Professional Documents
Culture Documents
This Palgrave Macmillan imprint is published by the registered company Springer Nature
Switzerland AG.
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
To my beloved children Jackie and Sean for all their support, and my wife
Cathy, who provided outstanding comments and editing assistance.
Who would have ever guessed that a wife would be so good
at correcting her husband!
Contents
vii
viii CONTENTS
Index189
About the Author
ix
List of Figures
xi
List of Tables
xiii
CHAPTER 1
Introduction
Criminal victimization has been widely described by the actions and moti-
vations of the offender in committing the crime. This limited understand-
ing can lead to many viewing criminal victimization as random, senseless,
and unmanageable events where targets have very little input and control.
While the criminal is a key player in the criminal event, the targets, third
parties, the situation, and the physical setting play significant roles in influ-
encing the criminal’s decision to proceed with the attack. Criminals have
many advantages including the use of deception, but they are far from
invincible. Many targets possess considerable abilities and resources to
manage or prevent criminal victimization. In addition, many individuals
and professional guardians are willing to help them and are capable of
doing so (Fig. 1.1).
Offender Target
Crime
Victimization
lack of physical obstacles for committing crimes. They pay careful atten-
tion to observing walkways, paths, traffic patterns, and hours of operation
of public buildings and businesses. They look for blocks that lack vigilant
residents. Physical deterioration, vacancy, and vandalism of buildings and
public areas may signal vulnerability and lack of commitment to joint pro-
tective activities such as neighborhood watch groups.
risks (Hinman & Cook, 2001). The EAP can help the employee with
mental health services. Criminal justice Victims’ Advocates can provide
emergency, counseling, legal protection, and education services (Office of
Victims of Crime, 2012). Domestic violence advocates can provide shel-
ter, medical services, financial assistance, and emotional support.
The content in this book can help the reader enhance their capabilities to
reduce their risk of victimization. Criminals have many weapons and
deception is one the most powerful ones. Deception can disguise danger-
ous advances until the aggressor is ready to attack. Aggressors will use it to
keep their targets distracted, confused, and anxious. It can limit the tar-
get’s suspicion, alertness, and ability to set up defenses prior to the attack.
These tactics are less obvious forms of aggression, but they can be recog-
nized, predicted, and managed before an attack occurs.
Identifying and responding to aggressive advances has never been easy,
but modern social changes and technological advances have made it more
challenging. Modern technology makes it easier to communicate with
people from around the world, yet too many individuals know little about
their neighbors, coworkers, and classmates. Large urban centers, transi-
tional neighborhoods, and multicultural environments make it more dif-
ficult for individuals to know those physically close to them, and easier for
the wolves to blend in with the sheep. Increasing time spent with elec-
tronic communications can improve technical skills, yet expose user vul-
nerabilities. There is research that suggests that the increasing time spent
on electronic media may diminish the user’s ability to identify subtle
expressions, unspoken messages, and threatening behaviors during per-
sonal encounters (Dimitrius & Mazzarella, 2008; Goman, 2011). Those
who are preoccupied with their laptops, cell phones, or iPods may be too
distracted to notice dangerous and deceptive advances.
The information presented in this book will acknowledge and build on
existing research involving detection of deception, risk assessment, conflict
management, and crime prevention. It proposes that recognizing and
addressing deceptive advances early in the process is an important step in
reducing the risk of criminal victimization. This book incorporates lessons
learned from the author’s participation in post-incident analysis and RAM
1 STRONGER THAN WE THINK: MORE CAPABLE THAN WE KNOW 11
References
ASIS International. (2005). Workplace violence prevention and response guideline.
Alexandria, VA: ASIS International.
Borum, R., Fein, R., Vossekuil, B., & Berglund, J. (1999). Threat assessment:
Defining an approach for evaluating risk of targeted violence. Behavioral
Sciences & the Law, 17, 323–337.
Center for Conflict Management. (1996). Conflict management skills. Washington,
DC: Internal Revenue Service.
De Becker, G. (2002). Fear less: Real truth about risk, safety, and security in a time
of terrorism. Boston, MA, Little, Brown, and Company.
Dimitrius, J., & Mazzarella, W. (2008). Reading people. New York: Ballantine Books.
Drysdale, D., Modzeleski, W., & Simons, A. (2010). Campus attacks: Targeted
violence affecting institutions of higher education. Washington, DC: U.S. Secret
Service, U.S. Department of Education, and Federal Bureau of Investigation.
12 J. F. KENNY
Federal Bureau of Investigation. (2000). The school shooter: A threat assessment per-
spective. Quantico, VA: Critical Incident Response Group.
Federal Bureau of Investigation. (n.d.). Famous cases: The unabomber. Retrieved
on 4/10/19 from https://www.fbi.gov/history/famous-cases/unabomber
Fein, R., Voddekuil, B., & Holden, G. (1995). Threat assessment: An approach to
preventing targeted violence. Washington, DC: National Institute of Justice.
Fein, R., & Vossekuil, B. (1999). Assassinations in the United States: An opera-
tional study of recent assassins, attackers, and near-lethal approachers. Forensic
Science, 44(2), 321–333.
Gilligan, J. (1997). Violence. New York: Random House.
Goman, C. (2011). The silent language of leaders: How body language can help or
hurt. San Francisco, CA: Jossey-Bass.
Government Training Institute. (1998). National symposium on workplace vio-
lence. Washington, DC: Government Training Institute.
Grayson, B., & Stein, M. (2006). Attracting assault: Victims’ nonverbal clues.
Journal of Communication, 31(1), 68–75.
Hinman, D., & Cook, P. (2001). A multi-disciplinary team approach to threat
assessment. Journal of Threat Assessment, 1(1), 17–33.
Karmen, A. (2013). Crime victims. Belmont, CA: Wadsworth Cengage Learning.
Luckenbill, D. (1977). Criminal homicide as a situated transaction. Social Problems,
25, 176–186.
Musu-Gilletto, L., Zhang, A., Wang, K., Zhang, J., Kemp, J., Diliberto, M., et al.
(2018). Indicators of school crime and safety 2017. US Department of
Education, US Justice Department. Retrieved March 14, 2019 from https://
www.nces.ed.gov/pubs2018/2018036.pdf
Mustaine, E., & Tewksbery, R. (1998). Predicting risks of larceny theft victimiza-
tion: A routine activity analysis using refined lifestyles measures. Criminology,
36, 829–858.
National Threat Assessment Center. (2018). Enhancing school safety using a threat
assessment model: An operational guide for preventing targeted school violence.
Washington, DC: U.S. Secret Service.
O’Toole, M., & Bowman, A. (2012). Dangerous instincts: Use an FBI profilers
tactics to avoid unsafe situations. New York: Plume.
Occupational Safety and Health Administration. (2004). Guidelines for preventing
workplace violence for health and social service workers. Washington, DC: U.S.
Department of Labor.
Office of Victims of Crime. (2012). OVC help series for crime victims. Washington,
DC: U.S. Department of justice.
Planty, M. (2002). Third-party involvement in violent crime, 1993–1999.
Washington, DC: Bureau of Justice Statistics, U.S. Department of Justice.
Savage, D. (1990, November 14). Insane killer’s death sentence set aside. Los
Angeles Times. Retrieved March 14, 2019 from https://www.articles.latimes.
com/1990-11-14/news/mn-4169_1_death_sentence
1 STRONGER THAN WE THINK: MORE CAPABLE THAN WE KNOW 13
Introduction
The art of identifying deception is not something new, and it has been
utilized in many contexts. Over the past fifty years, numerous researchers
have attempted to identify and interpret both verbal and nonverbal com-
munications to help individuals make better judgments regarding busi-
ness associates, clients, acquaintances, intimates, witnesses, and suspects
in criminal cases. Identifying deception is an art rather than a science
because research has only been able to find weak associations between
interpersonal communications and deception. Most researchers agree
that recognizing deception is difficult, but individual skills can be
improved with proper training and practice. Effective training seeks to
develop and improve a person’s abilities to observe, listen, and interpret
deception. Practicing these skills can improve one’s ability to notice sub-
tle expressions, gestures, and body movements that contradict verbal
statements (Fig. 2.1).
to blend in with the sheep. Those with evil intentions may employ words
to distract, confuse, or manipulate others. While words can serve as their
trusted messengers, their emotions are not so loyal and can often betray
them. They may even provide clues as to their true intentions.
Detecting criminal approaches has become more important in an age of
increasing violent events and greater predator access. Recent mass shoot-
ings with rising body counts have left many feeling helpless with fears that
future killings will exceed the horrors of past tragedies. Personal informa-
tion detailing lifestyles, schedules, and assets is commonly available on
social media. While those with criminal intent may be highly skilled at
disguising their advances, they often unwittingly reveal clues to their true
intentions. Potential targets who detect deception prior to the attack can
choose to build up their defenses, secure help, or remove themselves from
the situation.
The ability to identify deception can expose potentially dangerous
coworkers, acquaintances, friends, intimates, and strangers. This skill can
help employers make better hiring decisions, and employees make better
2 THE ART OF IDENTIFYING DECEPTION 17
may have negative feelings toward the other person. They could also have
arthritis in their hands and it may be painful to engage in a strong hand-
shake. Those whose occupations involve the use of their hands (surgeons,
musicians, artists) may use soft handshakes to protect their hands from
injury. One way to confirm suspicions is to gather and interpret informa-
tion from various sources. This includes noticing inconsistent and
contradictory body movements, verbal communications, appearance
characteristics, and behaviors toward others.
Navarro (2008) contends that it is important to establish a baseline of
normal behaviors before attempting to identify deceptive ones. Knowing
the normal response to situations provides a point of comparison with the
person being observed. It helps to differentiate their normal behaviors
from those in response to stressful stimuli. For example, it is important to
establish a baseline on the person’s normal sitting habits, hand move-
ments, and facial expressions. Sudden changes in these behaviors can help
reveal how a person is processing information or reacting to emotional
events. Changes in a person’s behavior can also demonstrate her or his
interest in conversations or social interactions.
It is the context of the situation that provides the content’s true mean-
ing. The circumstances, gestures, and relationship of the parties may be
more revealing than the person’s statements. The words “I am going to
kill you” can cause a great deal of anxiety when initiated by a stranger,
criminal, or terrorist. They may cause little fear when initiated by a six-
year-old or a friend who is smiling. Threats like promises are easy to make,
but harder to honor. The alarming words speak more to the person’s
desire to frighten. They often betray the speaker by revealing frustration
and desperation, not intention. The nonverbal signals carry much more
impact than the verbal content. Pease and Pease (2004) contend that if the
body-language signals do not match the words, the person is probably
lying. For example, if the person covers their mouth with their fingers after
making a statement, it is almost as if their brain instructed the hand to
cover the mouth to block the deceitful words.
Facial Expressions
The face is used more than any other part of the body to cover up lies.
Liars can deliberately choose facial expressions such as smiles, nods, or
winks to hide their true feelings. These expressions help to fabricate con-
fidence, happiness, enthusiasm, and acceptance. Lieberman (2000) con-
tends that these types of facial expressions help to create favorable first
impressions so that the recipients are kinder in future evaluations of
that person.
Conversely, Ekman and Friesen (2003) suggest that the face can also
reveal a person’s true emotions. This happens spontaneously and emo-
tional expressions occur without the person even knowing it.
Matsumoto et al. (2011) contend that attempts to detect deception
should start with focusing on facial microexpressions because they are
involuntary. The expressions of concealed emotion happen in as fast as
one-fifteenth of a second as the individual will attempt to hide them
quickly. Facial expressions of emotion are the closest thing to a univer-
2 THE ART OF IDENTIFYING DECEPTION 21
sal language. Matsumoto et al. (2011) suggest that people express cer-
tain emotions on their faces in exactly the same ways independent of
race, culture, nationality, or any demographic variable. Since they are
immediate and often unconscious reactions, messages sent from the
eyes and mouths are difficult to control.
The eyes are often called “the windows to the soul”. They can be
accurate indicators of true feelings because the muscles in the eyes
respond automatically to external dangers and internal thoughts and
emotions. The eyes can send messages through the dilation or constric-
tion of the pupils. Pupils will dilate or become larger when the person
becomes excited. Adelson (2004) suggests that when people lie the pupil
size increases due to increased tension and concentration. Once they
have a moment to process the information, the pupils constrict. When
people are angry, their eyes can constrict. This is often referred to as
“beady eyes”.
On the other hand, eye gaze is a learned behavior from one’s culture.
Looking directly at others could mean that the person likes them or is
curious about them. It could also mean that the initiator may be attempt-
ing to threaten them. One of the most common misconceptions is that
failing to look someone directly in their eyes is a sign of deceit. This is typi-
cally neither a sign of deception nor of disinterest, but one of comfort
(Vrij, 2003). A person may look away to enhance the clarity of thoughts.
In addition, certain cultures believe that looking down or away is a sign of
respect. Argyle and Ingham (1972) found that in Japan and some South
American cultures extended eye contact is viewed as aggressive and disre-
spectful. The Japanese tend to look away or below the face.
Navarro (2012) states that some predators and habitual liars will engage
in greater eye contact as a way to deceive their targets. They consciously
do this in order to create the impression of being truthful. Pease and Pease
(2004) conducted an experiment and found that only thirty percent of the
liars consistently looked away. The other seventy percent of the liars main-
tained strong eye contact. They were caught in their lies only twenty-five
percent of the time.
The research on the use of smiles in deception is mixed. Many believe
that criminals will use smiles to reassure or reduce their target’s appre-
hension. This makes sense as genuine smiles are universally considered as
a sign that a person is happy to see them. One of the benefits is that it can
secure positive reactions from others. Other research suggests that crimi-
nals and common liars believe that smiling can be associated with lying;
22 J. F. KENNY
Body Movements
Many nonverbal clues are revealed in body movements because most peo-
ple cannot monitor or disguise them. Those who are lying or feeling guilty
must carry the knowledge of their deception. Many find it difficult to be
comfortable with this burden. Attempting to disguise their deception
places a very distressing cognitive load on them as they struggle to think
of answers to what would normally be very simple questions. Their dis-
comfort can be readily observed in body movements involving the legs,
feet, hands, torso, and gait.
Navarro (2008) contends that the feet and the legs are the most likely
body part to reveal a person’s true emotions. The farther away from the
brain a body part is positioned, the less awareness the person has of what
it is doing. He says that the face is the part of the body most often used to
conceal true sentiments. People have learned to lie with their faces since
childhood and, with practice, some can get good at it. Children are told
to put on their happy faces when relatives come to visit. While most people
know how to put on a happy face, few pay attention to the lower parts of
their body that reveal nervousness, anxiety, or happiness.
Navarro (2008) suggests that the movement of the feet and legs can
indicate discomfort and possibly deception. He says that discomfort is
2 THE ART OF IDENTIFYING DECEPTION 23
Vocal Indicators
Liars tend to be careful about their choice of words because they receive
the greatest amount of attention from others. The problem is that they
often mislead or disguise the truth. Words are easy to falsify because they
can be written down and rehearsed in advance. The involuntary vocal
2 THE ART OF IDENTIFYING DECEPTION 25
group Boko Haram has commonly used females as suicide bombers, espe-
cially in West Africa (Meservey & Vadyak, 2018). Females make good
suicide bombers because they draw less suspicion and normally wear loose-
fitting clothing that can hide bombs. In addition, cultural norms forbid
men from touching women in a way that is required to search for
explosives.
Fashion accessories are often worn to garner attention, but they should
be scrutinized when they appear to be excessive (De Becker et al., 2008).
Attacker Arthur Bremer was wearing numerous Wallace-for-President
buttons when he shot and paralyzed the candidate. The buttons gave him
the appearance of being an avid supporter, but the intention was to help
him get close to Wallace. In 1970, Benjamin Mendoza was able to
approach the Pope and stab him with a foot-long dagger. He minimized
suspicion by dressing in gray clerical clothing with a large crucifix attached.
Mendoza pulled the weapon out of the crucifix once he was within
arm’s reach.
A person’s appearance can reveal information about their affiliations,
travel, or cultural background. Tattoos or attachments to clothing can
reflect a relationship or identification with gangs, hate groups, or other
social organizations. Souvenir T-shirts can reflect places recently visited.
Clothing, jewelry, or other accessories can provide clues as to where indi-
viduals live, or lifestyles they prefer. If these articles are flamboyant, it
could suggest that the person is creative, independent, or possibly
nonconformist.
One’s office or living space can reveal clues about education, religion,
marital status, political beliefs, or interests. Being observant of these clues
can confirm or question what one has seen in their body language or
appearance. You do not have to open drawers, but rather, just notice what
is right in front of you.
A person’s workspace is typically limited and personal items that occupy
that space are usually very important to that employee. An office or cubi-
cle will contain business furniture, but photos, calendars, books, artwork,
and desktop items can be indicators of personal taste and lifestyle. A messy
and cluttered desk can suggest a disorganized life. The layout of the furni-
ture can reveal whether the space is arranged to make guests and cowork-
ers comfortable. A coworker of mine once set up the visitor’s chair in a
small crowded area and raised his chair higher. He explained that this
configuration helped establish dominance and control.
28 J. F. KENNY
Once you enter a person’s home, you can find out some very important
clues about their personalities, especially if they live alone. While they may
not have a total control over their workspace, the home is the private and
personal space a person has created for their own comfort and enjoyment.
When there is a great difference between a person’s public and private
persona, the home may offer a more reliable picture of the true person. A
visual examination can reveal photographs, CD collections, and other
items reflecting personal interests. They may openly display guns or dis-
turbing reading material. They may abruptly cover up things they do not
want seen. Smells can provide insights into their food or tobacco interests
or problems with hygiene. Sounds can reveal their taste in music, televi-
sion, or whether they have dogs or children. Certain TV shows, movies,
video games, social media sites, or music can demonstrate a preoccupation
with violence.
Conclusions
Identifying deception is considered by many experts to be more of an art
than a science. Even professionals often miss reading people’s intentions.
Despite the difficulties, individual skills can be improved with training and
practice. It is important to try, as the modern world has presented increas-
ingly violent events and greater predator access. By possessing a greater
understanding of nonverbal behavior, individuals can achieve a more
meaningful view of the world around them. This knowledge can enrich
interpersonal relationships. In addition, this knowledge can improve the
person’s ability to identify deception. If identified promptly, the potential
aggressor may not continue on a path toward criminal victimization.
References
Adelson, R. (2004). Detecting deception. American Psychological Association,
35(7), 70.
Argyle, M., & Ingham, R. (1972). Gaze, mutual gaze, and proximity.
Semiotica, 6, 32–49.
De Becker, G. (1997). The gift of fear: Survival signals that protect us from violence.
Boston, MA: Little, Brown and Company.
De Becker, G., Taylor, T., & Marquart, J. (2008). Just 2 seconds: Using time and
space to defeat assassins and other adversaries. Studio City, CA: The Gavin De
Becker Center for the Study and Reduction of violence.
Dimitrius, J., & Mazzarella, W. (2008). Reading people. New York: Ballantine Books.
Eckholm, E. (1992, May 26). Who’s got a gun? Clues are in the body. New York
Times. Retrieved January 10, 2017, from http://search.proquest.com.libac-
cess.fdu.edu/docview/428532017/fulltext/298C928C09F0
Ekman, P. (2009). Telling lies: Clues to deceit in the marketplace, politics, and
marriage. New York: W. W. Norton & Company.
Ekman, P., & Friesen, W. (2003). Unmasking the face: A guide to recognizing
emotions from facial expressions. Cambridge, MA: Malor Books.
Frank, M. (2016). Understanding nonverbal communication. Chantilly, VA: The
Teaching Company.
Givens, D. (2007). The nonverbal dictionary of gestures, signs, and body language
cues. Spokane, WA: Spokane Center for Nonverbal Studies.
Lieberman, D. (2000). Get anyone to do anything. New York: St. Martin’s Griffen.
Matsumoto, D., Hwang, H., Skinner, L., & Frank, M. (2011). Evaluating truth-
fulness and detecting deception. Retrieved on January 15, 2018 from https://
leb.fbi.gov/articles/featured-articles
2 THE ART OF IDENTIFYING DECEPTION 31
Matsumoto, D., Skinner, L., & Hwang, H. (2014). Reading people: Behavioral
anomalies and investigating interviewing. Retrieved on April 5, 2017 from
https://leb.fbi.gov/2014/march/reading-people-behavior-anomalies-and-
investigative-interviewing
Mehrabian, A. (1971). Silent messages. Belmont, CA: Wadsworth.
Meservey, J., & Vadyak, A. (2018). Boko Harem’s sick ploy to turn girls into suicide
bombers. Washington, DC: The Heritage Foundation.
Navarro, J. (2008). What every body is saying: An ex-FBI agent’s guide to speed-
reading people. New York: Collins Publishers.
Navarro, J. (2012). The truth about lie detection. Retrieved on January 15, 2018
from http://www.psychologytoday.com
O’Toole, M., & Bowman, A. (2012). Dangerous instincts: Use an FBI profiler’s
tactics to avoid unsafe situations. New York: Plume.
Pease, A., & Pease, B. (2004). The definitive book of body language. New York:
Bantam Books.
U.S. Secret Service. (2018). Enhancing school safety using a threat assessment model:
An operational guide to preventing targeted school violence. Washington, DC:
National Threat Assessment Center.
Vrij, A. (2003). Detecting lies and deceit: The psychology of lying and the implications
for professional practice. Chichester, UK: John Wiley & Sons, Ltd.
CHAPTER 3
Introduction
The process approach utilized throughout this book views criminal victim-
ization as the final event in a series of purposeful, dynamic, and increas-
ingly dangerous interactions. Deception enables the process to progress
by disguising criminal advances, delaying effective responses, and mini-
mizing target resistance. Life stressors can ignite the process by causing a
person of concern to become tense, anxious, or angry. Workplace pres-
sures, an unhappy home environment, or financial problems can trigger an
act of aggression or fuel the process. Those who engage in targeted acts of
violence move along an identifiable pathway of progressively aggressive
behaviors. The progression may be rapid or slow and will not follow the
same course; it differs from person to person (Fig. 3.1).
Criminal
Victimization
Pre-Attack
Behaviors
Threatening
Behaviors
Behaviors
Of
Concern
----------------------------------------------Contributors------------------------------------------------
Ignitors
some other nonphysical harm to the target. For those who still feel power-
less to achieve their goals, violence provides a way to be heard, respected,
or to ease personal pain (Dietz, 1986). De Becker (2002) contends that
many terrorists, assassins, and gang members may profess that social jus-
tice issues motivate their acts of violence. In reality, these people feel pow-
erless and believe that they have no other choice to achieve their objectives.
The use of violence can help them achieve attention for their causes, but it
can also provide notoriety for themselves. September 11 hijacker
Mohammed Atta and Columbine High School shooters Dylan Klebold
and Eric Harris did not achieve much success during their lives, but they
have been extensively studied and analyzed for the manner in which they
violently died. For those ignored or humiliated, the use of violence pro-
vides a way to be recognized or at least feared. It brings a measure of
importance to those feeling insignificant.
Few people like to be rejected, devalued, or disrespected. Most over-
come these feelings and move on. A few cannot cope and turn to violence
when overwhelmed with feelings of depression, hopelessness, desperation,
or entitlement. The Secret Service (2000) reported that many school
shooters had difficulty coping with changes in their lives, loss of significant
relationships, or devalued status prior to their attacks. Incidents of
employee violence are more likely to occur in organizations where employ-
ees feel pushed aside due to downsizing, restructuring, or layoffs (Arway,
2002; Braverman, 2002). Supervisors, personnel managers, or executives
who carry out these actions in an insensitive or degrading manner can trig-
ger an attack directed toward them.
Criminals predisposed to use aggression to achieve some financial, per-
sonal, or political gain may approach opportunistic and vulnerable pro-
spective targets. Thieves seek out those who possess money or property
that is easily valuable, accessible, and removable (Clarke & Hormel, 1997).
Numerous theories explaining motives for sexual assault contend that rap-
ists commit this crime because of the personal need for power, control, or
to express anger. Some are psychotic, sociopathic, or sadistic and view
their targets as sex objects whose role is to satisfy them. They care less
about the personal traits of their targets and more about whether they
appear to be unaware, unprotected, or easily accessible. Fein and Vossekuil’s
(1999) study on the assassination of public officials in the United States
found that the attackers’ expressed desire for political change often masked
their primary motives. Most were not active members of militant or radical
groups, but rather, marginal associates or socially isolated. These attackers
36 J. F. KENNY
).
Ptosis, hysterical,
238
in tabes dorsalis,
830
318
of migraine,
407
411
Puerperal insanity,
173
tetanus,
562
119
142
696
Pulse, state of, in acute alcoholism,
587
588
593
717
718
750
in catalepsy,
321
in cerebral anæmia,
784
in cerebral hemorrhage and apoplexy,
938
in chorea,
449
909
in epilepsy,
480
708
in hysteria,
252
in migraine,
409
411
412
in tetanus,
551
662
654
657
659
in thermic fever,
391
in tubercular meningitis,
726-728
629
411
248
717
in cerebral anæmia,
775
in chronic hydrocephalus,
741
909
1264
in disseminated sclerosis,
879
in epileptic fit,
480
195
in tabes dorsalis,
829
830
in tubercular meningitis,
727
729
40
51
793
Pyromania,
147
Q.
721
in alcoholism,
642
643
645
646
in chronic lead-poisoning,
691
1233
in labio-glosso-laryngeal paralysis,
1175
in migraine,
414
in neuralgia,
1224
in paralysis agitans,
438
in sciatica,
1236
756
in thermic fever,
398
in vertigo,
427
R.
444
of hysteria,
217
of hystero-epilepsy,
291
of thermic fever,
389
Railway sickness,
426
240
472
of neuralgia,
1220
321
318
of chorea,
444
50
52
806
paralysis in neuritis,
1193
802
exaggerated, in spinal syphilis,
1026
818
868
in chorea,
448
870
in diffuse sclerosis,
888
in disseminated sclerosis,
875
,
877
in hemiplegia,
962
862
in tabes dorsalis,
835
1041
1092
1094
tendinous in epilepsy,
481
vaso-motor,
1248
34
194
in tubercular meningitis,
727
976
in acute spinal meningitis,
750
777
in catalepsy,
321
935
909
in labio-glosso-laryngeal paralysis,
1171
in thermic fever,
390
391
395
in tubercular meningitis,
728
1044
975
804
in melancholia,
160
in myelitis, acute,
823
in neuritis,
1194
in symmetrical gangrene,
1261
in writers' cramp,
533