copyright © 2005 identi-kit solutions identi-kit ® “your partner in investigations since 1959”
TRANSCRIPT
Copyright © 2005 Identi-Kit Solutions
Identi-Kit®
“Your Partner in Investigations since 1959”
Copyright © 2005 Identi-Kit Solutions
Identi-Kit.NetTraining for Criminal Justice
Faculty
Presented by:John Corder
Certified Identi-Kit TrainerITT Technical Institute CJ Program
Copyright © 2005 Identi-Kit Solutions
Contact Information
Toll Free: 866-414-9286Direct: 480-682-3820Fax: 480-483-9275
Email: [email protected]: http://www.identikit.net/contact.php
Copyright © 2005 Identi-Kit Solutions
• Identi-Kit is the oldest and most widely used facial composite tool employed by professional investigators.– Established in 1959– Currently in use by more than 1000 LEA’s in
the US and Canada, including:• State Police of NY, NSA, FBI, US Army in Iraq,
MIT, Harvard
– Sold in Europe, Asia and Latin America
Identi-Kit Stats
Copyright © 2005 Identi-Kit Solutions
• 1955 – Original Identi-Kit is created• “The box that catches criminals”
• 1959 – Smith & Wesson begins marketing Identi-Kit
• 1968 – Smith & Wesson purchases Identi-Kit• To create a new version and enlarge distribution
• 1989 – Dos version is released – Could Run Windows DOS 3.1• The start of the “computer composite” age
• 1993 – Identi-Kit III version 2.1
• 1997 – Identi-Kit 2000 version is released• “Identi-Kit 2000” Improved user interface- stilled loved by many today
• 2003 – Identi-Kit.Net is developed• “The worlds first web based composite tool”
• 2004 – January .Net is released to the public • “Put your suspects online where everyone can see them”
• 2005 - March Complete integration of Identi-Kit.Net & CD v6.0• Automatic Library Updates via the web • Greatly enhanced Graphic Interface
Copyright © 2005 Identi-Kit Solutions
“Your Partner in Investigations since 1959”
Copyright © 2005 Identi-Kit Solutions
Integrated Solutions
Identi-Kit.Net Identi-Kit CD
Copyright © 2005 Identi-Kit Solutions
• Utilizes an Investigative Wizard to generate an initial, complete facial composite.
• Library contains over 1200 components organized into 13 categories.
• Capable of producing over 5 billion unique facial composites.
The power of Facial Composite Software
Copyright © 2005 Identi-Kit Solutions
• “Composite Images” refer to images produced form component parts with assistance of witness input.
• Composites are not:– Based on combination of photographs– Reconstructions based on a skull (e.g. forensic
reconstruction)– Postmortem drawings– Child age progressions
Copyright © 2005 Identi-Kit Solutions
Identi-Kit®
Examples
Copyright © 2005 Identi-Kit Solutions
30 year old white male with mustache and long hair
Copyright © 2005 Identi-Kit Solutions
22 year old white male with mustache, beard and darker complextion
Copyright © 2005 Identi-Kit Solutions
28 year old black male, bald with mustache and beard
Copyright © 2005 Identi-Kit Solutions
52 year old black male, very curly hair, and defined age lines
Copyright © 2005 Identi-Kit Solutions
24 year old black male, very curly hair, and defined age lines
Copyright © 2005 Identi-Kit Solutions
Copyright © 2005 Identi-Kit Solutions
Copyright © 2005 Identi-Kit Solutions
Copyright © 2005 Identi-Kit Solutions
Copyright © 2005 Identi-Kit Solutions
Copyright © 2005 Identi-Kit Solutions
Copyright © 2005 Identi-Kit Solutions
Copyright © 2005 Identi-Kit Solutions
Copyright © 2005 Identi-Kit Solutions
Copyright © 2005 Identi-Kit Solutions
• The role of “memory” is crucial in creation of composite.– Certain faces are simply easier to describe – More distinctive = More recognizable
• Research indicates that memory tends to encode faces as a “whole” – Initial composite presented to witness should be a
complete sketch– Recall is less precise when parts of face are displayed
in isolation
Suspect Memory
Copyright © 2005 Identi-Kit Solutions
• In laboratory tests, use of facial “cues” aided witness recall and improved composites. A witness may remember a part of the face in detail but still recognize the face better as a whole.
• Most effective composites have characteristic of replicating “proportions” of the actual face.– Identi-Kit sizing algorithm maintains proportionality
Copyright © 2005 Identi-Kit Solutions
• Sketch quality of composite is more effective than photo realistic image– Superfluous detail stifles interpretation– Photo quality precision suggests an absolute identity– If recall is imperfect, extra detail may be misleading
• In most cases, addition of color does not improve effectiveness of composite– Emphasis on color can distract witness– Recognition more closely linked to tonal variation and
proportion– Added complexity and cost of reproduction
Copyright © 2005 Identi-Kit Solutions
• “Sketch Quality in a composite has always offered one key advantage over photo detail… one is forced to apply a very fruitful margin of interpretation…superfluous detail defeats the purpose of the composite.
“ In a photographic composite, precise details may result in a product which precisely suggests an absolute identity. This tempts the viewer to interpret what the composite is trying to say very narrowly, thereby leaving may potential stones unturned in the investigation.”
– “Composite Art: General Principles for Man and Machine,” Tom Macris, San Jose PD
• “Using color may add confusion to the interview situation. No evidence suggests addition of color to composite images results in greater recognition value.”
– Forensic Art and Illustration, Karen Taylor, CRC Press, 2001
Copyright © 2005 Identi-Kit Solutions
• Social Dynamics of the Cognitive Interview– Develop rapport and personalize the interview– Encourage witness to be active participant– Promote extensive and detailed responses with open
ended questions– Recreate original context of the event
• Witness may remember events out of sequence– Work with them to step through the scene step by step
• Use caution in cases involving a highly traumatic event
– Encourage partial answers or information– Use varied retrieval approaches
• Sound, apparel, voice, smell…
Copyright © 2005 Identi-Kit Solutions
The power of “Identification by Elimination”
Reprint from: Identi-Kit Manual © - A System of Modern Day Visual Identification – Lesson One
The Identi-Kit Purpose and Concept
The purpose of the Identi-Kit is to enable you to make a composite likeness
of a person from a verbal description given to you by a victim or witness.
Ideally, this likeness will resemble the person being described closely enough so that
every person who does not look like the composite can be eliminated as an immediate
suspect. In other words, the composite narrows the field of suspects to those who
resemble the composite likeness. For example, if the composite likeness of the suspect
shows a person with a full head of hair, then completely bald suspects are potentially
eliminated. Don’t fall prey to claims that the likeness does not look exactly like the
suspect. It is not designed to. It is designed to give you some immediate direction so
that you can look for certain facial characteristics right away (and eliminate others).
Copyright © 2005 Identi-Kit Solutions
Objective of “Investigation by Elimination”
• Goal is to obtain a good likeness to individual in question• Individuals who do not have similar attributes can be eliminated• Do not fall prey to claims that the composite does not look “exactly”
like the suspect
“If we find an individual who has similar characteristics as this sketch would you want us to stop him and ask their whereabouts at the time of the crime?”
And If so, “If we find an individual who has similar characteristics, would you like to take a look at them in a lineup to determine we have the right person?”
Copyright © 2005 Identi-Kit Solutions
Identi-Kit®
Investigation by Elimination
Demonstration
Copyright © 2005 Identi-Kit Solutions
Copyright © 2005 Identi-Kit Solutions
Copyright © 2005 Identi-Kit Solutions
The effectiveness of a composite is dependent on Accurate Facial Proportions
image by Worsley School of Art
Copyright © 2005 Identi-Kit Solutions
Identi-Kit offers a tool of two vertical lines to help the operator contemplate the balance and proportional reference of facial features.
The lines are found in the Identifying Marks or “ID Marks”Category
These are offered for operator assistance only, but can be a valuable tool for learning and application
Copyright © 2005 Identi-Kit Solutions
Be Sensitive to the Witness Angle of View
images by Artlist Collection “THE DOG”
• Noses and Chins are distorted and proportionally larger if viewed from below (e.g. a short victim viewing a relatively tall suspect or a child viewing an adult).
• Eyes may appear squinted from certain angles but may in fact be round when viewed directly.
• Hair may appear to be receding but when viewed directly may appear more full.
• Shading can also play into a persons recall – • The “Flip” and “Shade” feature in Identi-Kit allows
the operator to experiment with an opposite angle of view or alter shading to achieve the best results.
Copyright © 2005 Identi-Kit Solutions
Identi-Kit®
The .Net Application
Copyright © 2005 Identi-Kit Solutions
Identi-Kit®
The .Net Application
- System Architecture -
Copyright © 2005 Identi-Kit Solutions
Understanding the “Web Application” architecture
Adds Agencies
SWAT ApplicationServer
SWATDatabase
Identi-KitDatabase
Creates a Sketch
Adds Users
Performs a Search
Identi-Kit.netArchitecture
Agency SWAT Data Center SWAT
AgencyAdministrator
Identi-KitUser
Identi-KitUser
Back OfficeApplication
Identi-KitFlash Client
Identi-KitFlash Client
Back OfficeApplication
SWATAdministrator
ITT Campus Identi-Kit Data Center Identi-Kit Solutions
Identi-Kit Solutions
Administrator
Identi-Kit SolutionsDedicated CJ Program Server
http://itt.identikit.net/
ITT InstructorMonitors Usage
Identi-Kit Solutions AdministratorFor Security Cannot:• See User Passwords• Access CompositesBut Do: • Offer Tech Support• Provide Password Reset Tool• Maintain Security and Systems
MaintenanceStorage & AppAccess
User
Copyright © 2005 Identi-Kit Solutions
• Password Integrity
• Account Integrity
• Internet Hosted Application
• Worldwide Access to Account and Cases
• Export Capabilities for Local Backup and Portability
• Security – SSL Certificates provide Full 128-bit encryption (https:)
Benefits of the Identi-Kit System Architecture
Copyright © 2005 Identi-Kit Solutions
Identi-Kit®
The .Net Application
- Login & BackOffice-
Copyright © 2005 Identi-Kit Solutions
Sign In
Lets Login!
Identi-Kit’s Criminal Justice Server is located @ http://cj.identikit.net
Copyright © 2005 Identi-Kit Solutions
Lost Password Procedure
Copyright © 2005 Identi-Kit Solutions
Student – Start Page
Copyright © 2005 Identi-Kit Solutions
Student – My Account
Copyright © 2005 Identi-Kit Solutions
Identi-Kit®
The .Net Application
- Start .Net Application-
Copyright © 2005 Identi-Kit Solutions
Student & Faculty–
Click “Identi-Kit.Net”
Under navigation to start the .Net application
*Note –Name and Email must be filled in on My Account screen to start the application
Copyright © 2005 Identi-Kit Solutions
Student & Faculty– .Net Main Menu
*Note – This is a Pop-up window and all pop-up blockers must be deactivated or have Identikit.net added as a trusted site.
Copyright © 2005 Identi-Kit Solutions
Identi-Kit®
The .Net Application
- Interview Wizard -
Copyright © 2005 Identi-Kit Solutions
The Interview Wizard
prompts you through the basic interview options for a quick first effort composite
Copyright © 2005 Identi-Kit Solutions
Investigation Interview Wizard
Copyright © 2005 Identi-Kit Solutions
Copyright © 2005 Identi-Kit Solutions
Copyright © 2005 Identi-Kit Solutions
Recap of the Interview Wizard and techniques
• Once you have completed the Interview Wizard let the witness know you have created a “First Effort” composite(The witness should not see the first effort composite until you have set their expectations)
•Explain the “First Effort” composite is to spur conversation of changes that need to be made. You merely want their reaction to the overall likeness (or lack thereof) to know where to start
•Discuss the most obvious thing on the composite that needs changing and start there
•The witness will react to one feature and in the majority of cases this is the feature the recall the best.
Copyright © 2005 Identi-Kit Solutions
Identi-Kit®
The .Net Application
- Workspace Screen Layout -
Copyright © 2005 Identi-Kit Solutions
Identi-Kit.Net Screen Layout
Copyright © 2005 Identi-Kit Solutions
Student & Faculty–
“Browse for replacement”
Used to select different features
*Note – This is a Pop-up window and all pop-up blockers must be deactivated or have Identikit.net added as a trusted site.
Copyright © 2005 Identi-Kit Solutions
Identi-Kit®
The .Net Application
- Classroom Exercises &Tips-
Copyright © 2005 Identi-Kit Solutions
Thursday 7pm – A white male enters the Shop-N-Go at 4th and Washington and commits armed robbery.
The suspect was approximately 6 foot tall and wearing a hooded sweatshirt. He had short slightly curly hair and was thought to be approximately 22 years of age. He had a tattoo of a heart on his left forearm.
The suspect drove away in a White SUV with chrome wheels. He was accompanied by a young female approximately 20 years of age. The witness could not see the woman well enough for a composite but she is believed to be of Caucasian race with mid-length Brown hair.
The suspect was armed and violent - Approach with extreme caution.
The Facts
Copyright © 2005 Identi-Kit Solutions
• This can be done as a group or individually as the teacher prefers
• Another exercise that has proven useful is to have an individual come into the class, interrupt the teacher (Speak to them or possibly take something from their desk/podium, or disrupt the class in some way). Once the suspect has left discuss their appearance and create a composite of them. Discuss the likeness and elimination techniques used.
• If individuals create their own composite compare details that were captured and likeness to the individual and differences of interpretation and angle of view.
Now the class creates a composite
Copyright © 2005 Identi-Kit Solutions
Identi-Kit Tips and Tricks
• Bracketing technique– Purposely exaggerate features (large/small, position, etc.)
to aid witness recall and find the correct ratio and position
• Where to find unique attributes such as cleft of the chin, lines, and how to rotate and layer feature attributes
• Techniques for drawing women – – Shade techniques
– Eyes and eyebrows
– Smaller features
Copyright © 2005 Identi-Kit Solutions
Recap Key Features & Functions
• Help file – Searchable Help Content• Blue dashed Box – Scalable, Movable, Right
Clickable• Use the mouse to drag (move) and handlebars to
resize features• Browser Bar or Inventory Window to allow easy
search of feature graphics• Export to graphics file Wanted Poster or
composite• Wanted Poster – with customizable fields
Copyright © 2005 Identi-Kit Solutions
Items purposely left out of Identi-Kit
• Piercing – Can be removed• Large identifiable tattoo’s – Can be described and noted
on Wanted Poster• Color – Research indicates best results from Grayscale• Unique Hats, Clothing, etc.
A case is typically not solved by identifying someone on a hat they have worn or insignificant details. Focus on the attributes that set this person apart.
Copyright © 2005 Identi-Kit Solutions
Don’t forget - Lost Password Procedure
Copyright © 2005 Identi-Kit Solutions
Thank you for your time and using Identi-Kit!
John CorderSmith & Wesson Identi-Kit Solutions
Director, Sales and TrainingCertified Trainer
“Your Partner in Investigations since 1959”
Copyright © 2005 Identi-Kit Solutions
Identi-Kit Don'ts
• Never do a composite AFTER a photo spread has been shown.
• Do not do a composite in an area where the victim can be distracted.
• Do not show pictures or color components to the witness to help create the composite unless absolutely necessary.
• Do not rush a composite; if you are unsure and the witness does not feel comfortable with the image, take your time and approach the composite from a different perspective or facial feature.
• Do not ask leading questions.
Copyright © 2005 Identi-Kit Solutions
Identi-Kit Do’s
• Set aside enough time to do the composite. (Many agencies set aside two hours minimum)
• Read statement of victim or witness.
• Try and make the victim or witness feel comfortable with you.
• Work on one feature at a time.
• Use a simple grading system to test accuracy (1-10 as an example)
• Take notes; facts that may come out during the composite may not be known at that point. Be prepared to give a written statement should this occur.
• Look for commitment from witness
Copyright © 2005 Identi-Kit Solutions
Additional Resources:
Book- “Forensic Art and Illustration” by Karen T. TaylorISBN: 0849381185
FBI review of Karen's book -
http://www.fbi.gov/hq/lab/fsc/backissu/jan2001/taister.htm
Training material and information- by the National Institute of Justice “Eyewitness Evidence: A Guide for Law Enforcement”Slides / Manual @ http://www.ncjrs.gov/nij/eyewitness/foreword.htmlPlus other great resources on the searchable website.
Association / Web resource – International Association for Identification http://www.theiai.org/
Web – FBI Forensic Science Communications (current and back issues)http://www.fbi.gov/hq/lab/fsc/current/index.htm
“Your Partner in Investigations since 1959”