Criminal Investigation 11th Edition – Ebook PDF Version full chapter instant download

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 44

Criminal Investigation 11th Edition –

Ebook PDF Version


Visit to download the full and correct content document:
https://ebookmass.com/product/criminal-investigation-11th-edition-ebook-pdf-version/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Criminal Investigation 11th Edition PDF (eTextbook)

https://ebookmass.com/product/criminal-investigation-11th-
edition-pdf-etextbook/

Criminal Investigation 12th Edition, (Ebook PDF)

https://ebookmass.com/product/criminal-investigation-12th-
edition-ebook-pdf/

Criminal Investigation 5th Edition, (Ebook PDF)

https://ebookmass.com/product/criminal-investigation-5th-edition-
ebook-pdf/

Criminal Investigation eBook

https://ebookmass.com/product/criminal-investigation-ebook/
Criminal Investigation (Justice Series) (The Justice
Series) 3rd Edition – Ebook PDF Version

https://ebookmass.com/product/criminal-investigation-justice-
series-the-justice-series-3rd-edition-ebook-pdf-version/

Criminal Investigation: The Art and the Science 8th


Edition – Ebook PDF Version

https://ebookmass.com/product/criminal-investigation-the-art-and-
the-science-8th-edition-ebook-pdf-version/

Essentials of Criminal Law 11th Edition E-book PDF


Version – Ebook PDF Version

https://ebookmass.com/product/essentials-of-criminal-law-11th-
edition-e-book-pdf-version-ebook-pdf-version/

Criminal Procedure: Investigation (Aspen Casebook


Series) 3rd Edition, (Ebook PDF)

https://ebookmass.com/product/criminal-procedure-investigation-
aspen-casebook-series-3rd-edition-ebook-pdf/

Essentials of Criminal Justice 11th Edition, (Ebook


PDF)

https://ebookmass.com/product/essentials-of-criminal-
justice-11th-edition-ebook-pdf/
| CONTENTS

Dedication iii Search with Consent 28


About the Authors iii Search Incident to Arrest 28
Preface xvii Search of a Motor Vehicle 30
Emergency (Exigent Circumstances) 31
1 Plain View Seizures 32
The Evolution of Criminal Stop and Frisk 33
Investigation and Forensic Fruits of the Poisonous Tree 34
Science 1 Key Terms 35
Introduction 2 Review Questions 35
Jurisdiction 2 Internet Activities 35
Criminal Investigation and Forensic Science 2
The Evolution of Criminal Investigation 3 3
The Impact of the Agricultural and Industrial Investigators, the Investigative
Revolutions 3 Process, and the Crime Scene 36
The Fieldings: Crime Information and the Bow Introduction 37
Street Runners 3 Types of Offenses 37
The Metropolitan Police Act of 1829 3
The Investigator and the Importance of
American Initiatives 3
Investigation 37
Pinkerton’s National Detective Agency 4
Essential Qualities of the Investigator 38
The Emergence of Municipal Detectives 6
Organization of the Investigative Process 39
Federal and State Developments 6
The Preliminary Investigation 40
The Police and the U.S. Supreme Court 8
1. Receipt of Information, Initial Response, and Officer
Historical Milestones of Forensic Science 9 Safety Procedures 40
Biometric Based Personal Identification 9 2. Emergency Care 42
DNA 12 3. Secure Scene and Control Persons and Evidence 42
Firearms Identification 14 4. Issue a Be-on-the-Lookout 43
Other Contributors 15 5. Conduct Neighborhood and Vehicle Canvass 44
Recent Developments 15 6. Administrative Procedures for Processing
Key Terms 16 Crime Scenes 46
7. The Incident/Offense Report 46
Review Questions 16
Types of Crime Scenes 48
Internet Activities 16
Organization of the Crime Scene Investigation 49
2 Overall Coordination 49
Legal Aspects of Investigation 17 Forensic Services 51
Introduction 18 Investigative Services 56

The Bill of Rights and the States 19 Types of Evidence 57


Evolution of the Fourteenth Amendment 20 Corpus Delicti Evidence 57
The Fourth Amendment 20 Associative Evidence 57
Tracing Evidence 57
Arrest 21
Ingredients of Arrest 21 Typical Crime Scene Problems 57
Arrest Distinguished from Detention 21 Rules for the Crime Scene Investigator 57
Arrest Distinguished from Charging 21 Maintain Control 58
Arrest Procedures 22 Conceptualize Events 59
The Arrest Warrant 22 Proceed with Caution 61
Probable Cause 24 Apply Inclusiveness 61
Search and Seizure 25 Maintain Documentation 62
Legal Searches and Seizures 26 Infectious Disease Risks and Precautions for
Search with a Warrant 26 Investigators 64
vi
CO N T E N TS vii

The Crime Scene Search 66 Blood 105


1. Boundary Determination 67 The Appearance of Bloodstains 105
2. Choice of Search Pattern 67 Using Bloodstains to Reconstruct the Crime 106
3. Instruction of Personnel 68 Locating Blood Evidence 107
4. Coordination 68 Laboratory Determinations 110
Suspended Searches, Debriefing, and Release Lip Cosmetics, DNA, and Lip Prints 110
of the Scene 69 Firearms 110
Collection and Care of Evidence 69 Laboratory Determinations 111
Visual Documentation of the Crime Scene 69 Collecting Firearm Evidence 114
Digital Video Recording 69 Marking and Packaging Firearm Evidence 115
Digital Still Photography 70 Tool Marks 115
Digital Image Management Systems 71 Questioned Documents 116
Crime Scene Sketching and Forensic Mapping 71 Handwriting Samples and Examinations 117
Submission of Evidence to the Crime Laboratory 77 Laboratory Determinations 119
Investigative Success 78 Collecting and Packaging Evidence 119

Key Terms 79 Key Terms 119


Review Questions 79 Review Questions 120
Internet Activities 79 Internet Activities 120

4 5
Physical Evidence 80 Interviewing and
Introduction 81 Interrogation 121
Class versus Individual Characteristics 81 Introduction 122
Comparison Samples 82 Interviews and Interrogations: Similarities and
Differences 122
Soil and Pollen 83
Locating and Handling Soil Evidence 84 Objectives of Interviewing 123
Footwear, Foot, and Tires: Prints and Impressions 84 Objectives of Interrogation 124
Preserving Residue Prints 85 Qualifications of Interviews and Interrogators 124
Preserving Impressions 86 Time, Place, and Setting of Interviewing and
Preserving Shoe Impressions in Snow 87 Interrogation 125
Paint 87 The Interrogation Room 126
Glass 89 Preparation for the Interview or Interrogation 127
Handling Glass Evidence 91 The Witness 127
Fibers, Cloth Fragments, and Impressions 92 The Offense 127
String, Cord, Rope, and Tape 93 The Victim 127
The Suspect 127
Fingerprints 93
Basis for Fingerprint Identification 94 Witnesses: Motivations, Perceptions, and
Latent Fingerprints 94 Barriers 128
Conditions Affecting the Quality of Latent Persons with Physical Infirmities 129
Fingerprints 95
Locating Latent Fingerprints 96
Methods of Developing Latent Fingerprints 96
Chemicals 97
Developing Latent Fingerprints on Bodies 99
Collecting and Preserving Latent Prints 99
Marking and Identifying Print Lifts 100
Forensic Odontology 100
Identification 101
Dental Profiling 101
Bite Marks 102
Hair 104
viii CO N T E N TS

Reliability of Eyewitness Identification 129 6


Witness Intimidation 131 Field Notes and Reporting 153
Forms of Witness Intimidation 131 Introduction 154
Response Strategies for Addressing Witness
Field Notes 154
Intimidation 131
Guidelines for Note-Taking 155
Deterring Intimidators 132
Note-Taking Equipment 155
Documenting Interviews 132
Six Interrogatory and Basic Investigative
Documenting Interrogations 133 Questions 156
The Use of Electronic Recordings for
Incident Reports 157
Interrogations 133
Formats for Incident Reports 157
Benefits of Recording for Police Officers and
NIBRS-Compliant Incident Reports 159
Prosecutors 134
Computer-Generated Reports 159
The Written Statement 134
Handwritten Reports 159
Why People Confess 136 Common Elements of Incident Reports 159
False Confessions 136 Writing Effective Reports: The Narrative 164
Voluntary False Confessions 136 The Narrative 164
Coerced–Compliant False Confessions 137
Supervisory Review and Disposition of Incident
Coerced–Internalized False Confessions 137
Reports 167
Recommendations to Reduce the Possibility of False
Confessions 137 Follow-Up Investigation and Supplemental
Reports 168
Admissibility of Confessions and Admissions 138
The Free-and-Voluntary Rule 138 Key Terms 168
The Delay-in-Arraignment Rule 138 Review Questions 168
Interviewing and Interrogation: Legal Internet Activities 169
Requirements 139
Preinterrogation Legal Requirements 139 7
Miranda v. Arizona 139 The Follow-Up Investigation and
Suspect’s Response: Waiver and Alternatives 140 Investigative Resources 170
In-Custody Interrogation 142 Introduction 171
Miranda and Misdemeanors 142
The Decision to Initiate a Follow-Up Investigation 171
Interrogation as Defined by the U.S. Supreme
Court 142 The Follow-Up Investigation Process 172
Most Recent U.S. Supreme Court Decision on the Right Reviewing the Incident and Supplemental
to Remain Silent 143 Reports 174
Court Proceedings 143 Jail Booking Report 175
Right to Remain Silent–Invocation 143 Vehicle Impoundment Report 175
Right to Remain Silent–Waiver 144
Field Interview/Information Reports 175
Detection of Deception 144
Traffic Citations 175
The Critical Role of the Comfort/Discomfort Equation in
Detecting Deception 144 Examining Physical Evidence 175
Establishing a Comfort Zone for Detecting Reinterviewing Victims and Witnesses 175
Deception 144 Leads 177
Defining Signs of Comfort 145
Using Databases 177
Signs of Discomfort in an Interaction 145
International 178
Pacifying Behaviors 147
National 178
Specific Behaviors to Consider in Detecting
Regional Information Sharing Systems (RISS) 180
Deception 148
State and Local Systems 180
Use of Technological Instruments to Detect Nonprofit and Private Sources 181
Deception 149
Informants 182
Polygraph 149
Computer Voice Stress Analysis 151 Surveillance 182
Purposes of Surveillance 182
Key Terms 151
Planning and Preparing for Surveillance
Review Questions 151 Operations 182
Internet Activities 152 Termination of Surveillance Operations 183
CO N T E N TS ix

Guidelines for Conducting Photo Lineups, Live ATF Forensic Science Laboratories 222
Lineups, and Field Show-Ups 184 The FBI Crime Laboratory 223
Photo Lineups 184 Reference Files 225
Live Lineups 186
Problems in Crime Laboratories 226
Show-Ups 186
Lack of Training 227
Staged Crime Scenes 186 Lack of Accreditation 227
Cold Case Investigation 190 DNA Contamination 228
Investigative Support and Analytical Sentencing Mistakes and Poor Training 228
Tools 191 Backlog of Cases 229
Fusion Centers 191 Scandals and Mistakes within the FBI Crime Lab:
Intelligence Units 191 The Madrid Bombing Case 229
The Intelligence/Analytical Cycle 191 Code of Ethics 231
1. Planning and Direction 192 Key Terms 232
2. Collection 192 Review Questions 232
3. Processing 193
Internet Activities 232
4. Analysis and Production 193
5. Dissemination 193
6. Reevaluation 193 9
Surveillance Cameras and Facial Recognition Injury and Death
Software 193 Investigations 233
Crime Analysis 194 Introduction 234
Crime Scene Reconstruction 195 The Law 234
Criminal Profiling 198
The Medico-Legal Examination 235
Geographical Profiling 200
Remote Sensing 200 The Autopsy 235
Time-Event Charting and Link Analysis 201 Dead Body Evidence Checklist 235
The Internet 202 Postmortem Changes and Time of Death 236
Key Terms 203 Estimating Time of Death 236
Algor Mortis (Body Cooling) 236
Review Questions 203
Ocular Changes 237
Internet Activities 203 Stomach Contents 237
Rigor Mortis 237
Livor Mortis 237
8 Cadaveric Spasm 238
The Crime Laboratory 204 Decomposition 238
Introduction 205
Forensic Entomology 240
Crime Laboratories 206
Evidence from Wounds 242
The Morgue 207
Firearm Wounds 242
Digital Crime Labs 207
Incised and Stab Wounds 247
Expectations 208
Puncture Wounds 247
Measures of Crime Laboratory Effectiveness 209 Lacerations 247
Quality 209 Defense Wounds 249
Proximity 209 Strangulation Wounds 249
Timeliness 211
Responding to the National Academies of Science
(NAS) Report 212
Admissibility of Examination Results 212
Technologies 213
DNA Analysis 214
The Innocence Project 217
Next Generation Identification (NGI) Program 220
National Integrated Ballistic Information Network
Program 221
Handling Evidence in the Laboratory 222
Human Factors 222
Instrumental Analysis 222
x CO N T E N TS

Suicide 250 Condom Trace Evidence 282


Methods and Evidence of Suicide 251 Exchangeable Traces 283
Gender Differences in Suicidal Behavior 258 The Value of Condom Trace Evidence 284
Fire Deaths 258 Guidelines for Evidence Collection 285
Coordination and Cooperation 258 Record of Injuries 285
Degrees of Burning 259 Drug-Facilitated Sexual Assault 285
Identification of Remains 259 Drugs of Choice 286
Scene Considerations 259 Males as Rape Victims 287
Examination of the External Body 259 Other Date-Rape Drugs 288
Signs of Trauma 259 Evidence Collection and Processing 288
Examination of the Internal Body 260 The Investigation 288
Motives in Fire Deaths 261 Evidence 288
Serial Murder 261 Homosexual Lifestyles and Homicide
Defining Serial Murder 262 Investigation 289
Myths and Misconceptions about Serial Killers 263 Interpersonal Violence-Oriented Disputes and
Causality and the Serial Murderer 264 Assaults 289
Serial Murder and the NCAVC 265 Murders Involving Forced Anal Sex and/or
ViCAP CRIME REPORT 265 Sodomy 290
Key Terms 266 Extreme Sexual Self-Mutilation 290
Review Questions 266 Lust, Murders, and Other Acts of Sexual
Perversion 292
Internet Activities 267
Homosexual/Heterosexual Murder/Suicide 292
Fisting 293
10 Autoerotic Deaths/Sexual Asphyxia 294
Sex-Related Offenses 268 The Psychological Autopsy 296
Introduction 269 Key Terms 297
The Law 269 Review Questions 297
Sex-Related Investigations 269 Internet Activities 297
Interview of the Rape Victim 270
Type and Sequence of Sexual Acts during an
Assault 271
11
Crimes against Children 298
Deaf Victims of Sexual Assault 273
Introduction 299
Reluctance to Reach Out 273
Improving Police Response 274 Assaults against Children 300
Elder Sexual Abuse 274 Burn Injuries and Child Abuse 300
Signs and Symptoms of Sexual Abuse 274 Typologies of Burns 301
Assisted-Living Facilities 274 Medical Classification of Burn Severity 302
Nursing Homes 274 Causes of Burn Injuries 302
Early Recognition and Detection 275 Unexplained Child Fatalities 305
Interviewing Elder Victims of Sexual Abuse 275 Sudden Infant Death Syndrome 305
Signs of Physical Trauma 275 The Police Officer’s Role 306
Why Women Do Not Report Rape to the Police 276 Criminal Homicide as a Possibility 307
False Rape Allegations 276 Traumatic Brain Injuries and Death 307
“Coup-Contrecoup” Injuries 308
The Victim and Physical Evidence 278
Shaken-Baby Syndrome 308
Instructions to the Victim 278
Semen and Hair as Evidence 279 Munchausen Syndrome by Proxy 311
Information for the Examining Physician/Sexual-Assault Investigative Guidelines 312
Nurse Examiner 279 The Role of the Physician in Child-Abuse Cases 312
Collection of the Victim’s Clothing 279 Child Sexual Exploitation 313
The Role of the Investigator in Securing the Child Molestation 313
Rape Scene 280 Child Pornography 321
Incidence of Errors in the Collection of Evidence 281 Sex Tourism 324
Collecting Samples for DNA Analysis from Suspects 281 Use of the Computer and the Internet in
Sexual-Battery Examination 282 Child Pornography 325
CO N T E N TS xi

Internet Crimes against Children 326 Information That Helps Identify Trafficking
Bullying and Cyberbullying 328 Offenders 353
Child Abduction 328 Search Warrants 353
The Parental Interview 329 A Single Lawyer for Multiple Trafficking Victims 353
Victimology of the Missing Child 329 The Role of Nongovernmental Organizations in
Abduction Patterns 330 Sex-Trafficking Cases 354
Checklist for Law Enforcement 330 Key Terms 354
Amber Alert Plan 331 Review Questions 354
Sex Offender Registration and Notification 332 Internet Activities 355
Crime in Schools 333
Threat Assessment 333 13
Classification of Threats 336 Robbery 356
The Role of Law Enforcement 337
Introduction 357
Investigating School Violence 337
Elements of the Crime 357
Key Terms 340 Taking 357
Review Questions 340 Carrying Away 358
Internet Activities 340 Personal Property 358
Another 358
Intent to Deprive Permanently 358
12 Use of Force, Fear, or Threat of Force 358
Human Trafficking 341
Overview: The Offense, the Victim, and the
Introduction 342 Offender 359
United States Law 342 Typology of Robberies 360
State Law 343 Visible Street Robberies 360
Antitrafficking Task Force 343 Use of Surveillance Cameras to Prevent Street
Training of Law-Enforcement Officers 343 Robberies 360
Carjackings 360
Trafficking versus Smuggling 344
Home-Invasion Robberies 361
When Smuggling Becomes Trafficking 344
Automatic-Teller-Machine Robberies 362
Forced Labor, Involuntary Servitude, Peonage, Taxicab Robberies 362
and Debt Bondage 345 Convenience-Store Robberies 364
Estimated Numbers of Victims 345 Truck-Hijacking Robberies 365
Types of Victims 345 Bank Robbery 365
Typical Characteristics of Traffickers 345 Bank Robbery Prevention 367
Industries Involved in Forced Labor 346
Responding to the Scene 370
Sex Trafficking 347 Action Stereotyping 371
Recruitment of Foreign Women for the Sex Trade 347 Physical Stereotyping 371
Delivery and Marketing of Trafficked Women 348 Situational Stereotyping 371
Locating Sex-Trafficking Victims 349
Follow-Up Robbery Investigative Procedures 372
Investigative Considerations in Sex-Trafficking Initial Investigation 372
Cases 349 Generating a Likeness of a Suspect 373
Victim-Centered Approach 349
Victim Interview Considerations 350
Interview Preparation 350
How to Dress 350
Immigration Status 351
The U-Visa 351
The T-Visa 352
Victim Living/Working Conditions 352
Confirming the Type of Employment 352
Things Victims May Be Lacking 352
Physical Indicators of Sex Trafficking 352
Psychological Effects of Sex Trafficking 352
Indications of Brothels 352
Social Networks and Personal Safety 353
xii CO N T E N TS

Key Terms 374 Insurance Fraud 416


Review Questions 375 Health-Care and Medicare Fraud 417
Workers Compensation Fraud 419
Internet Activities 375
Mortgage Fraud 419
Home Improvement and Repair Frauds 419
14 Internet Frauds and Scams 419
Burglary 376
Other Frauds: Pigeon-Drop and Bank-Examiners
Introduction 377 Cons 422
The Offense and Offenders 379 Victims of Fraud: Senior Citizens 423
The Law 382 Money Laundering 424
Approaching the Scene and Initial Actions 382 Placement 424
Layering 426
Investigative Considerations at the Scene 383
Integration 426
Recognition of Burglary Tools 384
Surreptitious Entries 386 Security and Investment Frauds 426
Importance of the Time Factor 386 Ponzi/Pyramid Schemes 427
Pump and Dump Schemes 428
Safe Burglaries 387
Affinity Fraud 428
Types of Safes 387
Pay Phones/ATM Machine Investments 430
Attack Methods for Safes 388
One-Year Callable Certificates of
Safe-Burglary Evidence 388
Deposit 430
ATM Attacks 389 Promissory Notes 430
Residential Burglary 389 Prime Bank Notes 430
Car, RV, and Trailer Burglaries 391 Viatical Settlements 431
Investigating Criminal Fences and Other Outlets for Telephone Scams 431
Stolen Property 392 1-900 and Foreign Exchange Numbers 431
Mexican Collect Call Scheme 431
The Investigator’s Crime Prevention Role 395
Cramming 431
Reducing the Risk of Commercial Burglary 396
Reducing the Risk of Residential Burglary 397 Telemarketing and Postal Frauds 432
Land Fraud 432
Key Terms 397
Franchise Cons 433
Review Questions 397 Unsolicited Merchandise 433
Internet Activities 398 Fees Charged for Normally Free Services 433
Missing Relatives 433
15 Phony Inheritance Schemes 433
Larceny/Theft and White-Collar Key Terms 433
Crime 399
Review Questions 434
Introduction 400
Internet Activities 434
The Offense and the Offender 402
Elements of the Crime 402 16
Shoplifting and Organized Retail Crime (ORC) 403 Vehicle Thefts and Related
Shoplifting 403 Offenses 435
Organized Retail Crime (ORC) 403 Introduction 436
Copper and Other Precious Metal Theft 405
Motor Vehicle Theft 437
Investigative Points 405
Miscellaneous Statistics and Notes 437
Identity Theft and Follow-On Crimes 406 Types of Theft 438
How Identity Theft Occurs 406 Methods of Operation—The Professional 439
Follow-On Crimes 409 Fraudulent Theft Schemes 440
Investigation of Identity Theft and Follow-On Cases 411
Theft of Heavy Construction Equipment 443
Credit Card Fraud 411
Commercial-Vehicle and Cargo Theft 445
Check Fraud 414
Investigative Tools and Techniques 445
Counterfeiting 415 Major Investigative Resources 446
Frauds, Scams, and Cons 416 AAMVANET 448
Vendor Fraud 416 Locating and Handling Vehicles 451
Charity and Disaster Frauds 416 Vehicle Identification 451
CO N T E N TS xiii

Investigation of Vehicle Fires 459 Livestock and Tack Theft 494


Contact with the Owner 461 Cattle Rustling 496
Prevention Programs 461 Horse Rustling 497
Auto Theft 461 Tack Theft 497
Car Rentals 463 Livestock Identification 498
Heavy Equipment 463 Physical Evidence 499
Fraud 463
Crime Prevention Methods 500
Odometer Fraud 464 Farm Equipment Theft 500
Marine Theft 465 Timber Thef t 500
Hull Identification 466 Agrichemical Theft 500
Title and Registration Issues 467 Livestock and Tack Theft 500
NCIC Boat File 467 Wildlife Crimes 500
Investigative Resources 468 Major Threats to Wildlife 501
Preventive Measures 468 Investigations 503
Aircraft and Avionics Theft 468 Environmental Crime 504
Resources 469 The Legal and Enforcement Framework 505
Theft Techniques 469 Provisions of State RCRA Laws 505
Aircraft Identification 470 Investigative Methods 507
Theft Prevention Techniques 470
Key Terms 508
Key Terms 471
Review Questions 508
Review Questions 471
Internet Activities 508
Internet Activities 471

17 19
Arson and Explosives
Cybercrime 472 Investigations 509
Introduction 473
Introduction 510
Cybercrime: An Overview 473
Preliminary Investigation 511
Cybercrime Tools and Services Related to
Where and How Did The Fire Start? 511
Theft and Fraud 474
Two Factors Needed to Cause A Fire 511
Offenders and Offenses 475 Accidental Fires 512
Computer Intrusions 475 Spontaneous Heating and Ignition 513
Investigation of Cybercrimes 480 Burn Indicators 513
Federal Efforts 480 Alligatoring 513
State and Local Efforts 482 Depth of Char 513
Legal Considerations 482 Breaking of Glass 514
Consent Searches 482 Collapsed Furniture Springs 514
The Crime Scene 485 Distorted Light Bulbs 515
Computer and Peripheral Evidence 485 Temperature Determination 516
Crime Scene Processing 485
Key Terms 487
Review Questions 487

18
Agricultural, Wildlife, and
Environmental Crimes 488
Introduction 489
Dimensions of Agricultural, Wildlife, and
Environmental Crimes 490
Timber Theft 492
Theft of Agrichemicals 493
xiv CO N T E N TS

Fire Setting and Related Mechanisms 516 Key Terms 545


Ignition Devices 516 Review Questions 545
Telltale Signs of Accelerants 516
Internet Activities 545
Plants 519
Trailers 519
Missing Items 519 20
Arson for Profit 519 Recognition, Control, and
Financial Stress as the Primary Cause 519 Investigation of Drug
Arson Generated by Third Parties 522 Abuse 546
Other Motives for Arson 524 Introduction 547
Revenge-Motivated Arson 524 Drugs and Scheduling 548
Detection and Recovery of Fire-Accelerant Opiates 548
Residues 524 Opium 548
Alternative Fuels in Fire Debris Analysis 525 Morphine 548
Scientific Methods in Arson Investigation 525 Heroin (Diacetylmorphine) 550
Detection of Fire Accelerants 526 “Cheese” Heroin 551
Interviews 527 Codeine 551
Possible Witnesses 527 OxyContin 552
Firefighters at the Scene 527 Other Opium Derivatives 552
Insurance Personnel 527 Opiate Overdoses 552
Other Witnesses Concerning Finances of the Synthetic Narcotics 553
Insured 529 Meperidine (Demerol) 554
News Media Personnel 529 Methadone 554
The Medical Examiner 529 Stimulants 554
Interviewing a Suspect 529 Cocaine 554
Interviewing the Target and the Owner 529 Amphetamines 556
Interviewing a Potential Informant Who Is Not a Phenmetrazine (Preludin), Methylphenidate (Ritalin),
Suspect 530 and Pemoline (CYLERT) 556
The Arson Suspect 530 Crystallized Methamphetamine 556
Methcathinone 558
Photographing the Arson Scene 531
Khat 559
Still Photography 531
Videotape 531 Depressants (Sedatives) 559
Glutethimide (Doriden) 559
Explosives Investigation 531
Methaqualone 560
Know Your Explosives 531
Computerized Tomography 532 Speedballing 560
Sniffers 532 Hallucinogens 560
Types of Explosions 532 Phencyclidine (PCP) 560
Improvised Explosive Devices (IEDs) 533 Methylenedioxy Methamphetamine 561
Factors Affecting IED Construction 533 Lysergic Acid Diethylamide (LSD 25) 561
Basic Components of the IED 533 Mescaline (Peyote) 561
Primary Effect by Type of IED 534 Psilocybin and Psilocyn 561
The United States as a Target of IEDs 536 Foxy and 5-MeO-AMT 562
Investigating the Explosion Scene 536 Ketamine 562
Locating and Identifying Articles of Evidence 537 Cannabis 563
Collecting Evidence at the Explosion Scene 538 Marijuana 563
Analyzing the Fuel Source 540 Hashish 565
Suspicious Packages and Letters 541 Hashish Oil 565
Use of Robotic Devices in Moving and Destroying Synthetic Marijuana 565
Dangerous Objects 541 Drug Paraphernalia 566
Bomb Threat Standoff 542 Inhalants 566
Reading The Bomber’s Signature 542 Major Countries of Origin and Trafficking
Similarities between Bombings 544 Patterns 566
Association of Bombings through Forensic Mexico 567
Examination 544 Colombia 569
CO N T E N TS xv

The Golden Crescent 569 Domestic Terrorism 677


The Golden Triangle 569 Right-Wing Terrorists 607
Europe 569 Left-Wing Terrorists 609
Drug Investigations 570 Financing Terrorist Organizations 611
Gathering Information 570 New Laws and Legal Tools 612
Confidential Informants 570 Drug Smuggling 612
Informants: Motivations and Types 570 Arms Smuggling 614
Department Policy 571 Credit Card Fraud and Theft 614
Other Sources for Information 573 Charities Fraud and Linkages 615
Surveillance 574 National Counterterrorism Intelligence
Undercover Operations 575 Structures 617
High-Intensity Drug Trafficking Area (HIDTA) Other Criminal Activities Linked to Terrorist
Programs 577 Groups 617
Searches, Seizures, and Warrants 578 Investigation of Terrorist Activities 617
Probable Cause 578 Terrorist Crime Scenes 623
Search Warrants 578 Limited Biological Attacks: Anthrax 624
Past Reliability of the Confidential Chemical At tacks: Mass Casualties 627
Informant 579 Terrorism and the Future 628
Information Supplied by the
Key Terms 629
Informant 579
Corroboration of the Information Review Questions 629
Supplied 579 Internet Activities 630
The Exclusionary Rule 579
Warrantless Searches 579
Search Procedures 581 22
Evidence Handling 581 The Trial Process and
Pharmaceutical Diversions 583 the Investigator as a
Clandestine Drug Laboratories 584 Witness 631
Identifying Laboratory Operations 584 Introduction 632
Meth Labs 584 Evaluating a Case 632
Catching Cooks: Meth Monitors 585 The Investigator 632
Lab Seizure and Forfeiture 586 The Prosecutor 633
Conducting a Laboratory Raid 586
The Trial Process 634
Conspiracy Investigations 588 Jury Selection 634
Gangs and Drugs 588 The Trial 635
Paradigm Shif t 588 The Rules of Evidence 636
Key Terms 589 Evidence Defined 636
The First Rule of Evidence 636
Review Questions 589
Proof 637
Internet Activities 589 Testimony 637
Relevance 637
Materiality 637
21
Terrorism 590
Introduction 591
International Terrorism 592
Radical Islam 592
Radical Islamic Groups 594
Other Active International Groups 601
Other International Threats: Mexico 603
Homegrown Terrorism 604
Who Is the “Homegrown Terrorist”? 605
Attacks from Inside the United
States 606
The Threat 607
xvi CO N T E N TS

Competence of Evidence 637 Exceptions to the Hearsay Rule 643


Competence of Witnesses 637 Evidentiary Privileges 644
Weight of Evidence 638 Witnesses 645
Presumptions 638 The Investigator as a Witness 645
Inferences 638
Key Terms 650
Burden of Proof 638
Burden of Going Forward 638 Review Questions 650
Preponderance of Evidence 639 Internet Activities 651
Order of Proof 640
Judicial Notice 640 Glossary 652
Types of Evidence 640 Notes 667
The Hearsay Rule 642 Index 703
| PREFACE

As with the previous editions, the first purpose of mentary, suggestions to a victim on how to avoid further
this book is to provide a useful tool for those on law- loss. Criminal Investigation’s crime-prevention sections
enforcement’s front lines. Thus, Criminal Investigation is give investigators the tools to accomplish this task.
once again filled with practical “how to” information, Finally, most investigative books tend to blur the dis-
case studies, and color photographs that illustrate impor- tinction between the roles of uniformed officers and detec-
tant points and checklists that can be adapted to the tives; we draw this line distinctly. Although everyone may
needs of local agencies. not agree with our dichotomizing, the uniformed officer’s
We have scrutinized all aspects of the book, downsiz- role must be recognized for the contribution it makes to
ing and deleting some content while elsewhere adding the ultimate success of an investigation.
new cutting-edge topics. The computer crime chapter
was dropped; an entirely new chapter, “Cybercrime,” THE ELEVENTH EDITION
takes its place. Another new chapter, “Human Traffick-
ing,” examines the crimes associated with it in the United
Criminal investigation is always evolving owing to scien-
States. Many portions of chapters have been substantially
tific, legal, and social developments, as well as to changes
or totally rewritten, including the guidelines for conduct-
in the behavior of criminals. Although many investigative
ing photo lineups, live lineups, and field show-ups; crime
techniques are fundamental and remain basically the same
scene reconstruction; and forensic odontology. These and
over time, significant changes also occur on a continuing
other changes are more fully identified shortly.
basis. In addition to having updated photographs, tables,
Criminal Investigation continues to differ from other texts,
figures, and citations, this edition reflects both the ongoing
and the differences are again reflected throughout this edi-
and the changing dimensions of criminal investigation by
tion. First, criminal investigation generally has been con-
including the following text updates and revisions:
ceived of, and touted as, an art. This approach depreciates
the precision required to conduct inquiries; it denies the • Chapter 1, “The Evolution of Criminal Investiga-
existence of, and adherence to, rigorous methods; and it tion and Forensic Science,” a historically oriented
associates criminal investigation with unneeded mysticism. chapter, has a revised introduction that provides a
Criminal investigation is in large part a science. The fact definition of the investigator and the investigation, as
that criminals are not always apprehended does not make well as an emphasis on the fundamental purpose of
it less so. The rational scientific method is, of necessity, investigation and forensic science and its role in dis-
supplemented by initiative and occasional fortuitous cir- covering the truth. A new section on jurisdiction has
cumstances, but it is the application of the method rather been added that discusses the geographic area and
than shrewd hunches that most frequently produces results. the legal/enforcement responsibility. The section
The most successful investigators are those who know how on personal identification now includes a focus on
to apply the rational scientific method; therefore, it is this biometrics.
method that we consistently use in Criminal Investigation.
• Chapter 2, “Legal Aspects of Investigation,”
A second major difference between this text and others
addresses legal topics that uniformed officers and
arises from our belief that writing about techniques takes
investigators encounter on a daily basis and that are
on more substance if one understands something of the
essential for the successful resolution of every crimi-
nature of the event being investigated. Thus we have dis-
nal case. The chapter includes updated information
cussed typologies—including offenses, offenders, and
on case law, including the scope of search of an auto-
victims—in depth, so that our readers not only take away
mobile (Arizona v. Gant), legality of a search based on
a more comprehensive understanding of criminal inves-
erroneous information officers received from another
tigation than they would from another textbook but also
jurisdiction (Herring v. United States), legality of an
have substantial information to use later as a reference.
arrest and search of a motorist even though state law
Third, because crime-prevention technology has been
required only the issuance of a summons (Virginia v.
a significant milestone for both the police and the public,
Moore), and legality of a search based on exigent cir-
we have inserted short sections on prevention in chapters
cumstances (Michigan v. Fisher).
where appropriate. The complexity of crime prevention
dictates that it is a specialization within police depart- • Chapter 3, “Investigators, the Investigative Process,
ments. Yet at the scene of a crime, the investigator may and the Crime Scene,” includes crime scene sketching
be in a unique position to make a few helpful, if rudi- and forensic mapping. There are revised and expanded
xvii
xviii PREFACE

discussions of infection diseases, digital video and • Chapter 10, “Sex-Related Offenses,” includes new
photography, Digital Image Management Systems sections on elder sexual abuse and the early recogni-
(DIMS), and Automated Digital Imaging of Crime tion and detection of sexual assault of the elderly.
Scenes using panoramic and laser scanning. A number
• Chapter 11, “Crimes against Children,” contains
of new photographs have been added, including those
expanded coverage of assaults against children,
pertaining to crime scene control and coordination,
including the signs that indicate abuse, shaken baby
detection using sense of smell, latent fingerprint kits,
syndrome, sex tourism, and Internet crimes against
and the use of a privacy screen to shield bodies. The
children. New sections cover unexplained child fatali-
chapter continues to emphasize its strong crime scene
ties, traumatic brain injuries, and child pornography.
and preliminary investigation focus.
• Chapter 12, “Human Trafficking,” is new to this
• Chapter 4, “Physical Evidence,” has been thoroughly edition and discusses U.S. and state laws concerning
revised and streamlined and includes new material human trafficking, the National Anti-Trafficking Task
on forensic odontology, questioned documents, and Force, forced labor, involuntary servitude, peonage,
new photographs pertaining to electrostatic dust print debt bondage, the delivery and marketing of women,
lifter (EDPL) and Hexagon OBTI. conducting victim interviews, the psychological
• Chapter 5, “Interviewing and Interrogation,” effects of sex trafficking on the victims, and informa-
includes new sections on witness intimidation, the tion on identifying brothels.
use of electronic recordings for interrogation, why • Chapter 13, “Robbery,” includes expanded discus-
people confess, the detection of deception, and recent sions of taxi cab robberies, various crime prevention
Supreme Court rulings relating to the rights of defen- strategies, and convenience store robberies. A new
dants to remain silent under the provisions of the section on police robbery prevention recommenda-
Miranda ruling. tions for convenience stores has been added.
• Chapter 6, “Field Notes and Reporting,” has been • Chapter 14, “Burglary,” The references and data in
completely reorganized so that it moves through the this chapter have been updated. Portions of this chap-
process of collecting information, recording notes, ter were rewritten for clarity.
understanding and completion of incident reports,
supervisory review and alternative dispositions, • Chapter 15, “Larceny/Theft and White-Collar Crime”
follow-up investigations, and finally, the preparation includes new sections on mortgage frauds, Internet
of supplementary reports. frauds and scams, and senior citizens as fraud vic-
tims. The section on organized retail crime (ORC)
• Chapter 7, “The Follow-Up Investigation and Inves- includes a new case box on Target that explains their
tigative Resources,” has been thoroughly updated and approach to dealing with ORC. The section on how
includes revised sections on reinterviewing victims and identity theft occurs includes information on FBI
witnesses and the use of facial recognition software. scam letters as well as examples of these letters, debit
The section on conducting photo and live lineups has card skimming, and social security number theft. The
been updated to include new standards as well as section on health care fraud has been expanded to
forms to be used with each of the three types of line- include coverage of Medicare fraud. The section on
ups. The section on crime scene reconstruction now security and investment frauds includes updates on
includes a step-by-step guide to using each of the the Bernie Madoff scandal.
CSR models as well as examples of each. This chapter
also includes a number of new visuals pertaining to • Chapter 16, “Vehicle Thefts and Related Offenses,”
geoprofiling maps, the use of trained dogs to detect All statistics have been updated and show a contin-
odors of cadavers, and a link/association diagram. ued decrease in the number of reported auto thefts
in this country but the problem is still of national
• Chapter 8, “The Crime Lab,” includes an updated importance. Cloning of vehicles and obtaining titles
and expanded section on the measures of crime lab using fraudulant paperwork continues to increase. A
effectiveness and includes recent BAS findings and paragraph on Automated License Plate Recognition
recommendations regarding the nation’s forensic sci- Systems has been added to the materials on Major
ence system. A new section on the Next Generation Investigative Resources along with materials on the
Identification (NGI) program has been added. major involvement of The National Insurance Crime
• Chapter 9, “Injury and Death Investigations,” Bureau regarding the theft of heavy equipment.
includes a new section on the law regarding criminal • Chapter 17, “Cybercrime,” has been completely reor-
homicides and felony assaults, a new “dead body ganized and rewritten with the objective of preparing
checklist,” and an updated section on serial murders first responders with the information needed to per-
that includes a discussion of the myths and misconcep- form until a specialist arrives and what to do if one
tions about, and the possible causes of, serial murder. is not available. The chapter distinguishes between
PREFACE xix

cyber- and computer crime; chronicles cybercrime changes already mentioned, we have added a host of new
tools and services related to thefts and frauds; and photographs, figures, and tables to reinforce and expand
covers computer intrusions, malware, blended threats, the text coverage. A visual presentation of the book’s many
drive-bys, herders and botnets, viruses and worms, lists—which are so critical in a text that teaches profession-
time, logic, and email bombs, denial of services als and future professionals “how to” investigate crime—
attacks (DoSs), ransomware, dead drops, keyloggers, makes this material easy to digest. The learning aids in the
rootkits, and scareware. edition go beyond these visual elements, however:
• Chapter 19, “Arson and Explosives,” includes a new • Chapter-opening photographs, outlines, and learn-
section called “Know Your Explosives” which includes ing objectives draw readers in and serve as a road
a detailed description of the characteristics of various map to the chapter.
types of explosives as well as the ways in which they
• Chapter-opening overviews provide readers with
can be scientifically analyzed and detected. An entirely
a snapshot of the entire chapter and are excellent
new module has been added on “Improvised Explo-
review tools for readers who are preparing for exams.
sive Devices” in which we discuss the components of
IEDs and provide a series of new photographs that • Detailed captions accompany photographs, clarifying
illustrate the various types of commonly used IEDs. precisely what readers should be looking for and
A detailed discussion and photos of two of the more learning when examining each piece of art.
infamous cases involving IEDs occurring in the United
• End-of-chapter review sections featuring key-term
States in the last couple of years have been added.
lists, review questions, and Internet activities make
• Chapter 20, “Recognition, Control, and Investigation preparing for exams easier than ever.
of Drug Abuse,” includes expanded coverage of
As mentioned, we have retained our plentiful, widely
“cheese” heroine, codeine, opiate overdoses, crystal-
acclaimed “cases” within every chapter, ensuring that the
lized methamphetamine, synthetic marijuana (K2),
eleventh edition is not only the most current, definitive
drug trafficking and violence in Mexico, and new
text on criminal investigation but also the most practical
methods for producing meth. There is a new section
and relevant. And with the enhancements we have made
discussing the paradigm shift in how our nation is
to the learning aids, Criminal Investigation is, simply put,
addressing the war on drugs.
the most mastery-oriented text available for the course.
• Chapter 21, “Terrorism,” has received many updates
to reflect recent events regarding Al-Qaeda in Iraq,
Afghanistan, Yemen, and Somalia, as well as here in SUPPLEMENTS
the United States The section on Hizbollah includes
updates on the current presidential administration’s As a full-service publisher of quality educational prod-
efforts to normalize relations with it, as well as its ucts, McGraw-Hill does much more than just sell text-
involvement in Mexico, Canada, and the United books. The company creates and publishes an extensive
States. The section on HAMAS has also been updated array of print, video, and digital supplements for students
to reflect recent events and activities, including and instructors. This edition of Criminal Investigation is
recruiting and fundraising. There are new sections accompanied by a comprehensive supplements package.
addressing the threat of the Mexican drug trade,
homegrown terrorism, and domestic right-wing ter-
rorism. The section on investigation of terrorist activi-
FOR THE STUDENT
ties now has an expanded discussion of investigative Online Learning Center Website: This unique, book-specific
tools and techniques, including reference cards devel- website features interactive cases that not only are fun to
oped by New York state and the use of technology to explore but also are terrific learning tools. The website
coordinate and disseminate intelligence. also includes self-grading quizzes and other exercises to
assist students in mastering the concepts in the book.
• Chapter 22, “The Trial Process and the Investigator
Visit it at www.mhhe.com/swanson11e.
as a Witness,” has an expanded section on evaluating
the case to include information the prosecutor needs
to evaluate the same case. FOR THE INSTRUCTOR
• Instructor’s Manual and Testbank: Includes detailed
LEARNING AIDS chapter outlines, key terms, overviews, lecture notes,
transparency masters, and a complete testbank.
Working together, the authors and the editors have devel- • Computerized Testbank: This easy-to-use computerized
oped a format for the text that supports the goal of a read- testing program is for both Windows and Macintosh
able, practical, user-friendly book. In addition to the computers.
xx PREFACE

• PowerPoint Slides: Complete chapter-by-chapter slide Colleagues who have contributed photographs, forms,
shows feature text, art, and tables. and other illustrations are identified beginning on page
xxiii; thank you one and all. We would also like to thank
• Online Learning Center Website: Password-protected
another group of individuals who helped out in a variety
access is provided for important instructor support
of ways: Ross Gardner reviewed the new section of foren-
materials and additional resources.
sic mapping and made helpful suggestions, as did Cap-
• Course Management Systems: Whether you use tain John P. Slater (retired), Training Director, National
WebCT, Blackboard, e-College, or another course Institute for Truth Verification with respect to the CVSA
management system, McGraw-Hill will provide you II System. Special Agent, Joe Navarro, FBI (retired) was
with a cartridge that enables you either to conduct kind enough to provide us with most of the information
your course entirely online or to supplement your discussing the detection of deception. Chief Jack Lumpkin
lectures with online material. And if your school and Sgt. David Leedahl, Athens Clarke County (Georgia)
does not yet have one of these course management Police Department; Chief Dwayne Orrick, Cordele (Georgia)
systems, we can provide you with PageOut, an easy- Police Department; Chief Rick Boren, Lt. Ronnie Griffin,
to-use tool that allows you to create your own and Sgt. Doug Shafer, Columbus (Georgia) Police Depart-
course web page and access all material on the ment; Major Tolbert and Lt. Zapal, Savannah Police
Online Learning Center. Department; Bob Hopkins, Hillsborough County, Florida,
Sheriff’s Office gave us information to strengthen the
• Primis Online: A unique database publishing system
section on follow-up investigations; Commander Michael
that allows instructors to create a customized text
Frazier, Phoenix, Arizona, Police Department, was help-
from material in this text or elsewhere and deliver
ful with information on arson and explosives, as were
that text to students electronically as an e-book or in
Chief Richard Pennington and Officer R. Bonelli from the
print format via the bookstore.
New Orleans Police Department; Chief Lee Donahue and
• Videotapes: A wide variety of videotapes from the Major William Gulledge, Honolulu, Hawaii, Police Depart-
Films for the Humanities and Social Sciences series is ment; Kenneth V. Lanning, Supervising Special Agent of
available to adopters of the text. the Federal Bureau of Investigation and the National Cen-
ter for Missing and Exploited Children allowed us to
All the preceding supplements are provided free of
reprint in Chapter 11 (“Crimes against Children”) from his
charge to students and instructors. Orders of new (versus
previously published material on the topics of child moles-
used) textbooks help us defray the cost of developing
tation and child pornography. Major Andy Garrison and
such supplements, which is substantial. Please contact
Frank Broadrick, Northeast Georgia Police Academy,
your local McGraw-Hill representative for more informa-
reviewed the chapter on report writing and made good
tion on any of the preceding supplements.
suggestions for its revision. Steven Gottlieb, executive
director of the Alpha Group Center for Crime and Intelli-
gence Analyst Training, allowed us to adopt portions of
ACKNOWLEDGMENTS his textbook to explain the critical role of crime analysis in
law-enforcement investigations. Ron French of the Ecorse,
Without the kindness of many people throughout the Michigan, Fire Department provided updated commen-
country—literally from Alaska to Maine—this book could tary on where and how fires start, as well as on fire setting
not have been written. We are grateful for the support of and related mechanisms. Leigh Herbst from the University
our colleagues around the country who have contributed of Nebraska helped with the new chapter-opening and
case histories, reviewed portions of the manuscript within closing material.
their areas of expertise, written sections for inclusion in Chief Robert Davis, Lt. Rick Martinez, and Police Artist
the book, contributed photographs, forms, and other Gil Zamora, San Jose California Police Department, pro-
illustrations, or otherwise gone out of their way to be vided photographs for the robbery chapter. Lt. Anthony
helpful. Our continuing concern in writing these acknowl- Traina, Paterson (NJ) Police Department, provided infor-
edgments is that, inadvertently, we may have omitted mation and a photograph on using street surveillance
someone. If this is so, let us know so that we may correct cameras to prevent street robberies.
this oversight, and also please accept our apologies. Our Gene Lazarus, Florida State Fire College, Ocala, and
acknowledgments include persons who have contributed Steve Mraz, formerly with the Pinellas County, Florida,
to this edition and those who helped with earlier edi- Fire Academy, reviewed and contributed to the arson
tions. Some of the people identified have retired or taken chapter. Bob Quinn, Tom Costigan, Mike Rendina, Jim
on new responsibilities since assisting us, but, unless oth- Wilder, and Richard Frank, presently or formerly with the
erwise requested, we include their organizational affilia- Drug Enforcement Administration. Richard Souviron,
tion and status at the time of the original contribution, Chief Forensic Odontologist, Dade County Florida, Medi-
since we feel that the agencies then employing them are cal Examiners Office, was an early major contributor
also deserving of continued recognition. of material dealing with bite marks and dental evidence.
PREFACE xxi

Dr. Wally Graves, Medical Examiner for Lee, Henry, and tion supplied us with considerable information about his
Glades Counties, Florida, provided information on dental agency’s “Team Approach” in dealing with robbery
evidence. John Valor, forensic artist and photographer, cases. Detective David Spraggs of the Boulder, Colorado,
provided illustrations for the dental section. Dick Williams Police Department provided us with material used in the
of the FBI Crime Laboratory read the questioned-documents discussion of opening a cold case homicide investigation,
section and made a number of suggestions to clarify and along with several photographs. Laurie A. Ward, Crime
strengthen it. Don Hampton of the Springfield, Missouri, Scene Administrator, Laura Sheffield, Forensic Artist,
Police Department did the same for parts of the crime and Sheriff Grady C. Judd, Jr., all of the Polk County
scene chapter. We benefited also from the reviews and Sheriff’s Department Office in Barstow, Florida, pro-
research materials provided by Jim Halligan, formerly vided us with information on the use of forensic artists
with the Florida Department of Law Enforcement and to re-create images of a robbery suspect along with a
then a professor at Florida State University’s School of picture of the suspect at the time he was arrested. Ser-
Criminology. He was a superb teacher and a real friend. geant Scott Whittington of the Colorado Springs, Colo-
Special thanks to Lt. Greg Terp, commander of the rado, Police Department supplied us with a video photo
Miami-Dade Auto Theft Task Force, and to some special of a robbery in progress. Maryellin Territo and Sal Territo
people with the National Insurance Crime Bureau— devoted long hours to researching sources for the most
Special Agent Lawrence “Dave” Dempsey; Regional current information relating to all facets of criminal
Manager Ron Poindexter; Vice-President and General investigation.
Counsel Robert H. “Bob” Mason; and Member Relations A special thank you is extended to Mr. Ed Hueske for
Manager Ed Sparkman. his invaluable help and assistance on the Physical Evi-
Thanks to professor Gail Anderson of Simon Frazer dence and Crime Laboratory chapters. His forensics
University in Burnaby, B.C., Canada, for providing us expertise was instrumental in helping acquire photo-
with updated information on forensic entomology. Robert graphs and addressing new techniques in the area. Also,
Aristarco, Assistant Vice President for Corporate Com- a very special thanks to Ms. Jennifer Davis for her hard
munications, American Re-Insurance Company in Prince- work, research, and assistance in developing the book.
ton, New Jersey, allowed us to reprint material on arson She was an important coauthor on the “Crimes against
investigation published by his company. Linda Brown Children” chapter. Chief Jimmy Perdue, North Richland
and Robyn Royall of Help A Child, Inc. and SAVE (Sex- Hills, Texas Police Department; Chief Richard Wiles, Dep-
ual Assault Victim Examination Program) in Pinellas uty Chief Dianna Kirk, and Mr. Stuart Ed, El Paso, Texas
Park, Florida, provided us with all the material they use Police Department; Chief Robert Lehner and Deputy
to collect the physical evidence of sexual assault cases. Chief Chuck Tilby, Eugene, Oregon Police Department;
Dave Crosbie of the Burnsville Minnesota Fire Depart- and Chief David Kunkle, Dallas Police Department, pro-
ment provided us with photos for the “Arson and Explo- vided opportunities within their departments for acquir-
sives” chapter. Michael Dorn of Dorn’s, Inc. provided us ing photographs and learning new techniques in the
with current information on crimes in schools. Dr. Thomas investigative process. Dr. Kall Loper has coauthored the
B. Kelley of Florida State University in Panama City “Computer Crime” chapter in previous editions, and
(Department of Criminology and Criminal Justice) pro- some of his work was continued in this edition. Dr. David
vided us with both narrative information on underwater Carter, Dr. Richard Holden, Dr. Jonathon White, and
crime scene investigation and photographs. Debbie Mr. Doug Bodrero, Institute for Intergovernmental Rela-
Lewis, Records Custodian, William A. Pellan, Director of tions (Tallahassee, Florida), offered important informa-
Forensic Investigations in Pasco and Pinellas Counties, tion on terrorism and intelligence gathering analysis that
Largo, Florida, and John R. Thogmartin, M.D. provided highlighted the “Terrorism” chapter.
numerous photographs for Chapter 9 (“Injury and Death We would also like to thank Professor Barry Glover
Investigations”) and Chapter 10 (“Sex-Related Offenses”). and Ashlee Castle of the Department of Criminal Justice,
Sergeant Jim Markey of the Sex Crimes Unit of the Phoenix, Saint Leo University, Saint Leo, Florida for providing us
Arizona, Police Department supplied us with informa- with the material in Chapter 9, Injury and Death Investi-
tion on how to reopen cold case sex crimes; he also pro- gation, on the discussion of the Utilization of Criminal
vided us with a photograph. Robert Parker, Director, and Justice College Students to Evaluate Cold Cases. “We also
Major Raul M. Ubieta, Miami-Dade (Florida) Police would like to thank Sharon Ostermann for graciously and
Department, supplied us with their agency’s Robbery cheerfully typing up major portions of this edition. Her
Standard Operating Procedure along with model form constructive criticism, research skills, and editing greatly
letters sent to robbery victims. Greg C. Pauley of the improved the final product.”
Temple Terrace, Florida, Police Department provided us This eleventh edition of the book benefited from a
with a computer-generated composite image as well as counsel of reviewers. Thanks to:
a police mug shot of a robbery suspect at the time he
was arrested. Lieutenant Ted Snodgrass of the Las Vegas, Preston Baity, Milwaukee Area Technical College
Nevada, Metropolitan Police Department Robbery Sec- Geriann Brandt, Maryville University
xxii PREFACE

Tyler Brewer, Southwestern College William Vizzard, California State University,


John Brooks, University of Arkansas Sacramento
Michael Brown, Southeast Missouri State University Charlene Weitzeil, Olympic College
Ruben Burgos, Milwaukee Area Technical College Donna Gaughan Wilson, Prince George’s Community
Steven Chavez, Western New Mexico University College
Stephen D’Arcy, California State University,
Finally, a few words about the hard-working people at
Sacramento
McGraw-Hill who helped make this a better book: We
Gene Evans, Camden County Community College
would like to thank our editors Katie Stevens and Craig
Anita Bledsoe Gardner, Cleveland Community
Leonard; project manager Mel Valentín, who kept this
College
project moving forward and on time; designer Cassandra
Barry Glover, Saint Leo University
Chu; photo research manager Brian Pecko, who found us
Don Haley, Tidewater Community College
photos and obtained permission to use them in a timely
Daniel Hebert, Springfield Technical Community
manner; marketing manager Joyce Chiu; copyeditor
College
Stacey C. Sawyer; and everyone else from the McGraw-
Edward Jackson, Baltimore City Community College
Hill production staff in San Francisco who worked on this
William Kemper, University of South Florida, Sarasota
edition of the text.
Dwayne Marshall, Lock Haven University of PA
Glenn McKiel, Middlesex Community College
Charles R. “Mike” Swanson
Joe Morris, Northwestern State University
Neil C. Chamelin
James Parlow, Winona State University
Leonard Territo
Dave Pauly, Methodist University
Robert W. Taylor
Scott Pray, Muskingum College
| IN APPRECIATION

We are grateful to our colleagues from around the country Columbus, Georgia, Police Department
who have been kind enough to contribute photographs, Georgia Bureau of Investigation
forms, and other figures to the text. The inclusion of such Savannah Police Department
material helps ensure the relevancy and usefulness of the
text for all readers in all states. For this, we are indebted Idaho
to the following individuals, departments, and agencies: Idaho Bureau of Investigation

Alaska Illinois
State of Alaska Scientific Crime Detection Laboratory Chicago Crime Laboratory
Chicago Police Department
Arizona Cook County, Illinois, Sheriff’s Department
Phoenix, Arizona, Police Department Illinois Environmental Protection Agency
California Illinois State Police
California Bureau of Livestock Identification
Indiana
Kern County, California, Sheriff’s Department
Indiana State Police
Los Angeles County Sheriff’s Department
Riverside County, California, Sheriff’s Department Iowa
San Bernardino County, California, Sheriff’s Iowa Criminalistic Laboratory, Department
Department of Public Safety
San Diego County Sheriff’s Department State Historical Society of Iowa
San Jose Police Department
Santa Ana, California, Police Department Kansas
Santa Barbara County, California, Sheriff’s Wichita, Kansas, Police Department
Department
Kentucky
Colorado Kentucky State Police
Westminster, Colorado, Police Department
Maine
Delaware Lewiston, Maine, Police Department
Delaware State Police
Maryland
Florida The SANS Institute
Big Bend Bomb Disposal Team, Tallahassee, Florida
Dade County Medical Examiner Department, Miami, Massachusetts
Florida Massachusetts Environmental Police
Florida Department of Law Enforcement National Fire Protection Association
Leon County Sheriff’s Department, Tallahassee,
Florida Michigan
Miami-Dade Police Department Ecorse, Michigan, Fire Department
Pinellas County, Florida, Public Health Unit, Sexual Sterling Heights, Michigan, Police Department
Assault Victim Examination Program Minnesota
Pinellas County, Florida, Sheriff’s Office Minneapolis, Minnesota, Police Department
Polk County Sheriff’s Office Minnesota Department of Health
Port Orange, Florida, Police Department
St. Petersburg, Florida, Police Department Missouri
Tallahassee Regional Crime Laboratory, Florida Regional Criminalistics Laboratory, Metropolitan
Department of Law Enforcement Kansas City, Missouri
Tampa, Florida Fire Department Springfield, Missouri, Police Department
Tampa, Florida Police Department St. Louis County, Missouri, Police Department
St. Louis Police Department
Georgia
Athens-Clarke County, Georgia, Police Department New Jersey
Atlanta Police Department New Jersey State Police
Cordele, Georgia, Police Department Paterson Police Department
xxiii
xxiv I N A P P R E C I AT I O N

New York Wisconsin Crime Laboratory


Nassau County, New York, Police Department Wisconsin State Police
New York City Police Department
Wyoming
North Carolina Lincoln County, Wyoming, Sheriff’s Office
North Carolina Bureau of Investigation Wyoming State Crime Laboratory
SIRCHIE Fingerprint Laboratories, Inc. Wyoming Game and Fish Department
Wyoming State Archives and Historical Department
Ohio
Geauga County, Ohio, Sheriff’s Department National & Federal Agencies
Bureau of Justice Statistics, U.S. Department of Justice
Pennsylvania Centers for Disease Control
Pennsylvania State Police
Chester A. Higgins, Jr., and the U.S. Department of
Philadelphia Police Department
Justice, Office of Justice Programs
South Carolina Drug Enforcement Administration
Georgetown, South Carolina, Police Department Environmental Protection Agency
Federal Bureau of Investigation
Tennessee Federal Emergency Management Agency
Nashville Police Department
Immigration and Naturalization Service, Forensic
Tennessee Bureau of Investigation
Document Laboratory
Texas National Automobile Theft Bureau
Austin, Texas, Police Department National Center for Missing and Exploited Children
Dallas Police Department National Drug Intelligence Center
Forensic Training and Consulting, LLC National Institute of Justice
Texas Department of Public Safety (Garland National Insurance Crime Bureau
Crime Lab) National Park Service
Texas Parks & Wildlife Office of Justice Programs, National Institute
of Justice
Utah Pinkerton’s Archives
Utah Department of Public Safety, Bureau of
U.S. Customs Service
Forensic Sciences
U.S. Department of Justice
Virginia U.S. Department of the Treasury, Bureau of Alcohol,
Alexandria, Virginia, Police Department Tobacco, and Firearms
Fairfax County, Virginia, Police Department U.S. Forest Service
U.S. Public Health Service
Washington U.S. Secret Service
Clark County Sheriff’s Office, Vancouver, Washington
International Agencies
Washington, D.C. London Metropolitan Police
Police Executive Research Forum
Royal Canadian Mounted Police
Virginia Department of Forensic Services
Turkish National Police
Wisconsin
Madison Police Department
Milwaukee County Department of Social Service
Another random document with
no related content on Scribd:
Her face grew sombre again.
“Oh,” said she, after a pause, “I was looking for something,
something that had been hidden from me, something I wanted to
find.”
A light came into Bayre’s mind.
“Was it your cousin’s will?” asked he, sharply.
By the convulsive movement which passed through her he knew
that he had made a good guess.
“If so,” he went on very quietly, “you didn’t succeed in finding it, I
know.”
Into the wicked old leathern face there came a look of malicious
anxiety, and Bayre began to understand things more clearly.
“I suppose,” said he, “that my uncle made a will which did not
please you, and that he would not let you know where he kept it, and
that it was because you knew its provisions that you determined to
carry out this fraud. You were alone with him when he died—”
“Do you mean to insinuate?—” she began fiercely.
“No, of course not. I only insinuate that you took advantage of his
sudden death, and of the fact that communication with Guernsey
was cut off at that time, to work this deceit. The story runs that Miss
Ford’s body in its coffin was carried away at the upsetting of the boat
which was to take it across to Guernsey. Is it of any use to ask you
the truth underlying that fiction?”
“Your uncle lies buried in the wood outside the château,” said Miss
Ford, simply. “I did all the work myself; the Vazons may know where
he lies, but nobody else does. I cut a cross in the bark of a beech
tree near the head of the grave.”
Cunning as the woman was, adept at deceit as she was, Bayre
saw no reason to doubt the truth of this account, which he indeed
subsequently verified. There remained the matter of the will.
“I suppose,” he said, “that if my uncle had left the château to you
for life you would never have done this extraordinary thing?”
She shot at him a suspicious look.
“We need not discuss that,” she said. “I have enjoyed the château
for my life, and it will belong to his son when he is of age. The
matter, after all, does not interest you.”
“Supposing,” suggested Bayre, “that I had been mentioned in the
will? Supposing I had been appointed guardian of the child and
custodian of my uncle’s collection?”
The old face looked livid in the shadow.
“We needn’t waste time supposing things,” she said presently.
“The will has been destroyed.”
“Ah!” said Bayre.
“Not by me,” retorted the old woman, quickly. “What I should have
done with it if I had found it doesn’t concern you or anybody now. As
a matter of fact, it was hidden away by old Bartlett Bayre in a garret
among some lumber, and was enclosed in an iron box. The Vazons
stole the box with other things, and it was found broken open in their
cottage by Jean, who found also the ashes of the papers that had
been locked inside.”
“Not all of them, I think,” said Bayre, in a low voice.
He was beginning to feel rather afraid of the effect which the
discovery of the will in his possession might have upon the old
woman. Wicked, grasping, malicious and deceitful as she was, he
was not anxious for the occurrence of another tragedy before his
eyes.
But his words were enough to wake all her suspicions. Half-rising
in her chair, leaning on the arm of it, she hissed out at him,—
“Let me see it! Let me see it!”
“Not now,” said he, gently but firmly; “you shall see it another time,
in the presence of your solicitors and mine.”
One more doubt she had to satisfy, and only one.
“What was the date of it?” she asked sharply.
“April the 30th of last year,” answered he at once.
She asked no more questions; she was satisfied. Passing one thin
hand restlessly over her face she sank back almost lifeless in her
chair.
CHAPTER XXVI.
THE RULE OF THREE BECOMES THE RULE OF ONE

It was plain to them all before the day was over that the discoveries
of the morning had hastened the end of the impostor who had
passed so long as old Bartlett Bayre.
She would not suffer Bayre himself to come again into her
presence, nor would she allow the name of her cousin’s widow to be
mentioned before her. Arbitrary and eccentric to the last, she made a
favour of permitting Olwen to wait upon her, and when, on the
following morning before daylight, she passed quietly away, only
Olwen and Madame Portelet were in the room.
Nobody could help feeling that her death was the best way, for
herself as well as for others, out of the difficult position in which she
had placed herself; and when the doctor and the lawyer, who were
summoned from Guernsey, not in time to see her in life but in time to
learn the extraordinary story while she lay dead in the great dark
room, met Bartlett Bayre and the two ladies in one of the saloons
downstairs, there was much discussion as to the best way of making
known the truth to the world.
For it could not be kept hidden. Already, as they knew, there were
rumours abroad in Guernsey, spread by the Vazons; and now the
burial of Miss Ford and the re-burial of old Bartlett Bayre would of
necessity set folk talking.
It was arranged that these gentlemen should take upon
themselves the responsibility of giving the whole truth of the strange
tale to the little world of the islands. And they could only hope, for the
sake of the family credit, that it would not get into the English
newspapers.
When the will came to be read it was found, as Bayre already
partly knew, that the estate and collection of old Bartlett Bayre had
been left to his son, who was to remain during his minority in the
guardianship of his first cousin, Bartlett Bayre, junior.
In his care also the precious collection was left, and it was
expressly stated that Miss Ford (of whose indifference to his
collection the old man complained) should leave the château and
retire to a house belonging to her cousin in Guernsey.
There was no mention whatever of his young wife in the will of the
old gentleman; he had treated her as if she did not exist.
It was not until after the reading of the will, when the lawyer and
the doctor had gone back to Guernsey, that Bayre, for the first time,
found himself alone with Olwen. Mrs Bartlett Bayre, in a very
subdued and tearful condition, had stolen out of the house by herself
on the first opportunity.
Then for the first time Olwen grew absurdly shy and began to talk
about the weather.
“Oh, we can leave the weather alone for a little while,” said Bayre,
coolly. “We have other things to discuss—novels for one thing.”
She grew very red.
“Oh, I was so sorry afterwards that I troubled you with my
nonsense,” she said with an assumption of indifference. “You can
send it back to me; I’ll give you the stamps; or—no, you can put it
into your waste-paper basket—or—”
“Thank you—so much,” said he, “for both those suggestions. You
may give me the stamps if you like; I never refuse postage stamps.
But it would be a pity to put your manuscript into the waste-paper
basket, for I heard on Friday night that it had been accepted by a
publisher, who, by-the-bye, has rejected everything he’s seen of
mine.”
The girl was transfixed with delight.
“Ac—cepted,” faltered she, “really and truly accepted! Do you
mean that they’re going to print it?”
“Print it, bind it, and put your name on the back in gilt letters,”
replied he. “More than that, they’re going to pay you for it.”
Olwen clasped her hands; she almost staggered with delight.
“Oh, no! oh, no!” she whispered ecstatically; “it’s too much, it’s too
much!”
“Well, I don’t know about being too much,” said Bayre, reflectively.
“I shouldn’t like to write many novels on the same terms if I had
nothing else to live by. Of course, they say it’s immature and crude,
and the work of a beginner: those are the excuses they make for
offering you only ten pounds for it. But poor as the pay is, I should
advise you to take it; it’s a beginning, you know.”
“Take it!” cried Olwen, incredulously. “You think it necessary to
advise me to take it? Why, why, it’s magnificent, colossal! Didn’t
Milton only get five pounds for Paradise Lost?”
“Ah, but that was poetry, and Milton was different,” said Bayre.
She laughed joyously.
“Oh, Mr Bayre, I can never thank you enough. You’ve given me
more happiness than anybody else has ever done in all my life.”
He made a rush for the opportunity, but before he could more than
open his lips she checked him by an abrupt turn in the conversation.
“Isn’t it dreadful about poor Mrs Bayre? That she should be left
without a penny?”
“Well, she ran away, you know.”
“Well, but he did everything to prove that he wanted her to. I’ve
heard a great deal about it, and I know that life was made
unendurable to her here. It seems a dreadful thing that he should
have died without forgiving her, or making any provision for her.”
“Well, as a matter of fact, he probably knew that where her boy
was she would be, and that the same hands that cared for the boy
would care for her.”
“Oh, yes, yours,” said Olwen, with sudden coldness.
“Yes, mine,” acquiesced Bayre, buoyantly. “When he’s treated me
so handsomely, and placed such confidence in me whom he could
only remember as a boy, the least I can do is to carry out what I’m
sure were his wishes.”
“Oh, yes, of course. You will have to live here, will you not?”
“I’m not bound to, but that seems to have been my uncle’s wish.
He has left money to be devoted to the upkeep of the place until the
time his son comes of age, and that fund is to be administered by
me. And besides that, as you heard, he’s left me ten thousand
pounds.”
“You’ll be quite rich. You’ll marry her, of course?”
“That would be the simplest way of settling things, if it could be
managed, wouldn’t it?” said Bayre, demurely.
“Certainly. It would be a perfectly charming arrangement. I
congratulate you already.”
Her manner was very haughty, and flighty, and cool.
“You’d better wait till she’s accepted me, or at least till I’ve
proposed, hadn’t you? It’s dangerous to congratulate too soon.
Supposing it were to come to nothing, you know, I should feel so
foolish, after receiving your congratulations.”
“Oh, but it sha’n’t come to nothing. I’ll speak to her for you myself.”
“You dare!” said Bayre, simply.
And Olwen began to laugh under her breath. He caught her by the
wrist.
“Are you going to wait, Olwen, till you come across a fellow like the
hero of your book?” asked he, in the driest of dry tones.
She bit her lip, and looking down, struggled to get away.
“Oh, I don’t know,” said she, quickly; “men outside books are never
like those inside them. It’s useless to expect it.”
“I think so too. Better give up all hope of meeting a paper-and-print
hero, and settle down with a harmless, commonplace ten-thousand-
pounder, who can turn his back upon the jerry-built flat and the villa
one-brick-thick.”
“Why, it is a romance, a real romance!” murmured the girl, softly,
when he had kissed her for the second time.
“But it isn’t all your own, remember. I had a hand in this too. It
takes one for the romance of the pen, but two for the romance of a
kiss.”
And they laughed softly over the little joke, and, laughing still,
reached the avenue of the shut-up house.
Little as they loved or respected the memory of Miss Ford, they felt
bound to remain in the island until the double interment had taken
place at Guernsey of that lady and of old Mr Bayre, whose rude
coffin was unearthed and transported with that of his cousin to the
larger island, where the strange events of the past few months had
caused such a buzz of scandal that the three young people were
very glad when the sombre ceremony was over and they could get
away to London.
It was on the Wednesday that they arrived in town, and Olwen
accompanied Mrs Bayre to her rooms, where she was to stay with
her and the famous baby for the present.
It was arranged before they left Bayre that the two ladies should
honour the Diggings with their presence on the following afternoon,
and that they should bring the heir of Creux with them.
The Diggings, therefore, on the day of the festivity, were a glorious
sight. Cut flowers were not enough. Palms and ferns and other
plants were bought, their pots were decorated with silk
handkerchiefs of artistic colourings, and they were arranged about
the room in every available space, until there was not a corner
anywhere that you could find room to place so much as a book or a
plate upon.
Although it was a mild day, the fire was made to roar up the
chimney, with the well-meaning belief that ladies and children were
hothouse flowers, who throve best in excessive warmth.
Tarts, cakes, sweets and delicacies of all kinds were ordered in
such abundance (the young men considered it mean to order less
than a dozen of any one thing) that Mrs Inkersole grew quite
pathetic, and warned them that in a week of living on nothing but
pastry they would never be able to eat it all up.
To suit the Gargantuan appetites they supposed the ladies to
possess, tea was ordered, and milk and coffee, on the same
magnificent scale, so that the preparations resembled rather those
for a glorified school treat than the entertainment of two ladies and a
child whose age was still reckoned in months.
But none of the three saw anything absurd or unnecessary in all
this, but rather troubled their heads lest something should have been
forgotten than asked whether they had provided too much.
Jan Repton’s bedroom-studio was transformed into a bower of
strongly-perfumed hothouse flowers for the ladies to take off their
hats in, although even Susan reminded them that ladies kep’ their
’ats on to tea.
They silenced her with scorn, and went their own way unheeding.
And when at last, with a modest ring, the two ladies and the baby
arrived and ascended the stairs with soft tread, and were ushered
into the presence of the three hosts, one would have thought that
they were three smug young curates or mild-mannered Y.M.C.A.’s,
so trim and still and subdued were they after all the fuss and the
fluster, the fuming and the shouting, the running about and the hiding
away that had been going on for hours before.
The ladies, too, were very quiet and rather shy, and Mrs Bayre, in
particular, kept her eyes fixed upon her little boy with maternal pride,
which struck Southerley as being rather forced.
When the door and a window had been opened to cool the
appalling atmosphere, however, and they had all sat down to tea, not
in the orthodox fashion in twos and threes about the room, but upon
Bayre’s advice, to an honest round table, they presently began to
lose a little of the stiffness which had characterised the proceedings
at the outset, and at last Jan Repton, suddenly plunging, as men do,
from acute shyness to confidence even more acute, turned to Mrs
Bayre and said,—
“Look here, Mrs Bayre, I don’t think it’s fair that I should be left out
of the general post. If Miss Eden takes Bayre, and Southerley takes
you, I must have the baby!”
For one moment the consternation which followed this audacious
and awful speech was too deep for words. For, be it noted that
Southerley and Mrs Bayre had conducted themselves from the
outset as strangers of the deepest dye, and no one ignorant of
recent events would have thought it possible that there was any
feeling in either of them of a sentimental nature towards the other.
These terrible words, however, caused them to look up, to catch
each other’s eye, to look down, to laugh feebly, to “give themselves
away” in a manner which would have tortured a person of finer
feelings than Repton.
The artist, however, was conscious only of a pause, a ghastly
silence, and he went on, with the utmost cheerfulness,—
“Come, Bayre, come, Southerley, that’s fair, isn’t it?”
For one moment Southerley’s fresh-coloured face showed
symptoms of apoplexy. The next, an inspiration seized him.
“Mrs—er—Bayre,” he said solemnly, “let us discuss the proposition
of this frivolous person.”
And with that he rose, and with courage which he had never
shown before, and which he was never in his life to show again, he
deliberately left his chair at the other side of the table and took one
next to her. And she laughed prettily and fell in with his humour, and
affected to turn her back upon Repton and to devote herself to
serious discussion with him.
And that the discussion really did become serious may be
supposed, for during the rest of the evening these two were never
very far apart.
Presently a sense of something having happened stole over the
assembly, and Repton found himself, with brilliant indiscretion,
discussing the secretly-arrived-at situation with the same
outspokenness as before.
“It now becomes a serious question,” he urged plaintively, “who is
to educate that child. We were three of us, and we managed as well
as could be expected. But now that there are five, the matter must
be reconsidered. Who is to have the charge of the heir of Creux?”
“I am,” said Mrs Bayre, lifting her chubby boy and pressing his
round cheek against hers.
“And I,” murmured Southerley, in a deep-voiced growl, “shall have
the charge of you.”
“It’s a great pity,” said Repton, whose devotion to the child was as
strong as it was new; “I’d have made an artist of him!”
“But the question is, you know,” said Bayre, “what he would have
made of you.”
And then they all laughed; it took very little to set them laughing on
that happy evening. And so the problem of the rule of three was
solved in the easiest possible manner, and perhaps Jan Repton was
not the least happy of the group.
“After all, there’s one’s art!” he remarked to the ladies, as he
showed them, with pride, one of his paintings. It was on a most
beautiful easel, one they could admire with a free conscience. But
the picture itself was one of the worst you ever saw!

THE END
TRANSCRIBER’S NOTES
Florence Warden was the pseudonym of Florence Alice (Price)
James.
The Wycil & Co. edition (New York, 1903) was consulted for the
changes listed below.
Minor spelling inconsistencies (e.g. fisher-cap/fisher cap,
seabirds/sea-birds, etc.) have been preserved.

Alterations to the text:


Punctuation: quotation mark pairings and missing periods and
commas.
[Chapter XII]
Change “Barlett reddened, but said nothing” to Bartlett.
[Chapter XIII]
“Well, well, you may congratulale yourself anyhow,” to
congratulate.

[End of text]
*** END OF THE PROJECT GUTENBERG EBOOK THE MIS-RULE
OF THREE ***

Updated editions will replace the previous one—the old editions


will be renamed.

Creating the works from print editions not protected by U.S.


copyright law means that no one owns a United States copyright
in these works, so the Foundation (and you!) can copy and
distribute it in the United States without permission and without
paying copyright royalties. Special rules, set forth in the General
Terms of Use part of this license, apply to copying and
distributing Project Gutenberg™ electronic works to protect the
PROJECT GUTENBERG™ concept and trademark. Project
Gutenberg is a registered trademark, and may not be used if
you charge for an eBook, except by following the terms of the
trademark license, including paying royalties for use of the
Project Gutenberg trademark. If you do not charge anything for
copies of this eBook, complying with the trademark license is
very easy. You may use this eBook for nearly any purpose such
as creation of derivative works, reports, performances and
research. Project Gutenberg eBooks may be modified and
printed and given away—you may do practically ANYTHING in
the United States with eBooks not protected by U.S. copyright
law. Redistribution is subject to the trademark license, especially
commercial redistribution.

START: FULL LICENSE


THE FULL PROJECT GUTENBERG LICENSE
PLEASE READ THIS BEFORE YOU DISTRIBUTE OR USE THIS WORK

To protect the Project Gutenberg™ mission of promoting the


free distribution of electronic works, by using or distributing this
work (or any other work associated in any way with the phrase
“Project Gutenberg”), you agree to comply with all the terms of
the Full Project Gutenberg™ License available with this file or
online at www.gutenberg.org/license.

Section 1. General Terms of Use and


Redistributing Project Gutenberg™
electronic works
1.A. By reading or using any part of this Project Gutenberg™
electronic work, you indicate that you have read, understand,
agree to and accept all the terms of this license and intellectual
property (trademark/copyright) agreement. If you do not agree to
abide by all the terms of this agreement, you must cease using
and return or destroy all copies of Project Gutenberg™
electronic works in your possession. If you paid a fee for
obtaining a copy of or access to a Project Gutenberg™
electronic work and you do not agree to be bound by the terms
of this agreement, you may obtain a refund from the person or
entity to whom you paid the fee as set forth in paragraph 1.E.8.

1.B. “Project Gutenberg” is a registered trademark. It may only


be used on or associated in any way with an electronic work by
people who agree to be bound by the terms of this agreement.
There are a few things that you can do with most Project
Gutenberg™ electronic works even without complying with the
full terms of this agreement. See paragraph 1.C below. There
are a lot of things you can do with Project Gutenberg™
electronic works if you follow the terms of this agreement and
help preserve free future access to Project Gutenberg™
electronic works. See paragraph 1.E below.
1.C. The Project Gutenberg Literary Archive Foundation (“the
Foundation” or PGLAF), owns a compilation copyright in the
collection of Project Gutenberg™ electronic works. Nearly all the
individual works in the collection are in the public domain in the
United States. If an individual work is unprotected by copyright
law in the United States and you are located in the United
States, we do not claim a right to prevent you from copying,
distributing, performing, displaying or creating derivative works
based on the work as long as all references to Project
Gutenberg are removed. Of course, we hope that you will
support the Project Gutenberg™ mission of promoting free
access to electronic works by freely sharing Project
Gutenberg™ works in compliance with the terms of this
agreement for keeping the Project Gutenberg™ name
associated with the work. You can easily comply with the terms
of this agreement by keeping this work in the same format with
its attached full Project Gutenberg™ License when you share it
without charge with others.

1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside
the United States, check the laws of your country in addition to
the terms of this agreement before downloading, copying,
displaying, performing, distributing or creating derivative works
based on this work or any other Project Gutenberg™ work. The
Foundation makes no representations concerning the copyright
status of any work in any country other than the United States.

1.E. Unless you have removed all references to Project


Gutenberg:

1.E.1. The following sentence, with active links to, or other


immediate access to, the full Project Gutenberg™ License must
appear prominently whenever any copy of a Project
Gutenberg™ work (any work on which the phrase “Project
Gutenberg” appears, or with which the phrase “Project
Gutenberg” is associated) is accessed, displayed, performed,
viewed, copied or distributed:

This eBook is for the use of anyone anywhere in the


United States and most other parts of the world at no cost
and with almost no restrictions whatsoever. You may
copy it, give it away or re-use it under the terms of the
Project Gutenberg License included with this eBook or
online at www.gutenberg.org. If you are not located in the
United States, you will have to check the laws of the
country where you are located before using this eBook.

1.E.2. If an individual Project Gutenberg™ electronic work is


derived from texts not protected by U.S. copyright law (does not
contain a notice indicating that it is posted with permission of the
copyright holder), the work can be copied and distributed to
anyone in the United States without paying any fees or charges.
If you are redistributing or providing access to a work with the
phrase “Project Gutenberg” associated with or appearing on the
work, you must comply either with the requirements of
paragraphs 1.E.1 through 1.E.7 or obtain permission for the use
of the work and the Project Gutenberg™ trademark as set forth
in paragraphs 1.E.8 or 1.E.9.

1.E.3. If an individual Project Gutenberg™ electronic work is


posted with the permission of the copyright holder, your use and
distribution must comply with both paragraphs 1.E.1 through
1.E.7 and any additional terms imposed by the copyright holder.
Additional terms will be linked to the Project Gutenberg™
License for all works posted with the permission of the copyright
holder found at the beginning of this work.

1.E.4. Do not unlink or detach or remove the full Project


Gutenberg™ License terms from this work, or any files
containing a part of this work or any other work associated with
Project Gutenberg™.
1.E.5. Do not copy, display, perform, distribute or redistribute
this electronic work, or any part of this electronic work, without
prominently displaying the sentence set forth in paragraph 1.E.1
with active links or immediate access to the full terms of the
Project Gutenberg™ License.

1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if
you provide access to or distribute copies of a Project
Gutenberg™ work in a format other than “Plain Vanilla ASCII” or
other format used in the official version posted on the official
Project Gutenberg™ website (www.gutenberg.org), you must, at
no additional cost, fee or expense to the user, provide a copy, a
means of exporting a copy, or a means of obtaining a copy upon
request, of the work in its original “Plain Vanilla ASCII” or other
form. Any alternate format must include the full Project
Gutenberg™ License as specified in paragraph 1.E.1.

1.E.7. Do not charge a fee for access to, viewing, displaying,


performing, copying or distributing any Project Gutenberg™
works unless you comply with paragraph 1.E.8 or 1.E.9.

1.E.8. You may charge a reasonable fee for copies of or


providing access to or distributing Project Gutenberg™
electronic works provided that:

• You pay a royalty fee of 20% of the gross profits you derive from
the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”

• You provide a full refund of any money paid by a user who


notifies you in writing (or by e-mail) within 30 days of receipt that
s/he does not agree to the terms of the full Project Gutenberg™
License. You must require such a user to return or destroy all
copies of the works possessed in a physical medium and
discontinue all use of and all access to other copies of Project
Gutenberg™ works.

• You provide, in accordance with paragraph 1.F.3, a full refund of


any money paid for a work or a replacement copy, if a defect in
the electronic work is discovered and reported to you within 90
days of receipt of the work.

• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.

1.E.9. If you wish to charge a fee or distribute a Project


Gutenberg™ electronic work or group of works on different
terms than are set forth in this agreement, you must obtain
permission in writing from the Project Gutenberg Literary
Archive Foundation, the manager of the Project Gutenberg™
trademark. Contact the Foundation as set forth in Section 3
below.

1.F.

1.F.1. Project Gutenberg volunteers and employees expend


considerable effort to identify, do copyright research on,
transcribe and proofread works not protected by U.S. copyright
law in creating the Project Gutenberg™ collection. Despite
these efforts, Project Gutenberg™ electronic works, and the
medium on which they may be stored, may contain “Defects,”
such as, but not limited to, incomplete, inaccurate or corrupt
data, transcription errors, a copyright or other intellectual
property infringement, a defective or damaged disk or other
medium, a computer virus, or computer codes that damage or
cannot be read by your equipment.

1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES -


Except for the “Right of Replacement or Refund” described in
paragraph 1.F.3, the Project Gutenberg Literary Archive
Foundation, the owner of the Project Gutenberg™ trademark,
and any other party distributing a Project Gutenberg™ electronic
work under this agreement, disclaim all liability to you for
damages, costs and expenses, including legal fees. YOU
AGREE THAT YOU HAVE NO REMEDIES FOR NEGLIGENCE,
STRICT LIABILITY, BREACH OF WARRANTY OR BREACH
OF CONTRACT EXCEPT THOSE PROVIDED IN PARAGRAPH
1.F.3. YOU AGREE THAT THE FOUNDATION, THE
TRADEMARK OWNER, AND ANY DISTRIBUTOR UNDER
THIS AGREEMENT WILL NOT BE LIABLE TO YOU FOR
ACTUAL, DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE
OR INCIDENTAL DAMAGES EVEN IF YOU GIVE NOTICE OF
THE POSSIBILITY OF SUCH DAMAGE.

1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If


you discover a defect in this electronic work within 90 days of
receiving it, you can receive a refund of the money (if any) you
paid for it by sending a written explanation to the person you
received the work from. If you received the work on a physical
medium, you must return the medium with your written
explanation. The person or entity that provided you with the
defective work may elect to provide a replacement copy in lieu
of a refund. If you received the work electronically, the person or
entity providing it to you may choose to give you a second
opportunity to receive the work electronically in lieu of a refund.
If the second copy is also defective, you may demand a refund
in writing without further opportunities to fix the problem.

1.F.4. Except for the limited right of replacement or refund set


forth in paragraph 1.F.3, this work is provided to you ‘AS-IS’,
WITH NO OTHER WARRANTIES OF ANY KIND, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR
ANY PURPOSE.

1.F.5. Some states do not allow disclaimers of certain implied


warranties or the exclusion or limitation of certain types of
damages. If any disclaimer or limitation set forth in this
agreement violates the law of the state applicable to this
agreement, the agreement shall be interpreted to make the
maximum disclaimer or limitation permitted by the applicable
state law. The invalidity or unenforceability of any provision of
this agreement shall not void the remaining provisions.

1.F.6. INDEMNITY - You agree to indemnify and hold the


Foundation, the trademark owner, any agent or employee of the
Foundation, anyone providing copies of Project Gutenberg™
electronic works in accordance with this agreement, and any
volunteers associated with the production, promotion and
distribution of Project Gutenberg™ electronic works, harmless
from all liability, costs and expenses, including legal fees, that
arise directly or indirectly from any of the following which you do
or cause to occur: (a) distribution of this or any Project
Gutenberg™ work, (b) alteration, modification, or additions or
deletions to any Project Gutenberg™ work, and (c) any Defect
you cause.

Section 2. Information about the Mission of


Project Gutenberg™
Project Gutenberg™ is synonymous with the free distribution of
electronic works in formats readable by the widest variety of
computers including obsolete, old, middle-aged and new
computers. It exists because of the efforts of hundreds of
volunteers and donations from people in all walks of life.

Volunteers and financial support to provide volunteers with the


assistance they need are critical to reaching Project
Gutenberg™’s goals and ensuring that the Project Gutenberg™
collection will remain freely available for generations to come. In
2001, the Project Gutenberg Literary Archive Foundation was
created to provide a secure and permanent future for Project
Gutenberg™ and future generations. To learn more about the
Project Gutenberg Literary Archive Foundation and how your
efforts and donations can help, see Sections 3 and 4 and the
Foundation information page at www.gutenberg.org.

Section 3. Information about the Project


Gutenberg Literary Archive Foundation
The Project Gutenberg Literary Archive Foundation is a non-
profit 501(c)(3) educational corporation organized under the
laws of the state of Mississippi and granted tax exempt status by
the Internal Revenue Service. The Foundation’s EIN or federal
tax identification number is 64-6221541. Contributions to the
Project Gutenberg Literary Archive Foundation are tax
deductible to the full extent permitted by U.S. federal laws and
your state’s laws.

The Foundation’s business office is located at 809 North 1500


West, Salt Lake City, UT 84116, (801) 596-1887. Email contact
links and up to date contact information can be found at the
Foundation’s website and official page at
www.gutenberg.org/contact

Section 4. Information about Donations to


the Project Gutenberg Literary Archive
Foundation
Project Gutenberg™ depends upon and cannot survive without
widespread public support and donations to carry out its mission
of increasing the number of public domain and licensed works
that can be freely distributed in machine-readable form

You might also like