Forensic Investigation of Stolen-Recovered and Other Crime-Related Vehicles

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Forensic Investigation of Stolen-Recovered and Other Crime-Related Vehicles is the ultimate reference guide for any auto theft investigator, crime scene technician, criminalist, police investigator, criminologist, or insurance adjuster. In addition to a thorough treatment of auto theft, the book covers vehicles involved in other forms of crime-dealing extensively with the various procedures and dynamics of evidence as it might be left in any crime scene. An impressive collection of expert contributors covers a wide variety of subjects, including chapters on vehicle identification, examination of burned vehicles, vehicles recovered from under water, vehicles involved in terrorism, vehicle tracking, alarms, anti-theft systems, steering columns, and ignition locks. The book also covers such topics as victim and witness interviews, public and private auto theft investigations, detection of trace evidence and chemical traces, vehicle search techniques, analysis of automotive fluids, vehicle registration document examination, and vehicle crime mapping. * Extensively researched and exceptionally well-written by internationally-recognized experts in auto theft investigation and forensic science * All the principles explained in the text are well-illustrated and demonstrated with more than 450 black and white and about 100 full-color illustrations, many directly from real cases* Serves as both a valuable reference guide to the professional and an effective teaching tool for the forensic science student

Author(s): Eric Stauffer, Monica Bonfanti
Edition: 1
Year: 2006

Language: English
Pages: 632

Title page......Page 4
Copyright......Page 5
Contents......Page 8
Contributors......Page 14
Foreword......Page 26
Preface......Page 28
Acknowledgements......Page 32
1.1 INTRODUCTION......Page 34
1.2.1 Motives......Page 35
1.2.2 Modus Operandi......Page 38
1.3.1 Global Picture......Page 39
1.3.2 Evolution in Number of Stolen Vehicles with Time......Page 40
1.3.3 Comparison Between Countries......Page 41
1.3.4 US Geographical Statistics......Page 42
1.3.5 Most Commonly Stolen Vehicles in the United States......Page 45
1.3.7 International Trafficking......Page 47
1.4.1 Preventive Measures......Page 49
1.4.2 Investigative Measures......Page 50
1.5.2 Professional Associations......Page 51
1.5.3 Government-Sponsored Organizations......Page 52
BIBLIOGRAPHY......Page 53
2.1 INTRODUCTION......Page 56
2.2.2 Main Interview......Page 57
2.2.3 Identities......Page 58
2.2.4 Quality of the Interview......Page 59
2.4.1 Principle......Page 60
2.4.2 Information Regarding the Vehicle......Page 62
2.4.3 Information Regarding the Theft......Page 64
2.4.4 Information Regarding Vehicle Recovery......Page 67
ACKNOWLEDGMENTS......Page 69
3.2 NOTIFICATION AND INITIAL ASSESSMENT......Page 70
3.3 SCENE ATTENDANCE......Page 71
3.4.1 Searching Techniques and Evidence Identification......Page 74
3.4.2 Note Recording......Page 76
3.4.3 Sketch Plan......Page 77
3.4.4 Photography......Page 80
3.4.6 Evidence Collection......Page 84
3.5 REPORT PREPARATION AND COURT PRESENTATION......Page 88
ACKNOWLEDGMENTS......Page 89
BIBLIOGRAPHY......Page 90
4.1.1 Challenges......Page 92
4.1.3 Examination Facility......Page 93
4.1.4 Forensic Techniques......Page 94
4.2.1 Penetration of the Vehicle......Page 95
4.2.2 Starting the Vehicle......Page 103
4.3.2 Fingerprint Search......Page 105
4.3.3 Fingerprint Development......Page 106
4.4.2 Blood......Page 108
4.4.3 Semen......Page 112
4.4.4 Skin Contact Traces......Page 114
4.5.1 General Considerations......Page 115
4.5.2 Fibers......Page 116
4.5.3 Glass......Page 117
4.5.4 Paint......Page 118
4.6 TOOLMARKS AND OTHER EVIDENCE......Page 119
4.8 VEHICLES INVOLVED IN OTHER CRIMES......Page 121
BIBLIOGRAPHY......Page 123
4.10.1 Illicit Drugs......Page 126
4.10.2 Explosives......Page 127
4.11.2 Forensic Phase A: Outside the Vehicle......Page 129
4.11.4 Forensic Phase C: On-Site Analysis......Page 130
4.11.5 Forensic Phase D: Sampling......Page 132
4.12.1 Analysis......Page 137
BIBLIOGRAPHY......Page 138
5.1 INTRODUCTION......Page 142
5.2.2 Class and Randomly-Acquired Characteristics......Page 145
5.2.4 Evidence Strength......Page 146
5.2.5 Comparison Process......Page 148
5.3.1 Fingerprints and Other Ridge Skin Impressions......Page 149
5.3.2 Shoeprints......Page 150
5.3.3 Tire Tracks......Page 151
5.3.4 Toolmarks......Page 152
5.4.1 Body Fluids and DNA......Page 153
5.4.2 Paint......Page 154
5.4.3 Fibers......Page 155
5.4.4 Glass......Page 156
BIBLIOGRAPHY......Page 157
6.2.1 General Structure......Page 160
6.2.2 World Manufacturer Identifier (WMI)......Page 162
6.2.4 Check Digit......Page 164
6.2.5 Vehicle Indicator Section (VIS)......Page 166
6.2.6 Information Resources......Page 167
6.2.7 Examples......Page 169
6.3.1 VIN Locations......Page 170
6.3.2 General Plates......Page 171
6.3.3 Safety Certification Label......Page 174
6.3.4 Anti-Theft Label......Page 175
6.3.5 Stamping of Other Parts......Page 177
6.3.6 Window Etching......Page 179
6.4.2 Secondary (Nonconfidential) VIN......Page 181
6.4.3 Confidential VINs......Page 183
6.5.1 Gray Market VIN......Page 185
6.5.3 Rebuilt Vehicles......Page 187
6.6.1 Air Bags......Page 188
6.6.2 Other Parts......Page 189
6.6.3 Engine Emission Control Label......Page 191
6.6.4 Other Coded Date Information......Page 192
6.6.5 Other Serial Numbers......Page 193
6.7.1 Principle......Page 194
6.7.3 VIN Plate Switching......Page 195
6.7.4 Counterfeit VIN Plate......Page 196
6.8.2 Examination Site and Preliminary Data Collection......Page 197
6.8.3 Examination Process......Page 198
6.8.4 Summary......Page 206
BIBLIOGRAPHY......Page 207
7.3 TECHNIQUES USED TO OBLITERATE NUMBERS......Page 210
7.4.1 Principle of Deformation and Restoration......Page 215
7.4.2 Metallic Objects......Page 217
7.4.3 Organic Solids (Plastics)......Page 218
7.5.3 Destructive Restoration Procedures for Metals......Page 220
7.5.4 Nondestructive Restoration Procedures For Metals......Page 226
7.6.2 Destructive Restoration Procedures for Plastics......Page 230
7.7 PHOTOGRAPHY......Page 232
7.8 EVALUATION OF METHODS......Page 234
7.9.3 Recording of Results and Conclusions......Page 235
BIBLIOGRAPHY......Page 236
8.1 INTRODUCTION......Page 240
8.2.1 Development of OEM Immobilizer and Alarm Systems......Page 242
8.2.2 General Motors PassKey I and II Systems......Page 243
8.2.3 GM PassLock System......Page 245
8.2.4 Transponder or Radiofrequency Identification Systems......Page 247
8.3.2 PassLock......Page 252
8.3.3 Transponder......Page 253
8.4.1 Aftermarket Programming and Servicing Tools......Page 254
8.4.2 Transponder Key Cloning......Page 255
8.4.4 Transponders for Fraud Prevention......Page 256
8.5 ELECTRONIC KEY AND KEYLESS IGNITION SYSTEMS......Page 257
8.6 ALARM SYSTEMS......Page 258
BIBLIOGRAPHY......Page 259
9.1 INTRODUCTION......Page 260
9.2.1 Steering Column Design......Page 262
9.2.2 Separate-Component Column......Page 263
9.2.3 Single-Component Column (Ignition Lock-Column Lock-Starter Switch Assembly)......Page 268
9.2.4 Nonlocking Column......Page 269
9.3.1 Principle......Page 270
9.3.2 Ignition Lock Components and Their Operation......Page 271
9.4.2 Forced Removal of the Ignition Lock......Page 274
9.4.3 Forced Rotation......Page 275
9.4.4 Lock Picking......Page 276
9.4.6 Key Picks......Page 278
9.5.1 Principle......Page 280
9.5.2 Creation of the Debris Area......Page 283
9.5.3 Recovery of Evidence......Page 285
9.6.1 Principle......Page 287
9.6.3 Laboratory Examination......Page 288
BIBLIOGRAPHY......Page 290
10.2.1 Evolution and Generalities......Page 292
10.2.2 Pin/Wafer Tumbler Keys......Page 293
10.2.3 Sidewinder and Centerwinder Keys......Page 294
10.2.5 Dimple Keys......Page 295
10.2.7 Keyless Systems......Page 297
10.3.1 Key Characteristics......Page 299
10.3.2 General Duplication Process......Page 300
10.3.3 Key-Cutting Machines or Duplicators......Page 301
10.4.1 Principle......Page 306
10.4.3 Depth Guide Marks......Page 307
10.5.1 Questions......Page 310
10.5.4 Key and Lock Matching......Page 311
10.5.6 Key Wear and Tear......Page 312
10.5.7 Copy Traces......Page 313
BIBLIOGRAPHY......Page 314
11.1 INTRODUCTION......Page 316
11.2.1 Different Types of Fluids......Page 317
11.2.2 Chemical and Physical Properties of Fluids......Page 318
11.3.1 Preliminary Observations and Level Check......Page 320
11.3.2 Sampling......Page 322
11.3.3 Information Accompanying the Samples......Page 323
11.4.1 Oil Contamination......Page 324
11.4.3 Engine Wear......Page 326
11.5 ANALYSIS OF ATF......Page 327
11.6.2 1997 Chevrolet Venture......Page 328
11.6.3 2002 Ford Explorer......Page 330
BIBLIOGRAPHY......Page 331
12.1 INTRODUCTION......Page 334
12.2.1 Fire Triangle......Page 336
12.2.2 Combustible......Page 337
12.2.3 Oxidizer......Page 341
12.2.5 Heat Transfer......Page 342
12.3.1 Purpose......Page 343
12.3.2 Fire Causes......Page 344
12.3.3 General Approach to the Fire Investigation......Page 349
12.3.4 Interviews and Information Collection......Page 350
12.3.5 Personnel Protection and Equipment......Page 351
12.4.1 General Principles......Page 353
12.4.2 Compartments......Page 354
12.4.3 Patterns on the Vehicle Body......Page 355
12.4.5 Multiple Points of Origin......Page 359
12.5.1 General Principles......Page 360
12.5.2 Sources of Ignition in a Vehicle......Page 362
12.5.4 Causes with Insurance Fraud Scheme Vehicles......Page 363
12.6 PHYSICAL EVIDENCE......Page 365
BIBLIOGRAPHY......Page 367
13.1 INTRODUCTION......Page 370
13.2.3 Physical Constraints......Page 371
13.2.4 Physical Limitations of the Aquatic Environment......Page 372
13.3.1 Search from the Surface......Page 375
13.3.2 Search in the Water......Page 376
13.3.3 Sonar Methods......Page 378
13.4.2 Step by Step......Page 380
13.5.2 Photography and Video Recording......Page 383
13.5.4 Note-Taking......Page 385
13.6.1 Principle......Page 387
13.6.2 Documents......Page 388
13.6.3 Firearms......Page 390
13.6.5 Trace Evidence......Page 391
13.6.6 DNA Traces......Page 392
13.6.7 Bodies......Page 393
13.6.8 Fingerprints and Palm Prints......Page 395
BIBLIOGRAPHY......Page 397
14.2.1 Principle......Page 400
14.2.3 Registration in Austria......Page 401
14.2.5 Registration in Canada......Page 404
14.2.8 Registration in Germany......Page 405
14.2.10 Registration in Italy......Page 406
14.2.16 Registration in Switzerland......Page 407
14.2.17 Registration in the United States......Page 408
14.3.2 Aluminum Plates......Page 410
14.4.3 Authentic Plates......Page 413
14.5.1 Principle......Page 414
14.5.2 Source of Information......Page 415
14.5.4 Comparison of Embossing Defects......Page 416
BIBLIOGRAPHY......Page 419
15.1 INTRODUCTION......Page 422
15.2.1 General Principle......Page 423
15.2.2 International Standardization and Cooperation......Page 426
15.2.3 EU Legislation......Page 427
15.3.1 Principle......Page 428
15.3.2 Manufacture......Page 429
15.3.3 Secured Personalization......Page 435
15.3.4 Secured Issuance and Disposal......Page 436
15.4.2 Types of Fraud......Page 437
15.4.3 Fraud Trends......Page 439
15.5.2 Equipment......Page 443
15.5.5 Comparison Process......Page 444
15.5.7 Electrostatic Detection Apparatus......Page 445
15.5.10 Fingerprint Examination......Page 446
BIBLIOGRAPHY......Page 447
16.2 EQUIPMENT......Page 450
16.3.1 Definition......Page 451
16.3.3 Partitions......Page 452
16.4.3 Motorcycles......Page 463
ACKNOWLEDGMENTS......Page 464
17.1 INTRODUCTION......Page 466
17.2.1 Organized Crime and Terrorist Organizations......Page 468
17.2.2 Use of Stolen Vehicles to Help Fund Terrorism......Page 470
17.2.3 Use of Stolen Vehicles for Explosives Transportation......Page 471
17.2.4 Use of Stolen Vehicles for Surveillance and Transportation......Page 472
17.3.2 Forensic Evidence to Identify Suspects or to Cross-Link Vehicles......Page 473
17.3.3 Processing Suspicious Vehicles......Page 474
17.4.1 Principle......Page 475
17.4.2 Understanding the Effects of Explosions on Vehicles......Page 476
17.4.3 Specialists Involved in Bombing Investigations......Page 477
17.4.4 Identifying Explosives......Page 479
17.5.1 World Trade Center, New York City, United States, 1993......Page 480
17.5.2 Federal Courthouse, Oklahoma City, United States, 1995......Page 481
17.5.3 Spain Assassination Case, Madrid, Spain, 2000......Page 482
17.5.4 Sari Club and Paddy’s Pub, Bali, Indonesia, 2002......Page 483
BIBLIOGRAPHY......Page 485
18.1 INTRODUCTION......Page 490
18.2 INITIAL REPORTING AND INVESTIGATION OF A STOLEN VEHICLE......Page 491
18.3.1 Principle......Page 492
18.3.2 Clues to Finding Stolen Vehicles......Page 493
18.3.3 Vehicle Identification Officers......Page 495
18.3.4 Technology......Page 496
18.3.5 Processing Recovered Vehicles......Page 498
18.4.2 Types of Thefts......Page 500
18.4.3 Long-Term Versus Short-Term Cases......Page 507
18.4.4 Utilization of Informants......Page 508
18.4.6 Search Warrants......Page 509
18.5 PROSECUTION OF AUTO THEFT CASES......Page 510
18.6 TYPES OF AUTO THEFT INVESTIGATIVE UNITS......Page 511
BIBLIOGRAPHY......Page 512
19.2 INFORMATION IN POSSESSION OF THE INSURANCE COMPANY......Page 514
19.3.2 First Measures Taken by the Insurance Company at Time of Theft Notification......Page 515
19.3.3 Questionnaire......Page 516
19.3.4 Procuration......Page 518
19.4.2 Investigation Methodology......Page 519
19.4.3 Checklist......Page 521
19.4.4 Case Examples......Page 523
19.4.5 Recovery of the Vehicle......Page 524
19.5.1 Payment of Claim......Page 525
BIBLIOGRAPHY......Page 526
19.6 INTRODUCTION......Page 527
19.7 INDICATORS OF FRAUD......Page 528
19.8.2 Examinations......Page 529
19.8.4 Documentation and Authorizations......Page 531
19.8.5 Sources of Information......Page 532
19.8.6 Interviews......Page 533
19.8.7 Timelines......Page 534
19.9.1 Reservation of Rights or Nonwaiver......Page 535
19.9.3 Disposition of the Claim......Page 536
BIBLIOGRAPHY......Page 537
20.1 INTRODUCTION......Page 538
20.2.1 Lojack......Page 539
20.2.2 Global Positioning Systems......Page 540
20.2.4 Cell Phones......Page 542
20.3.2 Installation in the Scope of an Investigation......Page 543
20.3.3 Covert Installations......Page 544
20.4.2 Verifying Sources of Information......Page 545
20.4.5 Installation on Vehicles Cooling Off......Page 546
20.4.6 Bait Car Operations......Page 547
20.5.1 Operation Company Car......Page 548
20.5.2 Lojack Recovery on the Miami River......Page 549
20.5.3 Tracking a Toyota Land Cruiser to Chicago......Page 550
20.5.4 Out to Sea......Page 551
BIBLIOGRAPHY......Page 552
21.1 INTRODUCTION......Page 554
21.2 VEHICLE CRIME: A CASE OF INFORMATION OVERLOAD?......Page 555
21.3.1 Routine Activity Theory......Page 556
21.4.1 Geographic Information Systems......Page 558
21.4.2 Geocoding......Page 559
21.4.3 Layers......Page 561
21.4.4 Attribute Queries......Page 563
21.4.5 Spatial Queries......Page 564
21.5.1 Maximizing Investigator Effort......Page 565
21.5.2 Hotspot Mapping......Page 566
21.5.3 Recovered Vehicle Mapping......Page 567
21.6.1 Identifying Patterns......Page 569
21.6.2 Targeting Crime Detection Technologies......Page 570
21.7 A PRIMER ON MAPPING SERVICES......Page 571
21.8 DATA CHECKLIST......Page 572
BIBLIOGRAPHY......Page 573
22.2 HISTORY......Page 576
22.3.2 Measuring Vehicle Crime......Page 578
22.3.3 Where Do All These Stolen Cars Go?......Page 580
22.4.1 The Illegal Process......Page 581
22.4.2 Methodological Considerations......Page 582
22.4.3 Victims and Actors......Page 586
22.4.4 International Operations......Page 587
22.4.5 Specific Criminal Expertise......Page 590
22.4.6 An Integrated Multidisciplinary Approach......Page 591
22.5.1 Principles......Page 593
22.6 THE INTERPOL TOOLS......Page 594
22.7 CONCLUSION......Page 596
BIBLIOGRAPHY......Page 597
ABBREVIATIONS......Page 598
INDEX......Page 604
Color Plates......Page 628