime.
The first major book describing the application of scien-
tific disciplines to criminal investigation was written in
1893 by Hans Gross, a public prosecutor and later a judge
from Graz, Austria.37 Translated into English in 1906 under
the title Criminal Investigation, it remains highly respected
today as the seminal work in the field.
The Frenchman Edmond Locard established the first
forensic laboratory in Lyon in 1910. All crime scenes are
searched on the basis of Locard’s exchange principle,
which asserts that when perpetrators come into contact
with the scene, they will leave something of themselves
and take away something from the scene, for example,
hairs and fibers. Expressed somewhat differently, Locard’s
exchange principle states that there is something to be
found. He is also recognized as the father of poreoscopy,
the study of pores and for advocating that if there were
12 points of agreement between two compared finger-
prints the identity was certain.
Forensic science enjoys periods of stability, but on the
whole it is dynamic and in constant progress. To illustrate
this principle of dynamic change, the histories of two
commonly used services—biometric-based personal iden-
tification and firearms identification—are traced in this
section.
m FIGURE 1-9 Bertillon
BIOMETRIC BASED PERSONAL
Alphonse Bertillon (1853–1914), the father of personal
IDENTIFICATION
identification. In 1882, he began using his system on those
Biometrics is from the Greek meaning life measurement. incarcerated in Paris’s Palais de Justice. (Courtesy Jacques Genthial)
The most important goal of biometric measurements is to
Another random document with
no related content on Scribd:
DANCE ON STILTS AT THE GIRLS’ UNYAGO, NIUCHI
I see increasing reason to believe that the view formed some time
back as to the origin of the Makonde bush is the correct one. I have
no doubt that it is not a natural product, but the result of human
occupation. Those parts of the high country where man—as a very
slight amount of practice enables the eye to perceive at once—has not
yet penetrated with axe and hoe, are still occupied by a splendid
timber forest quite able to sustain a comparison with our mixed
forests in Germany. But wherever man has once built his hut or tilled
his field, this horrible bush springs up. Every phase of this process
may be seen in the course of a couple of hours’ walk along the main
road. From the bush to right or left, one hears the sound of the axe—
not from one spot only, but from several directions at once. A few
steps further on, we can see what is taking place. The brush has been
cut down and piled up in heaps to the height of a yard or more,
between which the trunks of the large trees stand up like the last
pillars of a magnificent ruined building. These, too, present a
melancholy spectacle: the destructive Makonde have ringed them—
cut a broad strip of bark all round to ensure their dying off—and also
piled up pyramids of brush round them. Father and son, mother and
son-in-law, are chopping away perseveringly in the background—too
busy, almost, to look round at the white stranger, who usually excites
so much interest. If you pass by the same place a week later, the piles
of brushwood have disappeared and a thick layer of ashes has taken
the place of the green forest. The large trees stretch their
smouldering trunks and branches in dumb accusation to heaven—if
they have not already fallen and been more or less reduced to ashes,
perhaps only showing as a white stripe on the dark ground.
This work of destruction is carried out by the Makonde alike on the
virgin forest and on the bush which has sprung up on sites already
cultivated and deserted. In the second case they are saved the trouble
of burning the large trees, these being entirely absent in the
secondary bush.
After burning this piece of forest ground and loosening it with the
hoe, the native sows his corn and plants his vegetables. All over the
country, he goes in for bed-culture, which requires, and, in fact,
receives, the most careful attention. Weeds are nowhere tolerated in
the south of German East Africa. The crops may fail on the plains,
where droughts are frequent, but never on the plateau with its
abundant rains and heavy dews. Its fortunate inhabitants even have
the satisfaction of seeing the proud Wayao and Wamakua working
for them as labourers, driven by hunger to serve where they were
accustomed to rule.
But the light, sandy soil is soon exhausted, and would yield no
harvest the second year if cultivated twice running. This fact has
been familiar to the native for ages; consequently he provides in
time, and, while his crop is growing, prepares the next plot with axe
and firebrand. Next year he plants this with his various crops and
lets the first piece lie fallow. For a short time it remains waste and
desolate; then nature steps in to repair the destruction wrought by
man; a thousand new growths spring out of the exhausted soil, and
even the old stumps put forth fresh shoots. Next year the new growth
is up to one’s knees, and in a few years more it is that terrible,
impenetrable bush, which maintains its position till the black
occupier of the land has made the round of all the available sites and
come back to his starting point.
The Makonde are, body and soul, so to speak, one with this bush.
According to my Yao informants, indeed, their name means nothing
else but “bush people.” Their own tradition says that they have been
settled up here for a very long time, but to my surprise they laid great
stress on an original immigration. Their old homes were in the
south-east, near Mikindani and the mouth of the Rovuma, whence
their peaceful forefathers were driven by the continual raids of the
Sakalavas from Madagascar and the warlike Shirazis[47] of the coast,
to take refuge on the almost inaccessible plateau. I have studied
African ethnology for twenty years, but the fact that changes of
population in this apparently quiet and peaceable corner of the earth
could have been occasioned by outside enterprises taking place on
the high seas, was completely new to me. It is, no doubt, however,
correct.
The charming tribal legend of the Makonde—besides informing us
of other interesting matters—explains why they have to live in the
thickest of the bush and a long way from the edge of the plateau,
instead of making their permanent homes beside the purling brooks
and springs of the low country.
“The place where the tribe originated is Mahuta, on the southern
side of the plateau towards the Rovuma, where of old time there was
nothing but thick bush. Out of this bush came a man who never
washed himself or shaved his head, and who ate and drank but little.
He went out and made a human figure from the wood of a tree
growing in the open country, which he took home to his abode in the
bush and there set it upright. In the night this image came to life and
was a woman. The man and woman went down together to the
Rovuma to wash themselves. Here the woman gave birth to a still-
born child. They left that place and passed over the high land into the
valley of the Mbemkuru, where the woman had another child, which
was also born dead. Then they returned to the high bush country of
Mahuta, where the third child was born, which lived and grew up. In
course of time, the couple had many more children, and called
themselves Wamatanda. These were the ancestral stock of the
Makonde, also called Wamakonde,[48] i.e., aborigines. Their
forefather, the man from the bush, gave his children the command to
bury their dead upright, in memory of the mother of their race who
was cut out of wood and awoke to life when standing upright. He also
warned them against settling in the valleys and near large streams,
for sickness and death dwelt there. They were to make it a rule to
have their huts at least an hour’s walk from the nearest watering-
place; then their children would thrive and escape illness.”
The explanation of the name Makonde given by my informants is
somewhat different from that contained in the above legend, which I
extract from a little book (small, but packed with information), by
Pater Adams, entitled Lindi und sein Hinterland. Otherwise, my
results agree exactly with the statements of the legend. Washing?
Hapana—there is no such thing. Why should they do so? As it is, the
supply of water scarcely suffices for cooking and drinking; other
people do not wash, so why should the Makonde distinguish himself
by such needless eccentricity? As for shaving the head, the short,
woolly crop scarcely needs it,[49] so the second ancestral precept is
likewise easy enough to follow. Beyond this, however, there is
nothing ridiculous in the ancestor’s advice. I have obtained from
various local artists a fairly large number of figures carved in wood,
ranging from fifteen to twenty-three inches in height, and
representing women belonging to the great group of the Mavia,
Makonde, and Matambwe tribes. The carving is remarkably well
done and renders the female type with great accuracy, especially the
keloid ornamentation, to be described later on. As to the object and
meaning of their works the sculptors either could or (more probably)
would tell me nothing, and I was forced to content myself with the
scanty information vouchsafed by one man, who said that the figures
were merely intended to represent the nembo—the artificial
deformations of pelele, ear-discs, and keloids. The legend recorded
by Pater Adams places these figures in a new light. They must surely
be more than mere dolls; and we may even venture to assume that
they are—though the majority of present-day Makonde are probably
unaware of the fact—representations of the tribal ancestress.
The references in the legend to the descent from Mahuta to the
Rovuma, and to a journey across the highlands into the Mbekuru
valley, undoubtedly indicate the previous history of the tribe, the
travels of the ancestral pair typifying the migrations of their
descendants. The descent to the neighbouring Rovuma valley, with
its extraordinary fertility and great abundance of game, is intelligible
at a glance—but the crossing of the Lukuledi depression, the ascent
to the Rondo Plateau and the descent to the Mbemkuru, also lie
within the bounds of probability, for all these districts have exactly
the same character as the extreme south. Now, however, comes a
point of especial interest for our bacteriological age. The primitive
Makonde did not enjoy their lives in the marshy river-valleys.
Disease raged among them, and many died. It was only after they
had returned to their original home near Mahuta, that the health
conditions of these people improved. We are very apt to think of the
African as a stupid person whose ignorance of nature is only equalled
by his fear of it, and who looks on all mishaps as caused by evil
spirits and malignant natural powers. It is much more correct to
assume in this case that the people very early learnt to distinguish
districts infested with malaria from those where it is absent.
This knowledge is crystallized in the
ancestral warning against settling in the
valleys and near the great waters, the
dwelling-places of disease and death. At the
same time, for security against the hostile
Mavia south of the Rovuma, it was enacted
that every settlement must be not less than a
certain distance from the southern edge of the
plateau. Such in fact is their mode of life at the
present day. It is not such a bad one, and
certainly they are both safer and more
comfortable than the Makua, the recent
intruders from the south, who have made USUAL METHOD OF
good their footing on the western edge of the CLOSING HUT-DOOR
plateau, extending over a fairly wide belt of
country. Neither Makua nor Makonde show in their dwellings
anything of the size and comeliness of the Yao houses in the plain,
especially at Masasi, Chingulungulu and Zuza’s. Jumbe Chauro, a
Makonde hamlet not far from Newala, on the road to Mahuta, is the
most important settlement of the tribe I have yet seen, and has fairly
spacious huts. But how slovenly is their construction compared with
the palatial residences of the elephant-hunters living in the plain.
The roofs are still more untidy than in the general run of huts during
the dry season, the walls show here and there the scanty beginnings
or the lamentable remains of the mud plastering, and the interior is a
veritable dog-kennel; dirt, dust and disorder everywhere. A few huts
only show any attempt at division into rooms, and this consists
merely of very roughly-made bamboo partitions. In one point alone
have I noticed any indication of progress—in the method of fastening
the door. Houses all over the south are secured in a simple but
ingenious manner. The door consists of a set of stout pieces of wood
or bamboo, tied with bark-string to two cross-pieces, and moving in
two grooves round one of the door-posts, so as to open inwards. If
the owner wishes to leave home, he takes two logs as thick as a man’s
upper arm and about a yard long. One of these is placed obliquely
against the middle of the door from the inside, so as to form an angle
of from 60° to 75° with the ground. He then places the second piece
horizontally across the first, pressing it downward with all his might.
It is kept in place by two strong posts planted in the ground a few
inches inside the door. This fastening is absolutely safe, but of course
cannot be applied to both doors at once, otherwise how could the
owner leave or enter his house? I have not yet succeeded in finding
out how the back door is fastened.