Lincoln University Digital Thesis 

advertisement
 Lincoln University Digital Thesis Copyright Statement The digital copy of this thesis is protected by the Copyright Act 1994 (New Zealand). This thesis may be consulted by you, provided you comply with the provisions of the Act and the following conditions of use: 


you will use the copy only for the purposes of research or private study you will recognise the author's right to be identified as the author of the thesis and due acknowledgement will be made to the author where appropriate you will obtain the author's permission before publishing any material from the thesis. Frontispiece. Thumbnail images of 3341 bitemark cast photographs from 467 possum-bitten
WaxTags in field trial used to make 504 identifications of 20 individuals.
Forensic Approaches to Monitoring and Individually Identifying
New Zealand Vertebrate Pests
A thesis
submitted in partial fulfilment
of the requirements for the Degree of
Doctor of Philosophy
at
Lincoln University
by
Keisuke Sakata
Lincoln University
2011
Abstract of a thesis submitted in partial fulfilment of the
requirements for the Degree of Doctor of Philosophy.
Forensic Approaches to Monitoring and Individually Identifying
New Zealand Vertebrate Pests
by
Keisuke Sakata
The brushtail possum (Trichosurus vulpecula) is New Zealand‘s number-one vertebrate pest
in terms of its ecological damage to native flora and fauna. One of the basic knowledges
needed to plan, perform and evaluate wildlife management inputs and outcomes is population
abundance. Although the most common method used in New Zealand for possum abundance
monitoring is the trap-catch method, the bait interference technique has advantageous
properties, including its minimal risk to non-target fauna, low operational cost, and ease of
use. Similar to the trap-catch method, animal abundance is inferred by an index of proportion
of baits interfered with. However, non-toxic bait can be interfered with by many individual
animals, and likewise a single individual can interfere with multiple baits, which is an
intrinsic drawback to the method, confounding the results due to an unknown probability of
multiple interference of bait.
This study assessed the issue of visits to a single bait by multiple species and individuals and
visits to multiple baits by a single individual by using forensic science approaches in
developing a novel method to identify the responsible species and individual animals from the
bitemarks that animals leave as interference.
The issue of identifying multiple species biting on bait was assessed by applying the bait to
captive animals of known species and defining the species from its bitemark‘s characteristics.
Possum and rodent bitemarks were defined by measuring single tooth-mark widths where
possums were 2.87 ± 0.51 mm, as opposed to 0.94 ± 0.28 mm for combined rat species and
0.46 ± 0.07 mm for mouse. Paired t-tests showed significant differences (p<0.05) between
ii
possum and rodent tooth mark widths. Qualitative description of striation- and impressiontype bitemarks also identified characteristic features of possums and rodents.
In order to assess the prevalence of multiple visits, a novel method to identify individual
animals was developed by applying the forensic firearm and toolmark examination principle
to microscopic features observed on the bitemarks. Trials using known simulated bitemarks,
blind test of random bitemarks, known ‗live‘ bitemarks from captive animals, and finally, a
random bitemark selection from known individuals which reached 89% precision and 99%
accuracy. This demonstrated that bitemarks can be used under controlled laboratory
conditions to reliably identify individual animals.
Field application of the above methods were conducted for 10 nights in paired blocks of 10 m
interval 12 × 12 grids, separated by 100 m. One block was treated with a food lure to follow
the most recent pest monitoring protocol. The number of interfered WaxTags® was
significantly higher (p<0.05) with food lure up to the third night, and showed no difference
afterward. By applying the novel method to the field, previously unknown information was
obtained: The mean and range of nightly activities recorded by the 20 identified individuals
were 2.5 tags (range 1–33) interfered with, 128.1 m (0–311) travelled distance and 0.11 ha (0–
2.8) in covered area. Up to three individuals bit one tag in one night, and WaxTags® were
repeatedly bitten for up to six nights at the same location. This study‘s novel individual
identification method has added another tool in wildlife management techniques.
Keywords: wildlife management, population monitoring, bait interference method, WaxTag®,
brushtail possum, Trichosurus vulpecula, individual identification, forensic science, bitemark,
toolmark
iii
Acknowledgements
I would like to express my huge gratitude to all of you great guys that allowed me to do this
study. Dr Shaun C. Ogilvie, my supervisor, supported me to get through some never-before
experienced difficulties, which was way beyond his duty as a supervisor. Dr Adrian M.
Paterson was also always encouraging, looking at the positive sides of everything. The two
supervisors were more than excellent in providing appropriate feedback in guiding my
research. Such exciting results would never have been produced if it weren‘t for you both.
Malcolm Thomas, Director of Pest Control Research, was THE best source of information on
WaxTag® and its use, besides that he assisted with the captive animal facility and provided
me with the WaxTags® used in the study. Dr. James G. Ross was essential in providing
statistical guidance in handling the huge amount of data.
The Postgraduate administrator Ms Bernadette Mani was always sympathetic towards
students‘ difficulties, and kept on supporting me to get through my research. Bruce Chapman,
who initially saw the start of my research as the Divisional Research Committee Chair and
carried on in the Academic Administration Committee, was exceptionally understanding on
what many students go through during the process and was ever so encouraging.
I can never fully thank my wife Akemi for her caring support while tolerating the hardships
that were part of this long journey. My parents were supportive from the first day I had this
crazy idea of studying again. My other family members Pommie, Chibi and Pula, all on fourwheel-drive and with wagging tails, were of great help by just being themselves.
James, Hamish, Doreen, Jeanie, Fiona, Chris, Robin, Blair, Denise et al., the staff at Student
Health and Support are awesome! I could have never made it this far without your support!.
My thanks also go to Anna Belle, Emma, Benoit, Craig, and Akemi, who participated in the
repeatability trials, and all the volunteers who helped with the simulated bitemark study. Your
input provided valuable data that formed part of this thesis.
Thanks all!
iv
Table of Contents
Abstract ..................................................................................................................................... ii
Acknowledgements .................................................................................................................. iv
Table of Contents ...................................................................................................................... v
List of Tables .......................................................................................................................... viii
List of Equations ...................................................................................................................... ix
List of Figures ........................................................................................................................... x
Chapter 1 Introduction and Background............................................................................... 1
1.1 Wildlife management ........................................................................................................ 1
1.1.1 Animal abundance ................................................................................................. 3
1.1.2 Population monitoring ........................................................................................... 5
1.1.3 Mammals in New Zealand .................................................................................... 6
1.1.4 Monitoring animals ............................................................................................... 8
1.1.5 Bait Interference techniques .................................................................................. 9
1.1.6 Contagion ............................................................................................................ 11
1.1.7 Bait presentation and contagion .......................................................................... 14
1.1.8 Lure attractability and contagion......................................................................... 15
1.1.9 Behaviour and contagion ..................................................................................... 17
1.2 Forensic science .............................................................................................................. 18
1.2.1 Individual identification ...................................................................................... 18
1.2.2 Forensic odontology ............................................................................................ 22
1.2.2.1 Dental variation ..................................................................................... 22
1.2.2.2 Individual identification from bitemarks .............................................. 25
1.2.2.3 NAS report and forensic odontology .................................................... 30
1.2.3 Firearm and toolmark examination ..................................................................... 32
1.2.3.1 Toolmark variation ................................................................................ 32
1.2.3.2 Toolmark generation ............................................................................. 35
1.3 Identification in wildlife .................................................................................................. 36
1.3.1 Wildlife forensics ................................................................................................ 36
1.3.2 Species identification .......................................................................................... 37
1.3.2.1 Footprints .............................................................................................. 38
1.3.2.2 Sound .................................................................................................... 38
1.3.2.3 Hair........................................................................................................ 39
1.3.2.4 Genetic material .................................................................................... 39
1.3.2.5 Bitemarks .............................................................................................. 40
1.3.3 Individual identification ...................................................................................... 43
1.3.3.1 Markings ............................................................................................... 43
1.3.3.2 Biological material ................................................................................ 44
1.3.3.3 Traces and signs .................................................................................... 45
1.3.3.4 Bitemarks .............................................................................................. 45
1.4 Objectives ........................................................................................................................ 46
1.5 Structure of thesis ............................................................................................................ 47
Chapter 2 Species Identification From Bitemarks on WaxTags®...................................... 48
2.1 Introduction ..................................................................................................................... 48
2.2 Methods ........................................................................................................................... 49
2.2.1 Captive animals of known species ...................................................................... 50
v
2.3
2.4
2.2.2 Bitemark detection device: WaxTag® ................................................................. 50
2.2.3 Presentation of WaxTags® .................................................................................. 52
2.2.4 Photographic data capture ................................................................................... 53
2.2.4.1 Setup...................................................................................................... 53
2.2.4.2 Measurements ....................................................................................... 53
Results ............................................................................................................................. 57
2.3.1 Bitemark type recognition and description ......................................................... 57
2.3.2 Bitemark width measurements ............................................................................ 61
2.3.2.1 Toolmark identification ......................................................................... 64
Discussion ....................................................................................................................... 64
2.4.1 Bitemark description ........................................................................................... 64
2.4.2 Bitemark measurement ........................................................................................ 65
2.4.3 Further study ....................................................................................................... 65
Chapter 3 Identification of Individual Possums From Bitemarks on Wax ...................... 66
3.1 Introduction ..................................................................................................................... 66
3.2 Methods ........................................................................................................................... 68
3.2.1 Simulated bitemarks from known individual‘s dentition .................................... 68
3.2.1.1 Individual animals ................................................................................. 69
3.2.1.2 Wax medium ......................................................................................... 70
3.2.1.3 Bitemark simulation .............................................................................. 70
3.2.1.4 Observation ........................................................................................... 72
3.2.1.5 Comparison schedule ............................................................................ 75
3.2.2 Blind comparison of simulated bitemarks ........................................................... 76
3.2.2.1 Cast preparation and observation .......................................................... 76
3.2.3 Bitemarks from captive known individual possums ........................................... 78
3.2.3.1 Individual animals, WaxTag® presentation and bitemark observation . 78
3.2.4 Repeatability and performance............................................................................ 78
3.3 Results ............................................................................................................................. 82
3.3.1 Bitemark features for identification .................................................................... 82
3.3.2 Image capture and enhancement ......................................................................... 83
3.3.3 Individual match trials ......................................................................................... 84
3.3.4 Repeatability and performance............................................................................ 87
3.3.4.1 Uncontrolled observation ...................................................................... 87
3.3.4.2 Controlled observation .......................................................................... 87
3.4 Discussion ....................................................................................................................... 91
3.4.1 Observation ......................................................................................................... 91
3.4.2 Identification ....................................................................................................... 92
3.4.3 Comparison of bitemark casts ............................................................................. 93
3.4.4 Repeatability........................................................................................................ 93
3.4.5 Further study ....................................................................................................... 94
Chapter 4 Individual Identification of Wild Possums From Bitemarks ........................... 95
4.1 Introduction ..................................................................................................................... 95
4.2 Methods ........................................................................................................................... 98
4.2.1 Study area ............................................................................................................ 98
4.2.2 Site selection within the study area ..................................................................... 99
4.2.3 WaxTag® layout design ..................................................................................... 100
4.2.4 WaxTag® field deployment ............................................................................... 101
4.2.5 WaxTag® retrieval and recording ...................................................................... 105
4.2.6 Data collation .................................................................................................... 106
4.2.7 NPCA protocol .................................................................................................. 107
vi
4.3
4.4
Results ........................................................................................................................... 107
4.3.1 Retrieved WaxTags® ......................................................................................... 107
4.3.2 Influence of food lure on WaxTags® interference ............................................ 108
4.3.3 Repeated visits to tags ....................................................................................... 112
4.3.4 Identification of individual possums ................................................................. 114
4.3.5 Identified individuals......................................................................................... 116
4.3.6 Activity patterns of individual possums ............................................................ 117
4.3.7 BMI emulation .................................................................................................. 151
Discussion ..................................................................................................................... 152
4.4.1 Individual identification .................................................................................... 152
4.4.2 Multiple visits.................................................................................................... 153
4.4.3 Food reward....................................................................................................... 154
4.4.4 Further ecological information .......................................................................... 154
4.4.5 NPCA protocol .................................................................................................. 155
4.4.6 Further directions .............................................................................................. 156
Chapter 5 General Summary and Conclusions ................................................................. 158
5.1 Introduction ................................................................................................................... 158
5.2 General discussions ....................................................................................................... 159
5.2.1 Forensics............................................................................................................ 159
5.2.2 Bitemark stability .............................................................................................. 159
5.2.3 Wildlife management ........................................................................................ 160
5.3 Study components ......................................................................................................... 160
5.3.1 Species identification ........................................................................................ 161
5.3.2 Individual identification — laboratory .............................................................. 161
5.3.3 Individual identification — field ....................................................................... 162
5.4 Conclusions ................................................................................................................... 162
5.5 Future directions............................................................................................................ 163
5.5.1 Quantified identification ................................................................................... 163
5.5.2 Objective identification criteria ......................................................................... 164
5.5.3 Computer assisted identification ....................................................................... 164
5.5.4 Other applications of WaxTags® ....................................................................... 166
5.6 Contribution to knowledge ............................................................................................ 168
References.............................................................................................................................. 169
Appendix A Wildlife abundance assessment methods ...................................................... 196
Appendix B Forensic odontology terminology (excerpts) ................................................. 197
B.1 Bite mark vs. bitemark .................................................................................................. 197
B.2 A characteristic (as it pertains to bitemarks) ................................................................. 197
B.3 Bitemark definition ....................................................................................................... 198
Appendix C Forensic toolmark examination glossary (excerpts) .................................... 199
C.1 Toolmark examination .................................................................................................. 199
C.2 Firearm terminology...................................................................................................... 201
C.3 Firearm anatomy and sources of toolmarks .................................................................. 201
Appendix D Site selection (random plots) .......................................................................... 204
Appendix E Individuals identified on WaxTags® from each night .................................. 206
Appendix F Nightly activity by individual possums. ......................................................... 213
Appendix G Striation quantification trial of bitemark cast image .................................. 215
vii
List of Tables
Table 2-1. Mean single-tooth mark width measurments from possums and rodents. .............. 62
Table 3-1. Confusion matrix to evaluate identification performance. ...................................... 79
Table 4-1. Number of WaxTags® retaining bitemarks by possums and rodents. ................... 108
Table 4-2. Individual identification made from possum bitemarks on WaxTags® ................ 116
Table 4-3. Cumlative bitten WaxTags® and grid locations up to 3, 7 and 10 nights. ............ 127
Table 4-4. Summary WaxTag® biting activity of individual possums over 10 nights. .......... 128
Table 4-5. BMI emulation from WaxTag® grids.................................................................... 152
viii
List of Equations
(3.1) Accuracy .......................................................................................................................... 80
(3.2) Precision ........................................................................................................................... 80
(3.3) Sensitivity ........................................................................................................................ 80
(3.4) Specificity ........................................................................................................................ 80
(3.5) Geometric mean ............................................................................................................... 81
(3.6) Matthews correlation coefficient ..................................................................................... 81
(3.7) F-measure......................................................................................................................... 81
(3.8) Youden's index ................................................................................................................. 82
ix
List of Figures
Frontispiece. Thumbnail images of 3341 bitemark cast photographs from 467 possumbitten WaxTags in field trial used to make 504 identifications of 20 individuals.
Figure 1-1. Principles of toolmark creation. ............................................................................. 36
Figure 2-1. WaxTag® structure and dimensions. ...................................................................... 51
Figure 2-2. Origins of inter-dental ridges on WaxTag® bitemark made by possum upper
incisors. Numbers describe FDI nomenclature of individual teeth. ...................... 55
Figure 2-3. Tooth mark width measurement scheme for striation bitemarks by (a) possums
and (b) rodents as cross-section profiles in wax medium and corresponding
dentition creating respective marks. Observation and image capture was done
by orientating the bitemark with the optic axis perpendicular to the tangent at
the median ridge (corresponding to the median inter-incisor gap). Tooth mark
width was measured from the median ridge to the border of the distal ridge
immediately distal to the median ridge, or to the outer edge of the tooth mark
when recognised as the outer edge of the median incisor, i.e. full tooth mark
width. Numbers describe FDI two-digit nomenclature of individual teeth. .......... 56
Figure 2-4. Bitemark types by possums and rats observed from retrieved WaxTags® with
photograph insets of sample bitemarks: (a) possum impression bitemark, (b) rat
impression bitemark, (c) possum striation bitemark, and (d) rat striation
bitemark. ................................................................................................................ 58
Figure 2-5. Schematic illustration of striation type bitemarks of (a) rodent and (b) possum
with cut-away section views to show profiles. ...................................................... 59
Figure 2-6. Morphological characteristics of possum lower incisor impression bitemark
cast observed from dorsal view of occlusal facet of the incisal arch..................... 60
Figure 2-7. Morphological characteristics of upper incisal (occlusal) facet observed on
ventral view of incisal arch impression casts. Full-depth (a) and partial-depth
(b) full arch impression with teeth outline overlay, illustrating direction and
degree of tooth facet inclination among incisor teeth, and (c) schematic
topographical illustration of upper incisal facet with sharp, medium and
moderate concave inclination, and direction of inclination. .................................. 61
Figure 2-8. Single-tooth width measurement distribution of bitemarks by possums and
rodents.................................................................................................................... 63
Figure 2-9. Box plot of tooth width measurements of bitemarks by possums and rodents. .... 63
Figure 3-1. Bitemark simulation setup: (a) wax block setup on stand in relation to possum
cranium and its movement to simulate bite; (b) simulation process with teeth
scraping on wax surface; (c) wax block dimensions and block number label
position in relation to simulated bitemark, with azimuth designations in relation
to bite direction where bite started at azimuth 000 and ended at azimuth 180...... 71
x
Figure 3-2. Possum bitemark microscopic characteristics observation setup. (a, b)
simulated bitemark photograph capture setup with digital camera, illumination
and wax block with bitemark; (c) bitemark cast observation setup with stereo
microscope, illumination and silicone cast of bitemark. ....................................... 73
Figure 3-3. Image cropping to 200 × 800 pixels. ..................................................................... 75
Figure 3-4. Silicone cast preparation on bitemark: (a) silicone polymer application onto the
bitemark and (b) bitemark cast removal after polymer curing. The mirror
reversal of left (L) and right (R) between actual bitemark and cast is
demonstrated. ......................................................................................................... 77
Figure 3-5. Sample bitemark images cropped (a, d), enhanced (b, c) and aligned (b–c). A
schematic sample generated from greyscale intensity values (e) demonstrate
positive identification possibility from a pair of unequal sized images. ............... 85
Figure 3-6. Example of bitemark characteristics on casts used to identify individual
animals. .................................................................................................................. 86
Figure 3-7. Reference match trial identification performance by three observers — percent
correct identification. ............................................................................................. 88
Figure 3-8. Reference match trial identification performance by three observers —
sensitivity, specificity, precision and accuracy...................................................... 89
Figure 3-9. Reference match trial identification performance indices by three observers —
g-mean, Matthews correlation coefficient, F-measure and Youden's index.......... 90
Figure 3-10. Reference match trial identification performance indices by three observers —
correct identification rate fluctuation with trial repeats. ........................................ 90
Figure 3-11. Blind trial identification performance at differing azimuths (observer KS) ........ 91
Figure 4-1. Study area: Bottle Lake Forest Reserve, Christchurch, New Zealand................. 102
Figure 4-2. Sampling grid arrangement. Grids were composed of 12 × 12 nodes at 10 m
intervals, resulting in two 110 m × 110 m square plots. Minimum distance
between closest nodes in grid (a) and (b) was 100 m. Node location notation
was presented as a row + column combination, e.g., C10 for 3rd row 10th
column node. Node A01 was designated as grid start reference. ........................ 103
Figure 4-3. Components of hip-chain and its functional principle. Free end of thread is
fixed to a reference location, e.g. tree, while the mobile unit (yellow box) is
carried by the researcher along the pre-determined transect. Distance travelled
from the reference location is measured by length of thread pulled out from
mobile unit recorded by the trip meter. ............................................................... 104
Figure 4-4. WaxTag® field deployment. WaxTags® and glo-tags were attached together to
tree trunk by a wood screw at 30 cm above ground. In one grid plot, food lure
(flour/sugar mixture) was applied to the tree below the WaxTag®. Photograph
taken after one night. ........................................................................................... 105
Figure 4-5. Cumulative number of WaxTags® bitten per line without replacement. Both
numbers of bitten WaxTags® with and without food lure reach asymptote after
xi
five nights. Error bar = SEM. Significantly more tags with food lure were
bitten throughout the 10 nights. ........................................................................... 109
Figure 4-6. Cumulative number of WaxTags® bitten per line with replacement. Both
numbers of bitten WaxTags® with and without food lure do not reach
asymptote and continuously increase. Error bar = SEM. Significantly more tags
with food lure were bitten throughout the 10 nights. .......................................... 110
Figure 4-7. Number of WaxTags® bitten per line each night. Error bar = SEM.
Significantly more tags with food lure were bitten up to the third night. No
significant difference between lure type was observed after the fourth night.
(p<0.05) ............................................................................................................... 111
Figure 4-8. Locations where WaxTags® were repeatedly bitten during 10-night period.
Grid (a) with no food lure and grid (b) with food lure. Actual distance between
grids was 100 m. Result shows that no saturation occurred after 10 nights. ....... 113
Figure 4-9. Grid locations and microscopic images of sample bitemark casts on WaxTags®
0077 and 4986 recovered from the first night, and WaxTag® 6118 recovered
from the second night. Identification was made on the bitemarks from the three
tags, interpreted as the same individual possum biting across a spatial span of
grid locations C02, J10 and L11, and across a temporal span of one night......... 115
Figure 4-10. Box-and-whisker plots of nightly (a) number of tags bitten, (b) distance
between furthest bitten tags and (c) minimum convex polygon area, of
individual possums. Individuals are sorted to the order of least to most number
of tags bitten in all three charts for comparison. ................................................. 118
Figure 4-11. Number of individual possums identified per line. Error bars = SEM. ............. 119
Figure 4-12. Distribution of WaxTags® bitten by individual possum 0077 for each of 10
nights, and cumulative MCP for all nights (colour plots), with cumulative
number of visits and nightly shift of centroid (greyscale plots). Legend for
colour plots is shown in ―Legend 1‖. Legend for greyscale plot is shown in
―Legend 2‖. .......................................................................................................... 130
Figure 4-13. Distribution of WaxTags® bitten by individual possum 0375 for each of 10
nights, and cumulative MCP for all nights (colour plots), with cumulative
number of visits and nightly shift of centroid (greyscale plots). Legend for
colour plots is shown in ―Legend 1‖. Legend for greyscale plot is shown in
―Legend 2‖. .......................................................................................................... 131
Figure 4-14. Distribution of WaxTags® bitten by individual possum 2353 for each of 10
nights, and cumulative MCP for all nights (colour plots), with cumulative
number of visits and nightly shift of centroid (greyscale plots). Legend for
colour plots is shown in ―Legend 1‖. Legend for greyscale plot is shown in
―Legend 2‖. .......................................................................................................... 132
Figure 4-15. Distribution of WaxTags® bitten by individual possum 0866 for each of 10
nights, and cumulative MCP for all nights (colour plots), with cumulative
number of visits and nightly shift of centroid (greyscale plots). Legend for
colour plots is shown in ―Legend 1‖. Legend for greyscale plot is shown in
―Legend 2‖. .......................................................................................................... 133
xii
Figure 4-16. Distribution of WaxTags® bitten by individual possum 1885 for each of 10
nights, and cumulative MCP for all nights (colour plots), with cumulative
number of visits and nightly shift of centroid (greyscale plots). Legend for
colour plots is shown in ―Legend 1‖. Legend for greyscale plot is shown in
―Legend 2‖. .......................................................................................................... 134
Figure 4-17. Distribution of WaxTags® bitten by individual possum 0139 for each of 10
nights, and cumulative MCP for all nights (colour plots), with cumulative
number of visits and nightly shift of centroid (greyscale plots). Legend for
colour plots is shown in ―Legend 1‖. Legend for greyscale plot is shown in
―Legend 2‖. .......................................................................................................... 135
Figure 4-18. Distribution of WaxTags® bitten by individual possum 2272 for each of 10
nights, and cumulative MCP for all nights (colour plots), with cumulative
number of visits and nightly shift of centroid (greyscale plots). Legend for
colour plots is shown in ―Legend 1‖. Legend for greyscale plot is shown in
―Legend 2‖. .......................................................................................................... 136
Figure 4-19. Distribution of WaxTags® bitten by individual possum 6990 for each of 10
nights, and cumulative MCP for all nights (colour plots), with cumulative
number of visits and nightly shift of centroid (greyscale plots). Legend for
colour plots is shown in ―Legend 1‖. Legend for greyscale plot is shown in
―Legend 2‖. .......................................................................................................... 137
Figure 4-20. Distribution of WaxTags® bitten by individual possum 3443 for each of 10
nights, and cumulative MCP for all nights (colour plots), with cumulative
number of visits and nightly shift of centroid (greyscale plots). Legend for
colour plots is shown in ―Legend 1‖. Legend for greyscale plot is shown in
―Legend 2‖. .......................................................................................................... 138
Figure 4-21. Distribution of WaxTags® bitten by individual possum 0131 for each of 10
nights, and cumulative MCP for all nights (colour plots), with cumulative
number of visits and nightly shift of centroid (greyscale plots). Legend for
colour plots is shown in ―Legend 1‖. Legend for greyscale plot is shown in
―Legend 2‖. .......................................................................................................... 139
Figure 4-22. Distribution of WaxTags® bitten by individual possum 0560 for each of 10
nights, and cumulative MCP for all nights (colour plots), with cumulative
number of visits and nightly shift of centroid (greyscale plots). Legend for
colour plots is shown in ―Legend 1‖. Legend for greyscale plot is shown in
―Legend 2‖. .......................................................................................................... 140
Figure 4-23. Distribution of WaxTags® bitten by individual possum 0719 for each of 10
nights, and cumulative MCP for all nights (colour plots), with cumulative
number of visits and nightly shift of centroid (greyscale plots). Legend for
colour plots is shown in ―Legend 1‖. Legend for greyscale plot is shown in
―Legend 2‖. .......................................................................................................... 141
Figure 4-24. Distribution of WaxTags® bitten by individual possum 2382 for each of 10
nights, and cumulative MCP for all nights (colour plots), with cumulative
number of visits and nightly shift of centroid (greyscale plots). Legend for
colour plots is shown in ―Legend 1‖. Legend for greyscale plot is shown in
―Legend 2‖. .......................................................................................................... 142
xiii
Figure 4-25. Distribution of WaxTags® bitten by individual possum 3082 for each of 10
nights, and cumulative MCP for all nights (colour plots), with cumulative
number of visits and nightly shift of centroid (greyscale plots). Legend for
colour plots is shown in ―Legend 1‖. Legend for greyscale plot is shown in
―Legend 2‖. .......................................................................................................... 143
Figure 4-26. Distribution of WaxTags® bitten by individual possum 8355 for each of 10
nights, and cumulative MCP for all nights (colour plots), with cumulative
number of visits and nightly shift of centroid (greyscale plots). Legend for
colour plots is shown in ―Legend 1‖. Legend for greyscale plot is shown in
―Legend 2‖. .......................................................................................................... 144
Figure 4-27. Distribution of WaxTags® bitten by individual possum 4242 for each of 10
nights, and cumulative MCP for all nights (colour plots), with cumulative
number of visits and nightly shift of centroid (greyscale plots). Legend for
colour plots is shown in ―Legend 1‖. Legend for greyscale plot is shown in
―Legend 2‖. .......................................................................................................... 145
Figure 4-28. Distribution of WaxTags® bitten by individual possum 8349 for each of 10
nights, and cumulative MCP for all nights (colour plots), with cumulative
number of visits and nightly shift of centroid (greyscale plots). Legend for
colour plots is shown in ―Legend 1‖. Legend for greyscale plot is shown in
―Legend 2‖. .......................................................................................................... 146
Figure 4-29. Distribution of WaxTags® bitten by individual possum 1833 for each of 10
nights, and cumulative MCP for all nights (colour plots), with cumulative
number of visits and nightly shift of centroid (greyscale plots). Legend for
colour plots is shown in ―Legend 1‖. Legend for greyscale plot is shown in
―Legend 2‖. .......................................................................................................... 147
Figure 4-30. Distribution of WaxTags® bitten by individual possum 0919 for each of 10
nights, and cumulative MCP for all nights (colour plots), with cumulative
number of visits and nightly shift of centroid (greyscale plots). Legend for
colour plots is shown in ―Legend 1‖. Legend for greyscale plot is shown in
―Legend 2‖. .......................................................................................................... 148
Figure 4-31. Distribution of WaxTags® bitten by individual possum 4458 for each of 10
nights, and cumulative MCP for all nights (colour plots), with cumulative
number of visits and nightly shift of centroid (greyscale plots). Legend for
colour plots is shown in ―Legend 1‖. Legend for greyscale plot is shown in
―Legend 2‖. .......................................................................................................... 149
Figure 4-32. Overlay of all 20 identified individual possums‘ MCP plots in Figure 4-12 to
Figure 4-31, summarising individuals‘ nightly records over 10 nights. From left
to right: (a) all individuals in greyscale, possums that visited WaxTags® (b)
with no food lure, and (c) with food lure on first night, respectively, and
overlap of two lure-type initiated groups (d). Area colour intensity levels
correspond to degree of polygon overlap. ........................................................... 151
Figure 4-33. Relationship of emulated BMI with observed possum abundance. ................... 152
Figure 5-1. Relationship between study components, and the key outputs. ........................... 167
xiv
Chapter 1
Introduction and Background
In the realm of scientific enquiry, investigating the presence or non-presence of an object of
interest is one of the fundamental pursuits. Accordingly, quantitatively measuring the
abundance of the object is one of the first jobs a researcher will look into to assess the matter.
This thesis lies in the premises of such basic knowledge pursuits that most if not all
researchers aspire to achieve.
1.1 Wildlife management
Wildlife management practices are heavily dependent on having reliable population size
information to decide what management action to take and to assess the achievement of such
management activities, such as in protecting a threatened species or controlling a pest species
(Caughley and Sinclair 1994). In New Zealand, where the brushtail possum (Trichosurus
vulpecula Kerr) is a major conservation and agriculture pest, the trap-catch technique has
been widely used to obtain reasonably reliable information on its abundance, and the success
of population control operations, though it is not well suited to meet recent needs to monitor
possums at low to very low densities (Fraser et al. 2002). It also has the risk of trapping native
ground-dwelling birds, and alternative methods are being developed. The bait interference
method measures animal abundance from the frequency of non-toxic bait stations that are
interfered (Bamford 1970), and the use of wax-block baits to detect animals has the
advantages of being (1) lightweight, low-cost, and easy to set and maintain in the field,
allowing larger sample sizes to improve precision, (2) highly sensitive so it can detect
possums at low densities where trap-catch methods cannot, and (3) not threatening to nontarget species as it poses no risk of being caught in traps (Thomas et al. 2004). Bait
interference methods, on the other hand, have a potential problem that individuals may learn
1
the presence of attractive bait and actively search for more, a phenomenon known as
contagion (Bamford 1970). When contagion occurs, bait stations are not independent
sampling units, which is a major drawback in adopting the method as a robust monitoring tool
(Warburton 2000), and previous studies have attempted to prevent or contain contagion (e.g.,
Bamford 1970, Jane 1979, Bearman 2002, Thomas et al. 2004). However, it is not clearly
established what influences the occurrence of contagion, and how it occurs.
As bitemarks on wax blocks enable species differentiation between those that marked the
device, the potential of individual differentiation from the unique bitemarks was suggested
(Kavermann 2004). Individual identification methods allow investigation of the extent and
degree of behavioural traits that affect the occurrence of contagion, and possibly permit the
use of mark-recapture population estimation method that can generate accurate and precise
population abundance information.
Knowledge of contagion effects on bait-interference derived indices will increase
understanding of biases and possibly allow indices to be related to actual abundance, thus
improving accuracy. It shall also provide means to modify the technique to reduce contagion
effects to negligible levels, approximating the animal‘s random encounter with the bait, and
allow direct estimation of population density using frequency measurements of encounters
(Caughley 1977a). The outcome of this study shall provide insight into the wider issue of
contagion recognised internationally in various methods to measure population abundance
such as scent-station techniques and track-station techniques.
2
In any management profession, the manager needs to know the present status of the managed
resource as baseline information, and equally needs to know the relative information of the
resource to evaluate performances or design inputs to meet specified goals. In wildlife
management, obtaining reliable population size information for species is an essential
component. Apart from using this information to decide what action is needed for a given
population, such information is often essential for assessing the achievement of management
activities. Such achievement goals are frequently expressed as increasing, decreasing, or
maintaining the population at a specific level, as exemplified in managing threatened species,
pest species, and harvested species respectively (Caughley and Sinclair 1994, Lancia et al.
1994).
1.1.1 Animal abundance
Abundance of the population can be presented as population size or density, and is measured
as absolute abundance and relative abundance, with direct and indirect methods to obtain the
measurement. An index is another measurement of abundance that does not itself describe the
population size or density but which has a proportional relationship to it. Each resulting
abundance measure should be accompanied by a measure expressing the degree of the
measure‘s reliability, which can be statistically calculated and compared.
Absolute abundance of the population is the exact or estimated number of individuals in a
population at a given time point (Davis and Winstead 1980, Caughley and Sinclair 1994,
Lancia et al. 1994). For example, in exterminating a pest species from an island sanctuary the
absolute abundance needs to become nil. Absolute abundance is obtained from total counts
such as total-mapping of territorial birds (Verner 1985), estimating from sample counts (Jolly
1969), or from indirect methods such as mark-recapture or change-in-ratio by marking or
3
manipulating the population and calculating the original population size from the response of
population to the manipulation (Otis et al. 1978, Seber 1982).
Relative abundance is often used in wildlife management to compare abundance over
spatially or temporally different data sets. Provided the data sets are comparable, relative
abundance is sufficient to make many management decisions (Caughley and Sinclair 1994),
which may significantly reduce operational costs compared to obtaining absolute abundance.
Comparison of animal abundance at different time intervals may also provide information on
the population trend, i.e., whether the population is stable, decreasing or increasing. Relative
abundance is often useful to evaluate a management input that results in the change of animal
abundance, for example, percentage reduction of rats after a control operation.
When it is not possible or necessary to obtain the direct count of the animals‘ abundance, and
when an attribute changes in a predictable manner with changes in the absolute abundance, it
can be used to index the population abundance (Davis and Winstead 1980, Caughley and
Sinclair 1994, Lancia et al. 1994). Such attributes can be observable phenomena or traces of
activities (field signs) that can indicate the degree of presence at the location. Indices are
mostly used to make comparisons between populations from the same location at different
times (trend) or between populations from different locations at the same time, indicating
relative differences in abundance (Lancia et al. 1994). When indices are directly correlated
with absolute abundance or when the bias is known or measurable and thus can be corrected
for, it can also be used to calculate the absolute population size estimate. Different indices,
however, are derived from different principles, and are not directly comparable between
different methods (Caughley and Sinclair 1994).
4
1.1.2 Population monitoring
Monitoring a wildlife population provides information on population change over time and is
designed to answer specific questions. Monitoring involves using the measures of abundance
associated with the measures of reliability. Numerous methods to monitor animal populations
have been developed to meet various end-user needs with specific levels of reliability, as well
as to accommodate operational difficulties, either by reducing costs at the same reliability
level, or to increase outcome reliability with a given cost (Davis and Winstead 1980,
Caughley and Sinclair 1994, Lancia et al. 1994). Each method has its intrinsic and operational
advantages and disadvantages, and the choice of monitoring method largely depends on
whether the outcome is useful to the end-user to answer a specific question.
The reliability of animal abundance measurements to be used for monitoring, expressed as
accuracy and precision, can be statistically measured and should always accompany the result.
Accuracy is a measure of how close a result is to the true value. Monitoring methods can
result in giving a sufficiently accurate measure but having very wide confidence intervals due
to high variation among samples. Precision, on the other hand, is the probability of obtaining
the same results on the same measurement on the same object. For example, when a study
aims to determine whether an animal population has declined or increased, and not how large
it is, the accuracy of the measure is secondary to its precision (Caughley and Sinclair 1994,
Lancia et al. 1994).
Sensitivity of a monitoring technique can be categorised as the ability to detect animal
presence at a low density and as the ability to detect small changes in abundance. A sensitive
detection method that is capable of functioning at very low animal densities may face
problems of saturation at higher densities (Kavermann 2004, Thomas et al. 2004).
5
1.1.3 Mammals in New Zealand
The terrestrial mammal fauna of New Zealand is, with the exception of bats, entirely made of
introduced species that have established successfully mostly with the assistance of humans.
While some were vigorously protected during initial introduction periods, all are now
classified as statutory pests (King 1990).
Three of the naturalised rodent species are widespread in New Zealand: ship rat (Rattus rattus
Linnaeus), Norway rat (Rattus norvegicus Berkenhout), and house mouse (Mus musculus
Linnaeus) (King 1990). Besides competing with native birds for food sources such as
invertebrates, fruit and seeds, they are serious pests especially because of predation of native
vertebrate and invertebrate species (Innes 1990, Moors 1990, Murphy and Pickard 1990).
They also provide important food sources for predators such as stoats (Mustela ermine
Linnaeus) that are likewise predatory pest species that threaten the native fauna (Murphy and
Dowding 1995). Rodents are controlled by trapping and poisoning with toxicants such as
brodifacoum and cholecalciferol. The rodent population is monitored by track-stations and
trap-catch index from a trap-grid, though uncertainty remains in applying track station
visitation rates as a measure of population abundance (Brown et al. 1996, Blackwell et al.
2002).
The brushtail possum was introduced into New Zealand from mid-19th century to establish a
fur industry (Cowan 1990, Clout and Ericksen 2000). Lack of natural predators and its
opportunistic approach in feeding strategy (Nugent et al. 2000) allowed it to become a
widespread and major pest of agricultural and conservation values of New Zealand. Possums
6
are considered pests because they cause damage to crops and native forests, (Norton 2000,
Nugent et al. 2000, Payton 2000), are known to predate on native bird eggs and chicks (Hay
1981, Nugent et al. 2000), and are vectors and reservoirs of the economically important
bovine tuberculosis (Tb) (Ekdahl et al. 1970, Coleman and Caley 2000). Possums are
controlled by poison including sodium monofluoroacetate (1080) delivered in forms of cereal
pellet, paste and carrot baits, cyanide in paste or capsule forms, brodifacoum and
cholecalciferol both in cereal pellet forms (Morgan and Hickling 2000), and non-toxic
techniques, including hunting and trapping (Montague and Warburton 2000). Alternative
biological control methods, such as using parasites and diseases that cause high mortality, and
using biological agents that interfere with physiological processes involved in the production
of young, are being investigated (Cowan 2000). Possum populations are monitored by
spotlight counts, bait interference, bait-take from stations, faecal pellet counts, trap catch, and
mortality-sensing radio-transmitters (Warburton 2000, Fraser et al. 2002), to obtain estimates
of abundance and to evaluate control operation outcomes.
Currently the most widely used method to monitor possums is the trap-catch method
(Batcheler et al. 1967) with an operational protocol developed to ensure the method is used
consistently under standardised conditions (National Possum Control Agencies = NPCA
2004). The method is a basic form of catch-per-unit-effort model based on the assumption that
the number of possums caught is proportional to the effort put into catching them, and it has
been used to produce sufficiently reliable estimates of percentage kill in possum control
operations and to provide measures of relative abundance (Residue Trap Catch Index = RTCI)
(Warburton 2000). Recently there has been an increasing need to measure very low residual
trap-catch rates to meet more stringent residue possum density targets for controlling Tb, with
an acceptable degree of statistical robustness. Furthermore, vector managers are becoming
7
less interested in overall average possum abundance of the managed area, and more interested
in the spatial distribution of the residual possum population from the standpoint of controlling
the transmission of Tb (Fraser et al. 2002). To further achieve these requirements, refinement
of the trap-catch method and development of alternative techniques are being pursued
(Thomas 1998, Brown and Thomas 2000, Thomas et al. 2003, Brown et al. 2004). Recent
developments in alternative methods to meet current monitoring requirements include bait
interference methods which detect the presence of possums from bitemarks made on wax
blocks (Thomas et al. 1999, McGlinchy and Warburton 2000, Warburton 2000).
1.1.4 Monitoring animals
Much of wildlife management practices are based on, and evaluated by monitoring population
abundances, using various methods chosen to meet end-user needs of the information, and its
practicality (Bookhout 1994, Caughley and Sinclair 1994). Some methods may only provide
statistically imprecise and/or inaccurate estimates, and yet can answer a broad range of
ecological and management questions to an acceptable level of approximation. For example,
aerial survey is considered the only practical means of estimating the abundance of large
animals inhabiting a large area while providing population estimates of acceptable reliability,
and has been used successfully by wildlife management authorities in Africa (NortonGriffiths 1975, Caughley 1977b).
In New Zealand continuous efforts to control brushtail possums have necessitated the need to
generate abundance information through monitoring, currently done by using trap-catch
method as a principal tool under a set protocol (NPCA 2004, 2008b). While the trap-catch
index has so far shown to be practical for detecting large changes in possum density, the
method is inaccurate and imprecise at the very low possum densities that are now commonly
8
targeted (Fraser et al. 2002). The trap-catch technique involves setting heavy leg-hold traps at
prescribed distances along a trap line, checking each trap daily within 12 hours of sunrise as
required by the Animal Welfare Act (1999), releasing or killing animals caught, and resetting
sprung traps, for three nights. The high degree of required labour input restricts its use for low
to very low densities (Brown and Thomas 2000) as larger sample sizes to acquire a reasonable
level of reliability may significantly increase monitoring costs. Moreover, traps pose a risk of
catching non-target species, such as weka (Gallirallus australis) and kiwi (Apteryx spp) (Reid
1983). By-catch is currently reduced by raising traps off the ground (NPCA 2008b) although
this may reduce its detection ability (Thomas and Brown 2001). Alternative methods are
under development with a bait interference technique using wax blocks to detect interference
by target species as one of potential monitoring tools (Thomas et al. 1999, McGlinchy and
Warburton 2000, Warburton 2000, Fraser et al. 2002).
1.1.5 Bait Interference techniques
Monitoring animal abundance using interference methods operates on the principle that
animals randomly encounter detection devices, are positively attracted to the devices to leave
identifiable marks, from which frequency or proportion of marked detection devices is
collated, providing an index that is presumably proportional to the true animal abundance.
Scent-station or scent-post methods rely on animals attracted to an olfactory lure and mark
footprints on a patch of smoothed sand or soil, and the frequency of target species visitation is
recorded during a specified time frame (Linhart and Knowlton 1975, Travaini et al. 1996).
Track-plates or track-tunnels are footprint detection plates, and the method assumes that the
frequency of detection is proportional to the number of animals. Animals are lured to the
detection plates and pass a plate where its footprints are recorded by ink, soot or powder
9
(Brown et al. 1996, Zielinski and Stauffer 1996, Drennan et al. 1998, Thomas 1998,
Blackwell et al. 2002). The bait interference method detects the animal‘s visitation by luring
the animals to bait and recording any interference to the bait, such as partial or whole
consumption, disappearance, or scratch / bitemarks, using palatable bait such as flour paste
(Bamford 1970), flour and soy oil mixture (Spurr 1995), apple (Byers 1981, Arulchelvam and
Brown 1995), orange (Thomas et al. 2003), or unpalatable baits such as wax blocks (Thomas
and Meenken 1995, Thomas et al. 2003).
General advantages of these methods include detection of inconspicuous animals, such as
nocturnal species, non-destructive detection permitting monitoring of threatened species or
contamination by other species at minimum risk, and relative cost-effectiveness in that lowcost devices can be used in large quantities to improve detection sensitivity and precision
(Thomas 1998, McGlinchy and Warburton 2000, Fraser et al. 2002, Thomas et al. 2004).
Disadvantages include the contamination of multiple species that can interfere with the device
(Arulchelvam and Brown 1995), which is relatively easy to solve by identifying target species
from the marks, or prevent by choice of bait and presentation method. Another major issue
with using interference techniques to measure abundance is that the probability of individuals
marking multiple devices and individual devices being marked by multiple animals is
unknown (Linhart and Knowlton 1975, Roughton and Sweeny 1982, Zielinski and Stauffer
1996, Warburton 2000, Warrick and Harris 2001, Bearman 2002, Fraser et al. 2002, Sargeant
et al. 2003). Warburton et al. (2004) compared the bait interference method using bitemarks
on wax blocks and the abovementioned trap-catch index with mortality of radio-collared
possums to assess the indices‘ accuracy in detecting population change, and concluded that
further studies to assess the extent of potential bias in the bait interference method is
necessary to reliably use it to monitor possum abundance.
10
1.1.6 Contagion
As interference detection techniques rely on lures, there is a possibility of animals acquiring
learned attraction to these devices and to actively seek other detection devices over temporal
and spatial scales. Such behaviour can increase bait visitation frequencies and inflate
detection rates disproportional to its abundance. This phenomenon is known as contagion, or
multiple visits, creating an unknown probability of more than one individual animal being
recorded on one detection device, one individual being recorded on more than one device, or
the same animal marking one detection device repeatedly over time (Bamford 1970, Spurr
1994, Zielinski and Stauffer 1996, Sargeant et al. 1998, McGlinchy and Warburton 2000,
Warburton 2000, Bearman 2002, Sargeant et al. 2003, Thomas et al. 2003, Thomas et al.
2004). While detecting a species presence by these devices is straightforward and can be
readily accepted, application of the information to measure population abundance has been
varied due to the lack of evidence as to the frequency and form of contagion. The likelihood
that individual detection devices are not independent sampling units is one of the major
drawbacks in this method being adopted as a robust monitoring tool (Warburton 2000, Fraser
et al. 2002).
Contagion can occur in several forms that don‘t directly reflect the true animal abundance,
with differing degrees of effects to the method. When one individual marks more than one
device from a change in behaviour that it actively seeks more devices, it negates the
assumption of random encounter, and directly inflates the frequency of visitation. In the case
of multiple individuals marking one device, it will return only one positive result for an
unknown number of animals, confounding the presumed positive relationship between
devices interfered with and true animal abundance. When one individual marks a device
11
repeatedly, one device will return a positive result for one animal and will not influence the
overall estimate of abundance if each individual animal is consistently visiting the same
device, though there has been no method to provide evidence of such occurrence, or to
differentiate from multiple individuals‘ visitation.
Conversely, a phenomenon opposite to contagion may occur when animals acquire learned
aversion after its first encounter with the bait and actively avoid other detection devices it
encounters in the future, commonly known as repulsion. While contagion seriously affects the
reliability of the bait interference method by confounding the detection devices‘ positive
results, repulsion may be beneficial by preventing the same individual from marking multiple
devices, when the method is used as a one-off operation for a particular area. On the other
hand, when multiple trials are scheduled for the same animal population over a specific time
interval, such as before and after control operations, repulsion can be problematic as the
probability of detecting the animal has changed between the sampling operations, precluding
any comparisons of the results until the learned behaviour wanes from the animals‘ memory.
Previous studies assessed the occurrence of contagion from statistical probabilities of
diverging from random encounter with baits (Bamford 1970, Spurr 1995), from evidence of
increased bait interference with time (Thomas et al. 2003), or from the patchiness or
clustering of bait interference (Thomas et al. 2003, Hunter 2004).
Bamford (1970) found that as the level of bait interference increased nightly, for the first 3-5
days of baiting it arose from a summation of random encounters rather than active bait
seeking. In comparing bait lines with various bait spacings after 10 days of baiting, those of
12
over 40 yards (approx. 36 m) were considered free of contagion where the overall level of
interference had not increased significantly from the first day. Spurr (1995) assessed the
probability of contagion by whether the sequences of bait interferences along the lines of bait
stations were random. He found that the spatial distribution of bait interference was random at
least for the first night, and usually for at least five nights (non-randomness resulting from too
many consecutive interferences or non-interferences, which may indicate contagion, occurred
only after five nights), supporting earlier studies (Bamford 1970, Jane 1981) that contagion is
unlikely when bait stations are 40 m or more apart. However, he also found that individual
baits may be interfered with by more than one possum and that individual possums were
interfering with more than one bait, on bait lines with 40 m bait spacings, and suggested that it
could occur even at 200 m distances. Thomas et al. (2003) measured contagion by
determining whether significant increases occurred between the three baited nights, and found
that when spacing the bait at 20 m intervals, contagion occurred in orange baits, which
showed significant increase in average proportion of baits interfered with from night 1 to
night 3, but not in wax blocks. Hunter (2004) concluded that from the lack of patchiness of
possum interference in her line of cruciform tag stations spaced 100 m apart, that the distance
was effective to prevent contagion.
The prevalence of contagion, however, has not been extensively studied from the viewpoint of
individual animals. It is not clearly established what influences the occurrence of contagion,
and how it occurs. Identification of individual animals that visit the detection devices will
enable further studies into the phenomenon, evaluate its prevalence, and search for ways to
reduce, contain, or measure its occurrence. Such information is vital for developing new
methods of using the detection frequencies to index animal abundance.
13
1.1.7 Bait presentation and contagion
Thomas and Meenken (1995) used unpalatable wax blocks spaced at 20 m intervals along
sample lines, a method following closely the trap-catch protocol (NPCA 2004) and repeated
as similar layouts in later studies (Thomas and Hickling 1990, Ogilvie et al. 1996, Thomas
1998, Thomas et al. 1999, Ogilvie et al. 2000, Thomas et al. 2003). In attempts to reduce
effects of contagion that can occur in sample line layout pattern, clusters of multiple detection
devices were treated as single sampling units, which were then arranged at intervals presumed
sufficiently distant to treat contagion as negligible (Sargeant et al. 1998, 2003). A cruciform
layout with four wax blocks placed at 10 m distances around a centre wax block was designed
to accept contagion within the cluster and thus reduce the unknown bias and variability that
originates from contagion (Bearman 2002). Later studies have followed the cruciform design
(Hunter 2004, Kavermann 2004, Thomas et al. 2004, Thomas and Maddigan 2004) though
none had specifically provided evidence that the inter-station distances prevented contagion.
While Kavermann (2004) believed that any change in design was unwarranted, possible
alterations in the number of wax blocks per station and arrangement were suggested by
Hunter (2004) to maximize efficiency and reduce costs, but no study has determined the
optimal presentation of detection devices in terms of reducing contagion and optimising costefficiency.
Similarly in scent-station surveys, where the detection devices usually are arrayed
systematically in lines to reduce travel time and expedite data collection, scent-stations within
sample lines generally produce spatially dependent data including that of individuals visiting
multiple stations (Sargeant et al. 1998). The proportion of lines visited by carnivores,
compared to the proportion of individual stations visited was used to avoid the problem of
possible contagion (Sargeant et al. 1998). Sargeant et al. (2003) compared clustered data from
14
scent-station lines and data from each station, and argued that whilst the clustering method
reduced the undue influence of individuals visiting multiple stations it reduced sample size
with the given numbers of stations that can be practically set up, concomitantly increasing
sampling variability. Tracking tunnels are also prone to contagion, and in monitoring fishers
(Martes pennanti) and American martens (Martes americana) Zielinski and Stauffer (1996)
used small grids of tracking plates as sample units that are spaced almost twice the size of the
species home range diameter to reduce possibilities of spatial dependency.
1.1.8 Lure attractability and contagion
Studies have used the percentage wax block interfered or percentage wax removed to compare
relative attractiveness of various lures to wax blocks, as it affects sensitivity of the device
(Abrams et al. 2004, Hunter 2004, Kavermann 2004, Thomas and Maddigan 2004). In the bait
interference method, however, increased attraction to a detection device may also raise the
probability of animals changing behaviour upon initial or repeated contact with the lure and
actively seeking baits, therefore creating contagion.
Spurr (1995), and McGlinchy and Warburton (2000) suggested the high palatability of baits
as probable cause for contagion. McGlinchy and Warburton (2000) believed that solely visual
attractant should be used to avoid possums actively seeking other baits, and similarly Allen et
al. (1996) suggested that some attractants may bias the scent-station method by artificially
increasing dingo activity and influence the index over time. For example, compared to using
orange-quarter bait that showed evidence of contagion, unpalatable wax bait was suggested to
have prevented possums from actively seeking other baits (Thomas et al. 2003). Kavermann
(2004) suggested the lack of potential food sources (other than WaxTag® bait) in pine
plantations may have contributed to high levels of interference recorded in his study. Low
15
palatability of wax blocks, on the other hand, may induce learned aversion discouraging
animals from biting other devices (McGlinchy and Warburton 2000), which in effect should
prevent contagion.
Visual attractants to lure possums may be effective (Carey et al. 1997), and luminescent strip
lures have been proved more efficient compared to white, coloured and UV enhanced lures
(Hunter 2004, Thomas and Maddigan 2004, Ogilvie et al. 2006a, Ogilvie et al. 2006b). In an
extension study, it was concluded, however, that flour blaze (flour and icing sugar 5:1
mixture) attractants were significantly preferred by possums over purely visual (luminescent)
lures (Abrams et al. 2004, Ogilvie et al. 2006a). These studies suggest that highly attractive
lures may cause animals to actively seek devices thus increasing the method‘s sensitivity
when bait is used to detect possum presence, though no previous research studied the effect of
increased attraction on probable contagion, which is problematic when the method is used to
assess animal abundance. Similarly no study tested the effect of palatable lures compared to
visual lures as a probable cause of contagion (McGlinchy and Warburton 2000, Thomas et al.
2003).
The mechanism of how lure-attracted individuals actually interfere with detection devices is
unknown for interference devices. In scent station techniques, animals are lured to the
olfactory source and, upon approach, unintentionally leave footprints as a behaviour which is
independent to the attraction cue, though the occurrence of individuals that are lured but do
not approach the source close enough to pass the detection area, possibly influenced by wind
or individual wariness, is unknown. Track-tunnels are similar in that leaving footprints
derives from a behaviour independent to the olfactory and gustatory (taste) cues that lured the
animals to the device. In contrast, bait-interference using gustatory lures have direct
16
connections between the lure and the detection device which needs to be bitten or consumed
to detect animal visitation. When using visual lures, it is commonly believed that the animal‘s
curiosity attracts them to the detection device (Carey et al. 1997, Hunter 2004, Thomas and
Maddigan 2004), though the mechanism of switching from visual attraction to a device
attraction that encourage animals to mark detection devices is unknown. While studies
suggest that high palatability of bait may be a probable cause of contagion (Spurr 1995,
McGlinchy and Warburton 2000, Thomas et al. 2003), there is no evidence that directly
connects attraction behaviour and device marking behaviour to the occurrence of contagion.
Whether the attractants, using olfactory, gustatory, or visual cues are necessarily causing
contagion is unknown, though it is known to affect sensitivity (Warburton and Yockney 2000,
Hunter 2004, Thomas and Maddigan 2004). It is possible that although high numbers of
animals may be attracted by one or a number of combined cues, the detection devices may be
marked independent of the initial attraction, resulting in an increased device sensitivity while
keeping the contagion probability unchanged.
1.1.9 Behaviour and contagion
As contagion is essentially the animal‘s behavioural response to encountering (and
subsequently re-encountering) a novel object, it is difficult to objectively observe or measure.
Earlier observation trials using video recordings at wax block stations showed that at some
stations none of the wax blocks were interfered with for the first two nights although
numerous possums were recorded approaching the devices and licking the flour lure but
leaving no mark of presence, whereas other stations recorded nearly every possum
investigating the wax blocks (Bearman 2002). The study, however, could not make conclusive
explanations on how its observations were related to contagion, as it was outside its scope.
17
Although possums are solitary animals, social interactions occur upon encounter (Day et al.
2000). Such interactions are oriented mostly towards forming reproductive relations or
maintaining dominance relationships (Green 1984). Possums defend high-quality foodsources but will not continue to defend it after they cease feeding (Day et al. 2000), and
although feeding behaviour may influence the prevalence of contagion, most of the previous
behavioural studies have focused on its significance in possum control applications.
1.2 Forensic science
Forensic science is a discipline that endeavours to establish and re-construct the nature and
sequence of events of legal significance from traces, signs, or symptoms, left behind by those
who were present and by activities that occurred at the time and/or space. One core premise
centres on the domain of individual identification: the conclusion of identification can only be
reached where the source of marks possess a recognisable set of features that is unique to the
particular individual, and when the unique features are transferred as marks with sufficient
precision to discern the feature's characteristics (Kiely 2005).
1.2.1 Individual identification
Eyewitness testimony (Nelson et al. 2009) may be considered a historical form of individual
identification in the legal arena. Human facial recognition is an everyday task done
effortlessly for the human eye and brain (Kevin Zhou et al. 2009) although such human
behaviour has the risk of being subjective and non-consistent.
Biometric identification is an approach to objectively quantify various biological properties of
individuals, which has its roots in anthropometry (Bertillon 1893 quoted in Dessimoz and
18
Champod 2008). Recent Bayesian approach to the use of biometric identification systems was
introduced by Gonzalez-Rodriguez et al. (2006). Current use of normally unalterable
biological features that can be used in biometric identification cover a wide spectrum as
exemplified in the following:
Fingerprint, or more precisely, friction ridge examination compares its pattern which is
assumed to be unique to individual (Stoney 2001, Langenburg 2009, 2011). The identification
process can be automated using objective criteria in the form of an automated fingerprint
identification system (AFIS) (Meuwly 2009). Su and Srihari (2009) evaluated the probability
of random correspondence in fingerprint matches by mathematical models of fingerprint
features. Footprint analysis similarly applies the individuality of footprints for identification
purposes (Brown and Rutty 2005). Earprints (Alberink and Ruifrok 2007, Meijerman et al.
2009) and lips (Coward 2007) are also found useful in recognizing individuals. Compared to
the subjective eyewitness, objective facial recognition performed automatically by machines
is derived from research areas in computer vision, pattern recognition and image
understanding (Cattaneo and De Angelis 2009, Kevin Zhou et al. 2009). Iris and retinal
characteristics offer an identification source in humans (Yoon et al. 2005, Daugman 2009, AlDiri et al. 2010), as well as cattle (Allen et al. 2008). Individual recognition by comparing
radiographic images of the frontal sinus is likewise a feasible method (Besana and Rogers
2010). Dynamic biological characteristics such as gait can also identify individuals in humans
(Cunado et al. 2003, Lynnerup and Vedel 2005, Bashir et al. 2010, Simsik et al. 2010,
Bouchrika et al. 2011, Chen et al. 2011), and in animals (Sharma et al. 2005). Individual
variability in dental characteristics also offer identification opportunities (American Board of
Forensic Odontology = ABFO 1997, Glass 2005), which is reviewed in further detail in the
following section.
19
Genetic identification is a highly accurate method (Graham 2009) which was the basis of a
series of overturned convictions which were based on other forms of forensic evidence
(Neufeld and Scheck 2010). On the other hand, traditional forms of evidence such as
osteological and dental evidence, still provide forensic evidential value (Steadman et al. 2006).
Non-biological physical evidence that assist in reconstruction of an event include ballistics,
glass, and toolmarks. Ballistic examination of an firearm projectile‘s flight path could
determine the firearm‘s location when discharged (Jackson 2009, Maiden 2009). Glass
fragment examination could classify its refraction properties and identify its origin, as well as
reconstructing the impact point from the fragment‘s morphological characteristics (Curran
and Hicks 2009, Lovelock 2009).
Toolmarks are used to identify a suspect tool to a toolmark collected at the crime scene.
Firearm identification is a specialised branch of toolmark identification where the harder
material components of the firearm, usually steel, leaves toolmarks on the softer material
components such as lead bullets and brass cartridge cases. (Association of Firearm and Tool
Mark Examiners = AFTE 1998, Cork et al. 2008). Shoe and tyre prints can also take the form
of toolmarks that leave morphological features of the shoe sole or tyre impressed on soft
substances such as snow or sand (Bodziak 2005a, b). Similarly, bitemark analysis in forensic
odontology, a discipline based on pattern matching of bitemarks with the suspect‘s dentition‘s
characteristics, can be also considered a specialised branch of toolmark identification (Vale
2005).
20
Identity is established when the examiner is satisfied that one or more characteristics of the
examined objects sufficiently coincide beyond pure chance. In toolmark / bitemark analysis
the examiner determines whether the characteristics are from the same source e.g., a tool, a
firearm, or a set of teeth. Conversely, a conclusion of negative identification, i.e., exclusion or
elimination can be reached when the examiner determines that observed characteristics
sufficiently disagree between each analysed sample to the extent that the same source cannot
have made the marks (AFTE 1992, ABFO 1997).
The subjective nature of the human decision to declare a ‗match‘ is one of the main issues by
forensic identification science critiques (Saks 1994, Committee on Identifying the Needs of
the Forensic Science Community and National Academy of Sciences = NAS 2009). A typical
example can be the eyewitness testimony in identifying a suspect (Nelson et al. 2009) where
there is nothing more subjective than the witness‘s own interpretation and memory. Although
the testimony itself is not a scientific method performed by a forensic expert, its evidential
value is increased though various operational methods derived from sound cognitive and
psychological science (Peterson and Loftus 2009, Ruifrok 2009).
Cognitive bias has been recognised as having influence in decisions (Dror 2005, Dror et al.
2005). This may be problematic in forensic science disciplines that rely on decisions to come
to a conclusion (Saks et al. 2003, Dror and Charlton 2006, Dror et al. 2006, Dror and Cole
2010), as emotional and contextual biases are shown to have influences in such decisions
(Hodge 1988, Hall and Player 2008, Dror et al. 2011, Lange et al. 2011). Further research into
understanding human cognition was suggested to reduce cognitive bias (Dror 2009, Dror et al.
2011). Random auditing with a penalty for blind proficiency tests in an experimental setup
demonstrated it can significantly reduce the error rates (Cowan and Koppl 2011). Another
21
approach is to automate identification using objective criteria (e.g., Blackwell and Framan
1980, Alexandre 1996, Banno 2004, Banno et al. 2004, 2005). However, the human eye and
brain combination in recognising selecting, inputting, analysing, comparing, and interpreting
patterns is highly complex and is yet to be surpassed by computers (Dailey 2005, Kevin Zhou
et al. 2009). This can be evident in CAPTCHAs (Completely Automated Public Turing test to
tell Computers and Humans Apart), commonly used in security systems, and as a supplement
to computerised character recognition system for recognising characters that computers have
given up (von Ahn et al. 2003, Chew and Baird 2003, von Ahn et al. 2008). Ongoing studies
in human cognition, machine learning and pattern recognition demonstrate that ‗objective‘
machines are yet to fully take over what the ‗subjective‘ human eye and brain are
accomplishing (e.g., Fageth et al. 1996, Dailey and Cottrell 1999, Lewin and Herlitz 2002,
Hayward et al. 2008, Hoffman and Logothetis 2009, Deng et al. 2010, Woolley et al. 2010).
1.2.2 Forensic odontology
Because teeth have a low biological turnover rate and undergo mineralization which render
them the strongest structure in the human body, they contain more physically and biologically
stable information about the individual than any other biological structure apart from DNA
(Whittaker 1995). The discipline of forensic odontology or forensic dentistry deals with
mainly two aspects of identification from dental features, i.e., body identification by antemortem and post-mortem comparison of dental records, and bitemark analysis by comparing
bitemarks and suspect dentition (ABFO 1997, Glass 2005).
1.2.2.1
Dental variation
Variation in dental features can result from any of the biological (inherited) and
environmental (acquired) factors during the formation and use of teeth (Bowers and Bell
1997). Most mammals are diphyodont, i.e., have deciduous and permanent teeth during its
22
lifetime which changes with age (Bishara et al. 1989, Bishara et al. 1995, Harari et al. 2005).
Most mammals are also heterodont, i.e., they possess different functional types of teeth,
mostly in the forms of incisors, canines, premolars, and molars, which differs by location in
the jaw. Each tooth type is morphologically different from others by size, shape and root
numbers.
Compared to the taxon‘s standard number of teeth, e.g., 32 in Homo sapiens, the number may
be excessive (hyperdontia) or lacking (hypodontia) (Kindelan et al. 1998). Individual tooth
size, dental arch dimension, tooth location and arrangement, relative tooth position in the
dental arch or with neighbouring teeth, and tooth orientation e.g. rotation in relation to
‗normal‘ dental arch orientation, may vary in different degrees due to the individual‘s normal
and pathological history. Intraspecific dental variations in primate populations, including man,
have been studied extensively by Kieser and Groeneveld (e.g., 1987a, b, 1988a, b, 1989a, b).
One of the prominent variations that may occur with the use of teeth is surface wear (e.g.,
Western et al. 1983, Kieser et al. 1985, Xiaohu et al. 1992, Solheim 1993, Zheng et al. 2003,
Chattah and Smith 2006, Zheng and Zhou 2006, Yun et al. 2007). Tooth wear can be part of a
normal process (attrition) or can be the result of pathological or traumatic condition (erosion,
abrasion, fracture), either which can add to the variability of individual dental pattern
(Litonjua et al. 2003). For example, occlusion abnormalities including overbite (overshot) and
undershot are known to be associated with abnormal wear (Casanova-Rosado et al. 2005,
Janson et al. 2010, Oltramari-Navarro et al. 2010).
23
Where the degree of tooth wear with time is generally uniform across a population, its extent
can be associated with an estimated age class (e.g., Kim et al. 2000, González-Colmenares et
al. 2007). Age estimation from tooth wear can be further combined with tooth development,
i.e., eruption and calcification (Bowers 1997, Franklin 2010). Association of tooth
development and wear with age has also been a widely used method in wildlife age estimation
(e.g., Laws 1966, Schroeder and Robb 2005).
Another important source of dental variation is particularly anthropogenic, which
encompasses all forms of artificial manipulation to the dental components and structures
including restorations, crowns, bridges and implants (e.g., ABFO 1997, Bowers and Bell
1997, Glass 2002). On the other hand, orthodontics, by definition, mainly contribute to
lessening dental variation of individuals to bring it closer to the perceived population
‗standard‘, although its procedures, such as application of braces or surgical re-construction,
can provide individual variation to the overall picture.
Given that the abovementioned variations can occur singularly or in combination in an
individual, such dental feature(s) can assist in determining the identity of the individual‘s
dental pattern. Studies on genetically identical monozygotic twins confirm that they do not
necessarily possess the same dental features (Sognnaes et al. 1982, Kindelan et al. 1998).
Adams (2003) examined the civilian and military dental databases of the United States, and
found that from the combination of dental variations as outlined above, a very high degree of
diversity was found, comparable to the level known in mtDNA, making it an ―excellent
source for forensic identification.‖.
24
The subjective nature of visual dental comparison in establishing identity can result in
examiner disagreement (Pretty et al. 2003) or misidentification (Kieser et al. 2001), where
proper training of the observer is essential. Computer assisted identification can be a valuable
tool in confirming an identification or narrowing down possible candidate identities (e.g.,
Dailey 1997).
Apart from traditional morphological analysis to compare and match dental characteristics,
teeth are increasingly being recognised as a valuable source of genetic material useful for
individual identification. This is particularly important when other body parts have been
destroyed, as teeth are one of the hardest structures of the human body which can withstand
adverse conditions, e.g., extreme heat and decomposition. Viable DNA can be extracted from
the tooth root and pulp to make a positive identification in cases where most other methods
are impossible, e.g., in mass disaster victims (Manjunath et al. 2011).
1.2.2.2
Individual identification from bitemarks
A bitemark can be defined as a pattern manifested as physical and/or biological response,
including damage, to the forceful contact of dental structures on a substrate, e.g., skin, food,
or any other substance softer than teeth (Bernstein 2005, Kieser et al. 2005). Provided the
patterned mark retains a reasonable degree of detail, it can make available a near-identical
imprint of physical characteristics of an individual‘s tooth pattern and teeth positioning.
Bitemark analysis procedure uses the dental imprints in a combination of metric analysis and
pattern association that link the marks to the suspects‘ dental models from observable features
(Sweet 1997). Bitemarks subject to analysis and comparison are not restricted to human
sourced marks, and may involve those made by non-human animals (Kieser et al. 2005,
Souviron 2005, Tonn et al. 2005, Kannikeswaran and Kamat 2009).
25
According to the ABFO bitemark analysis scoring guidelines, features including (1) gross
characteristics, e.g., presence / absence of individual teeth; (2) tooth position, e.g. alignment
and rotation; and (3) intradental features, e.g., fractures, are scored to evaluate its match
(ABFO 1997). Dailey (2005) outlined the comparison procedure using currently available
methods noting that there currently exists no single all-encompassing method to identify
individuals from bitemarks, and that forensic odontologists use two methods as a standard in
the comparison process.
Rawson et al. (1984) statistically demonstrated that human anterior dental arrangements are
uniquely individual from a general sample of bitemarks on wax wafers (n = 1200). Though
the study‘s weakness lies in the assumption that each individual tooth variation is independent
of each other (MacFarlane et al. 1974, Pretty and Sweet 2001a), the authors correctly
recognised that dental uniqueness does not directly translate to bitemark uniqueness. Bernitz
et al. (2006) also used bitemarks on wax wafers for a metric analysis method of anterior tooth
rotation, tested in a limited sample population of 300 volunteers, and concluded that a
population frequency database can be built by this method. Kieser et al. (2007) likewise
demonstrated the uniqueness in human anterior dentition from a geometric morphometric
analysis of two-dimensionally scanned dental casts, while also cautioning that such
uniqueness would not necessarily transfer as bitemarks.
The degree of detailed dental characteristics that can be accurately transferred and retained
largely varies with the bitten substrate. Bitemarks on foodstuff generally provide a good
representation of the biter‘s dental features if the perishable food is recovered before
desiccation or disintegration, and an impression cast made to retain its features (Stoddart
26
1973). Identification of bitemarks was possible from cheese (Layton 1966, Solheim and
Leidal 1975, Webster and MacDonald 1979, Webster 1982, Aksu and Gobetti 1996, Bernitz
and Kloppers 2002), sandwich (Simon et al. 1974), cakes (Aboshi et al. 1994), and chocolate
(McKenna et al. 2000). Non-animate, non-food substances such as soap (Corbett and Spence
1984) and wax (Whittaker et al. 1975) are known to produce a high-quality replica of the
dental characteristics, where the latter is commonly used to produce golden standard sample
bites (exemplars) (Sweet 1997, Sweet and Bowers 1998, Dailey 2005, Johnson 2005, Bernitz
et al. 2006).
Contrastingly, bitemarks on elastic substances, such as skin, pose an entirely different issue.
Pertaining to the difficulty in analysing bitemarks on human skin, Taylor (1963) predicted
that bitemarks on skin may be ―..unlikely to establish convincing proof in most cases.‖ Ström
(1963) recognised the various sources of possible distortion in analysing bitemarks on human
skin compared to those on foodstuff, and commented that it would be easier to establish a
non-match with an apparent inconsistency between the dentition and bitemark than finding
consistent characteristics and decide on a ‗positive match‘. DeVore (1971) demonstrated the
possible extent of human skin distortion that can occur when the body position is changed,
and strongly cautioned against a careless application of the transparency overlay method if
done with disregard to such possible distortion. By comparing bitemarks on ―good recording
properties‖ e.g., wax, and those on porcine skin, Whittaker et al. (Whittaker et al. 1975) found
that identification accuracy significantly differed between the bitten substance, with wax
reaching 99% if good impressions or photographs can be obtained, and skin marks falling as
low as 9% if photographs were taken after a time lapse from the actual bite. They also found
that variability between observers were greatest in skin bitemarks, suggesting that a more
subjective assessment criteria had to be applied.
27
While most studies took a cautionary approach in interpreting distorted bitemarks, Harvey et
al (1976) concluded that identification from distorted bitemark images is possible — provided
that unique characteristics are transferred as high-quality evidence. They illustrated ―[t]he
importance of characteristics which can be clearly recognized throughout changes of posture‖
where ―[c]haracteristics are clearly identifiable in spite of distortion from surface spread,
flexion or rotation.‖ Such strong claim without scientifically sound evidence may not be
readily acceptable in the current legal climate of admitting only scientifically proven forensic
methods (NAS 2009).
Computer generated digital overlays from dentition models by using commercially available
image processing software made possible the objective production of the acetate overlay to
compare with the bitemarks (Naru and Dykes 1996, Pretty and Sweet 2001b, Martin-de las
Heras et al. 2007). Mathematical comparison of random pairs of computer-generated overlays
from experimental bitemarks and stone casts of volunteers concluded that the ―2D polyline‖
and ―painting‖ methods were applicable and reliable although the latter required visual
assessment of the data (Al-Talabani et al. 2006). Naru and Dykes (1997) attempted
computerised comparison from cross-correlation scores, where the conclusion was conditional
that ―[the] method may have value when applied to certain mark types‖.
Assessment of bitemark identification performances by examiners with different levels of
training and experience showed that the effect of training was important on the examiners‘
performance (Whittaker et al. 1997). Where the difference between examiners are large
enough to reach different conclusions from the same evidence material, bitemark examiner
disagreement may occur (Bowers and Pretty 2009).
28
Although rectification of photographic distortion of two-dimensional bitemark images were
studied (e.g., Rawson et al. 1986, Bowers and Johansen 2002), rectification of bitemark
distortion caused by the dermal elasticity as an intrinsic biological characteristic has been
limited. Harvey et al. (1976) suggested that pre-existing tension lines, i.e., Langer‘s lines, in
human skin can be one of the factors that determine skin distortion, but did not propose a
rectification method. Bush et al. (2010a) commented that skin distortion concerns variables in
skin too complex to allow for predicting a single distortion factor, while affine
transformations of distorted bitemarks (Stols and Bernitz 2010), are some examples of recent
attempts to objectively rectify bitemark distortion.
Recognition of limitations in two-dimensional analysis from the fact that bitemarks are threedimensional, combined with the advancement in 3D data capture technology brought forth
studies that capture and analyse bitemarks in 3D (Thali et al. 2003, Blackwell et al. 2007,
Lasser et al. 2009, Martin-de las Heras and Tafur 2009).
Whereas forensic bitemark analysis historically involved examining the physical pattern of
the bitemark and the biter‘s dentition, recent advances in molecular biology techniques made
possible the collection of genetic material from bitemarks, including saliva (Sweet and
Hildebrand 1999, Sweet and Shutler 1999, da Silva et al. 2006, Kenna et al. 2011) and
bacterial flora from saliva (Borgula et al. 2003, Rahimi et al. 2005, Tompkins 2005, Kennedy
2011), that are of evidential value to identify the biter.
29
1.2.2.3
NAS report and forensic odontology
The recent NAS report (2009) recognised that lack of scientifically established proof in (1)
the uniqueness of human dentition; (2) the ability of the dentition to transfer a unique pattern
to human skin and the ability of skin to retain that uniqueness; and (3) the standard of type,
quality and number of individual characteristics to reach evidentiary value threshold; are
some of the basic problems inherent in bitemark analysis and interpretation. While the report
has been an impetus in a number of legal reviews (e.g., Garrett and Neufeld 2009, Neufeld
and Scheck 2010), the scientific community has been aware of such issues and has been
continuously attempting to address them (Pretty 2005a).
Reliability issues in analysing bitemarks on skin were recognised from early stages of the
method, and warnings were repeated in subsequent studies (e.g., DeVore 1971, Whittaker et
al. 1975, Pretty and Turnbull 2001, Pretty 2005b, Saks and Koehler 2005, Bowers 2006,
2008). The complicated process in the creation and retention of bitemarks on elastic, threedimensional skin, where its manifest on a living victim is further subject to changing
dynamics of vital response to the injured tissue, and the limitations in current methods to
capture, record, analyse, compare and evaluate the marks, are among the issues that bitemark
identification experts and researchers acknowledge (Bernstein 2005). Positive elimination of a
suspect from discrepancies in dental features are far more easier and reliable than to assess a
case where matching features are present (Ström 1963). ABFO terminology guidelines (1997)
specifically recognises ―that a statement of absolute certainty such as "indeed, without a
doubt", is unprovable and reckless‖ in declaring a match. Pretty and Turnbull (2001) reported
a case where the dental features in a bitemark did not sufficiently represent the dental
uniqueness between two suspects, demonstrating that dental uniqueness does not
automatically translate to bitemark uniqueness. Miller et al. (Miller et al. 2009) also
demonstrated that individuals with similarly aligned dentitions were difficult to distinguish
30
the individual biter from bitemarks, with some cases where known non-matches appeared
better correlated to the bite. Ante-mortem and post-mortem bites were simulated on porcine
skin to evaluate the error rates by examiners with different levels of bitemark analysis
experiences (Avon et al. 2010).
A series of studies by Bush and colleagues (Bush et al. 2010b, Bush et al. 2011a, b)
demonstrated the difficulty in reproducing similar bitemarks on human skin even when the
dentition was the same, and concluded that ―statements of dental uniqueness with respect to
bitemark analysis in an open population are unsupportable.‖.
While uniqueness was generally accepted as an essential premise in establishing individuality,
some recent forensic scholars are questioning the dogma. Interestingly, a law review paper
criticised the notion of individualisation as non-existing (Saks and Koehler 2008), while Page
et al. (2011) countered by not only accepting that reaching definite proof of uniqueness is
considered impossible by modern scientific methods, but to suggest that uniqueness is not
even the essential requirement for forensic conclusions of identity. They argue that it is the
forensic expert‘s role ―to provide the trier of fact with additional probative information,
within the bounds of their expertise, that may strengthen or weaken the likelihood of guilt‖,
not to individualise or identify. Cole (2009) also applied the Bayesian model to fingerprint
identification arguing that forensic trace element disciplines ―can live without these concepts‖
of individualisation and uniqueness. The use of likelihood ratio under the Bayes‘ Theorem
was likewise demonstrated in bitemarks to assess its evidential value in court (Kittelson et al.
2002, Kieser 2005).
31
1.2.3 Firearm and toolmark examination
Firearm and toolmark examination is a forensic science discipline associated with the analysis,
comparison and evaluation of a mark to determine its source tool (Davis 1958, AFTE 1998,
Dutton 2009, Katterwe 2009, Hueske 2011). By broader definition, tools include a much
larger entity such as tyre marks and bitemarks where these are likewise interpreted as specific
cases of tools, i.e., tyres or teeth, leaving marks on the softer substance, i.e., snow or cheese.
Sweet (1997) noted the similarity of bitemark analysis with other forensic methods that
compare the characteristics of physical evidence. Firearm and toolmark analysis is one of
such approaches.
For the purposes of this study bitemarks were considered a specialised form of toolmark,
where the harder substance tool (tooth) produces a toolmark (bitemark) as a physical
deformation on the softer substance (wax) as the result of forceful contact and movement
(bite).
1.2.3.1
Toolmark variation
Toolmark features that are of the forensic examiner‘s primary interest to establish it source
are categorised into class, sub-class and individual characteristics (AFTE Training and
Standardization Committee 2001, Hueske 2011).
A class characteristic is a feature indicative of a restricted group source. It can originate from
the tool type, size, or make, which could vary widely from a hammer to hacksaw. The
toolmarks‘ features specific to the group of similar tools form the basis of class characteristics
A sub-class characteristic is an incidentally produced feature during tool manufacture
common in a subset of a class group, which can originate from the manufacturing tool, e.g.,
32
die, press-forge, press-cutting. An individual characteristic is a feature sourced from applied
or acquired surface irregularity as a result of incidental or random process during manufacture.
Individual characteristics can also originate from incidental irregularities as the result of tool
use, wear or modification. Incidental damage, normal wear and tear, intentional modification
can all leave characteristic toolmarks unique to the individual tool at that point in time.
In firearms, there are many sources of variation that constitute characteristics used in
identifying the source (Hamby and Thorpe 1999, Hueske 2011). Calibre, model and make of
the firearm are the primary sources of class characteristics that define the firearm‘s
specifications, and are results of design prior to the manufacture. Rifling marks on bullet
surfaces result from the bullet forced though the spiral grooves and lands (rifling) on the inner
surface of the barrel, collecting the rifling features as striation marks. The number and widths
of grooves/lands, the twist ratio and its direction, are class characteristics of the rifling
imprinted on the bullet surface. Depending on the manufacture process rifling marks can also
differ, i.e., cut, broach, button and swage rifling. Incidental imperfections during the
manufacturing process are the source of individual characteristics in rifling marks. When the
firearm is discharged, the force of expanding gasses not only propels the bullet forward
through the barrel, it is applied in all directions from the cartridge case internal cavity towards
the chamber wall and breech face, resulting in impression toolmarks on the cartridge case wall
and head. Class characteristics can be recognised as the firing pin/hole shape and type, while
incidental machining marks in the breech face or firing pin surface can be a source of
individual characteristics. Individual marks can be imprinted on the cartridge case by the
chamber wall as a result of any pre/post discharge processes, i.e., chambering, expansion
during firing, and extraction. Additionally in multiple-round automatic, semi-automatic and
bolt/lever action repeating firearms, components such as the extractor, ejector, and magazine
33
lips which come into contact with the cartridge case during the firing cycle can likewise be
sources of class or individual characteristics. A historic overview of methods applied and
attempted to compare class and individual characteristics is summarised in Biasotti (1989),
from visual microscopic comparisons, photography, hologram, replica, to 3D analysis.
In order to determine a match or non-match in toolmark examination, the examiner must be
satisfied that within-source variation is sufficiently smaller than between-source variation.
The criteria to conclude an identification is defined by the AFTE (1992). Biasotti (1959)
successfully made an attempt to statistically individualise the striation marks by defining a
match from by counting the number of consecutively matching striations (CMS). The AFTE
criteria and the seemingly objective CMS, however, are recognised as having an subjective
component ―even when based on specific guidelines‖ and is therefore prone to errors (Biasotti
and Murdock 1984, Miller and McLean 1998).
The recognition of such issues in the discipline has resulted in a large body of research that
have studied the individuality and repeatability of toolmarks, and efforts to develop an
objective identification criteria (e.g., Skolrood 1975, Freeman 1978, Deinet 1981, Murdock
1981, Hall 1983, Singh and Aggarwal 1984, Matty 1985, Uchiyama 1986, 1988, Biasotti
1989, Hall 1992, Uchiyama 1992, Brown and Bryant 1995, Vanderkolk 1995, Masson 1997,
Brundage 1998, De Kinder et al. 1998, Miller 2001, Grzybowski et al. 2003, Faden et al.
2007, Howitt et al. 2008, Hamby et al. 2009, Bachrach et al. 2010, Hamby 2010). The large
number of research papers illustrates that efforts to strengthen the scientific basis of the
firearm and toolmark examination discipline is up and alive, regardless of the
recommendations of the NAS report (2009)
34
1.2.3.2
Toolmark generation
The principles in toolmark generation and its identification are summarised below from Davis
(1958):
A toolmark is defined as two materials coming in forced contact with each other, particularly
where one of the two materials is harder than the other. The forced contact typically results in
physical alteration, e.g., disfiguration, of the softer material. During the contact process,
alteration could also occur on the harder material, albeit to a lesser extent. The harder of the
two materials is referred to as the tool, while the patterned disfiguration of the softer material
is referred to as the toolmark.
Depending on the direction of movement between the two materials, toolmarks can be either
an impression type, or a striation type toolmark. Firstly an impression type toolmark occurs
when the tool moves against and away from the marked object in a direction which does not
involve lateral movements of either the tool or the material. This action results in the tool‘s
physical characteristics transferred as a negative image of the characteristics onto the marked
object (Figure 1-1,(b)) A striation type toolmark occurs when lateral movement is combined
while the tool is in contact with the substance. This results in the tool‘s contact points being
continuously marked as the lateral movement progresses, thus transferring the drag marks of
the tool‘s physical characteristics onto the substance. In striation type toolmarks, the physical
characteristics of the tool which made last contact with the marked material will be resulting
in the final striation pattern after the tool has passed (Figure 1-1,(a, c)). Combinations of the
two toolmark types can occur depending on the dynamic relationship between the tool and the
marked substance while in contact (Figure 1-1). It is therefore possible that different striation
35
toolmarks can be generated from the same tool depending on the exact contact point of the
tool with the marked substance.
(a)
(c)
(b)
2
1
Striation
Impression
Striation
Tool
Material being marked
Tool movement/pressure
Point(s) of contact with tool
Toolmark
Area of contact with tool
Figure 1-1. Principles of toolmark creation.
1.3 Identification in wildlife
1.3.1 Wildlife forensics
By definition, forensics has its mandate to serve for legal purposes in the human domain.
Where wildlife management concerns enforcing legal protection of wildlife resources or
investigating a nuisance source in pest control, wildlife forensics provide information to
relevant authorities acting on the issues. Varied fields in veterinary medicine were identified
to aid in this pursuit, which included forensic pathology, gunshot and arrow wounds,
36
poisoning, and identification techniques such as species, sex, origin of tissue, hair, and carcass
part matching (Stroud and Adrian 1996, Cooper and Cooper 1998, Stroud 1998).
In contrast to human forensics, wildlife forensic examination is often complicated by (1) the
lack of species-specific definitions for evidence which frequently takes the form of body part
or product, and (2) that a dead animal may mean either a legal or illegal killing depending on
circumstances (Goddard 2011). Where cases involve only a part of the body to be traced back
to the species level, molecular techniques provide reliable identification methods (Verma and
Singh 2003). For example, illegal trade was investigated in elephant (Loxodonta africana)
tusks and rhino (Ceratotherium simum, Rhinocerus unicornis and Diceros bicornis) horn
(Bollongino et al. 2003), tiger (Panthera tigris) bone (Wetton et al. 2004), and whale meat
(Baker et al. 1996, Lukoschek et al. 2009, Baker et al. 2010).
1.3.2 Species identification
Differentiation between species forms the basis of traditional taxonomy, although it is not
always easy to identify the species from its morphological characteristics. Furthermore,
genetic investigation methods have changed the landscape of taxonomy by providing a highly
precise tool to differentiate the population, e.g., Hector dolphin (Cephalorhynchus hectori)
subspecies (Baker et al. 2002), or disputing morphological classification of lichen species
Usnea florida and U. subfloridana (Articus et al. 2002).
In field situations, species are commonly identified from its outer morphological
characteristics, such as body configuration and colour, when it is observable (Salmon 1968,
Haltenorth and Diller 1980, Robertson and Heather 1999). However, direct observation is not
37
always feasible and identification from its trace or field signs is necessary, especially when
they are rare or elusive species (e.g., Murie 1954, MacKenzie et al. 2004).
1.3.2.1
Footprints
Footprints (tracks, spoor) are one of the commonly used traces that indicate the presence of
animals, which has been used in many species including mountain lions (Puma concolor)
(Van Dyke et al. 1986, Beier and Cunningham 1996) gray wolves (Canis lupus), coyotes (C.
latrans), red foxes (Vulpes vulpes), skunks (Mephitis mephitis and Spilogale putorius),
raccoons (Procyon lotor), and bobcats (Felis rufus), (Sargeant et al. 1998). Ratz (1997)
described New Zealand small mammal species that can be identified from their inked
footprints in track tunnels (King and Edgar 1977), while computational differentiation of the
three introduced rat species, i.e., ship rat, Norway rat and Pacific rat (= kiore, Rattus exulans),
were done from their footprints (Yuan et al. 2005). Palma and Gurgel-Gonçalves (2007)
found that multivariate analysis can identify Brazilian small mammal footprints, and further
access intraspecific variation, e.g., sex and geographic, from morphometrical analyses on
footprints. In Asia, black bears (Ursus thibetanus) and sun bears (Helarctos malayanus) were
distinguished from claw mark measurements (Steinmetz and Garshelis 2008). African
elephant footprint lengths were found be significantly correlated to the individual‘s shoulder
height and was used to assess the population‘s age structure (Western et al. 1983).
1.3.2.2
Sound
Acoustic identification from audio signals unique to the animal can be used to determine the
presence of a species, particularly when visual contact is difficult. Traditionally this method
relied heavily on the observer‘s (listener‘s) experience and/or knowledge of the species‘ call
or sound. Recent incorporation of computing technology has greatly enhanced the recognition
38
capability, including the use of sound levels that are normally outside the normal human
hearing range. For example, species were correctly identified from vocal emissions by nine
frog species (Eleutherodactylus spp)and three bird species (Patagioenas squamosa, Loxigilla
portoricensis and Coereba flaveola) of Puerto Rico (Acevedo et al. 2009) and sounds made
by four British grasshopper (Orthoptera) species (Chesmore and Ohya 2004). In mammals,
bat calls from 20 species were successfully classified using multiple discriminant function
analysis, classification and regression trees, and artificial neural networks, with varied levels
of ease depending on the bat family in the study, i.e., Vespertilionidae and Rhinolophidae
(Preatoni et al. 2005). Seismic recordings of animal footfalls were also used to accurately
(~82%) differentiate between species (Wood et al. 2005).
1.3.2.3
Hair
Microscopic examination of hair morphology, e.g., configuration, medulla/cortex ratio,
cuticle, pigment granules, and ovoid bodies, can be used to identify the animal origin
including humans (Deedrick and Koch 2004). Identification of pine marten (Martes martes)
from hair traps were used to monitor its presence and abundance (Lynch et al. 2006).
1.3.2.4
Genetic material
Genetic species identification can be performed on trace material left by the animals. With the
technological advances allowing for less stringent sample material requirements, genetic
analysis is becoming a common method to identify species. Mitochondrial DNA from faecal
matter was used to identify three sympatric lagomorphs species in New England (Kovach et
al. 2003), an elusive animal visiting a zoo was found to be a leopard from its faeces (Verma et
al. 2003), the distribution of the endangered Chinese tiger (Panthera tigris amoyensis) was
confirmed from faeces (Wan et al. 2003), and differentiation between sympatric Mexican
39
gray wolves (Canis lupus baileyi) and coyotes, which can be mistaken for each other because
of their similar appearances, was demonstrated by faecal DNA analysis (Reed et al. 2004).
Saliva retrieved from domestic sheep carcasses identified coyote to be the perpetrator in 95%
of the 18 cases (Williams et al. 2003).
1.3.2.5
Bitemarks
Determination of the biting animal species from its bitemark on human skin has important
forensic implications (Souviron 2005). Intercanine widths, (Tonn et al. 2004), and
additionally the size and shape of the dental arch (Tonn et al. 2005) were studied by
comparing visual patterns and measurements from bitemark records and animal skulls.
Murmann et al. (2006) studied 486 museum specimens of 12 carnivore species to compare the
jaw shapes and bitemark patterns of the species. The study further examined simulated
bitemarks made by the skulls and developed a modified intercanine measurement method that
incorporates the variation of canine puncture wound width depending on the depth of
penetration.
In a case report, carnivore bitemarks on a human victim were identified to be from a mountain
lion, and its sex and approximate age were likewise profiled. The bitemark analysis performed
in this case was later confirmed by matching the hunted animal‘s dentition to the victim‘s
wound and detecting her DNA in the animal‘s claw (Rollins and Spencer 1995).
Bitemarks are likewise useful in palaeontology, where pathological / traumatic marks in
fossilised remains are examined to reconstruct the event and understand ecological aspects, by
identifying the extinct species from its dental configuration such as tooth type, arrangement,
40
number and size. Haynes (1983) examined biting damage to 326 femora and tibiae of 7 extant
herbivore species by 10 extant species of carnivores to apply the findings for understanding
what damage marks on fossil bones can imply. Identified species in fossil remains were used
to interpret events such as Tyrannosaurus predation on Triceratops and Edmontosaurus
(Erickson and Olson 1996), mosasaur predation on nautiloids, ammonoids (Tsujita and
Westermann 2001, Kauffman 2009) or another mosasaur (Everhart 2009), shark predation on
an elasmosaur (Everhart 2005) or a dolphin (Bianucci et al. 2010).
Similar to human forensic odontology, class characteristics of a bitemark can assist in
determining the origin species responsible for the bite. Bitemarks left in prey animal and plant
species, are useful to assess the biology, ecology and behaviour of the biter, which provide
important information to make management decisions. Murie (1954) included bitemarks as
part of field signs to identify North American animals, and provided tooth-mark width
measurements to identify selected species. Ratz et al. (1999) found from necropsies of 56
New Zealand birds that 4 yellow-eyed penguin (Megadyptes antipodes) chicks, 3 royal
albatross (Diomedea epomophora) chicks and one little penguin (Eudyptula minor) adult had
predator tooth puncture holes on their skin or bills. They determined the likelihood of stoats,
ferrets (Mustela furo), and cats (Felis catus) being the biter by comparing the measured
bitemark intercanine distances to intercanine distance distribution in a sample pool of
museum specimens. Lyver (2000) similarly overlaid distances between bitemark puncture
holes on sooty shearwater (Puffinus griseus) carcasses with intercanine distances of probable
predator species caught in southern New Zealand, and found that direct examination of
bitemarks on bone underlying the bitten soft tissue can increase statistical reliability of the
method. Examination of intercanine distances of bitemarks on Hutton‘s shearwater (Puffinus
41
huttoni) carcasses with a similar method showed that stoats were the main predator of this
species (Cuthbert 2003).
Species contamination in trace detection methods is avoided by the ability to clearly
distinguish the interference marks between species (spoor, bitemarks) (Linhart and Knowlton
1975, Conner et al. 1983, Thomas et al. 2003), or by eliminating multiple species issues by a
species specific device design with specific placement or type of bait (Bamford 1970). False
identification of the target species may severely affect the output.
The usefulness of bitemarks on bait to determine the presence of an animal depends on the
ability of the bait material to retain bitemark information to allow species identification from
the marks. Commercially available bait-interference blocks make use of this ability to enable
differentiation between species from bitemarks (e.g., WaxTag®, Census™). Bait types to
detect rodent presence from its bitemarks were found to be preferred by the biter in the order
of, chocolate, cheese, soap, wax and oiled wood (Ji et al. 1999), while the least favoured wax
and oiled wood were found the most durable in terms of bait longevity and environmental
decay.
Identification of New Zealand mammal species, i.e., rodents, possums, European hedgehogs
(Erinaceus europaeus) and rabbits (Oryctolagus cuniculus) from bitemarks is possible on
wax-block bait (Thomas 1998, Thomas et al. 1999, Thomas et al. 2002, 2003) but not on
flour-paste, apple bait, or orange quarters. The actual species differentiation, however, has
never been documented in detail, and there exists no accessible bitemark type reference
material for using wax blocks to identify the presence of possums or rats. A new type of bait42
interference multi-species detection device called the chew-track-card was recently
developed, which combines (1) a food-lured corrugated plastic board as the material to be
bitten, with (2) an ink-based footprint detection device. The combination increases the
probability to detect and identify the interfering animal from its bitemark pattern and/or
footprint (Sweetapple and Nugent 2011).
1.3.3 Individual identification
The concept of identifying individuals is applied in wildlife management to obtain population
parameters such as social behaviour (Katona et al. 1980, Moss 1983, Frank 1986, Moss 1996)
and population abundance (Allen et al. 1996, McGregor and Peake 1998, Kelly 2001, Wilson
and Delahay 2001, Lukacs and Burnham 2005, Sharma et al. 2005, Reisser et al. 2008).
Differentiation between individual animals rely on detectable variation of characteristics
within the population. Such characteristics could be: (1) outer appearance of the animals if
they are observable, e.g., size, pattern and markings; (2) biological material, e.g., faeces, hair
and saliva, if samples could be collected; or (3) traces of activity such as footprints, calls or
bitemarks.
1.3.3.1
Markings
Spot patterns in a variety of vertebrate and invertebrate species could be used (Speed et al.
2007), including whale shark (Rhincodon typus) pattern (Arzoumanian et al. 2005, Meekan et
al. 2006), cheetah (Acinonyx jubatus) spot pattern (Kelly 2001), and polar bear (Ursus
maritimus) whisker spots (Anderson et al. 2007). Palatine maculation in the European badger
(Meles meles) could be used to identify individuals although the pattern was found to be
43
influenced by parasitic infection as cubs (Nouvellet et al. 2011). Advances in computed face
detection technology demonstrated that individual lions (Panthera leo) in video recordings
could be recognised and tracked (Burghardt et al. 2004a).
Apart from naturally occurring variations, incidental scar marks or nicks, e.g., in whale sharks
(Speed et al. 2008), cetacean fin and fluke edges (Katona et al. 1980, Würsig and Jefferson
1990, Black et al. 1997, Gowans and Whitehead 2001, Auger-Méthé and Whitehead 2007),
and African elephant ears (Moss 1996) could be used to identify individual animals. When it
is necessary to identify individuals that have few distinguishable characteristics, artificial
variation could be applied by visually, chemically or electronically marking individuals, using
invasive marking methods, e.g., tagging , and ear notching, or non-invasive marking methods,
e.g., collaring and painting (Silvy et al. 2005). Although artificial marking is a useful method,
it may necessitate extra consideration to animal welfare (Beausoleil et al. 2004).
1.3.3.2
Biological material
Biological excretions such as faeces, urine and saliva frequently include epithelium cells of
the host, which could offer genetic material to analyse its individuality. Hair, shed skin and
feathers not only could morphologically determine the host species, but its associated cells
could similarly yield genetic material to identify individual animals. Genetic analysis is a
powerful tool to study the population‘s demography and genetic composition (DeYoung and
Honeycutt 2005, Waits and Paetkau 2005, De Barba et al. 2010), while individualisation
offers information commonly used for population abundance estimation studies such as in
martens (Mowat and Paetkau 2002) and black bears (Boersen et al. 2003).
44
1.3.3.3
Traces and signs
When direct observation of the animal or collection of biological material is not feasible,
variations in traces or signs of the animal‘s activity could be used to identify individuals. For
example, footprints of mountain lions (Smallwood and Fitzhugh 1993, Grigione et al. 1999,
Lewison et al. 2001), tigers (Panthera tigris) (Sharma et al. 2005), black rhinoceros (D.
bicornis) (Jewell et al. 2001), and fishers (Herzog et al. 2007) were used to identify
individuals. Variation between individual acoustic characteristics from monkeys (Ceugniet
and Izumi 2004) bats (Siemers and Kerth 2006), and birds (Cheng et al. 2010) also allow
identification.
1.3.3.4
Bitemarks
Variation in dentition patterns could also yield information useful to identify individuals
among a population, as demonstrated in human forensic odontology. Individual variation in
intercanine and inter incisal distances positively identified three out of five stray dogs in a dog
attack case (Santoro et al. 2011). In wild-living individuals, considerable variation was
observed in the dentition of 350 skulls from Banks Peninsula possums (Gilmore 1966),
mostly involving the absence of vestigial upper first premolars and lower second incisors,
with only 48.6% of specimens having the typical dentition formula (3/2, 1/0, 2/1, 4/4). The
possum‘s use of teeth in feeding is described by Gilmore (1966) as food held in the anterior
teeth and torn by a sudden quick pulling of the head inward to the body. The biting action of a
possum leaves a bitemark on wax blocks distinguishable from rodents, hedgehogs and rabbits
(Thomas and Meenken 1995, Thomas et al. 1998, Thomas et al. 1999, Hunter 2004,
Kavermann 2004, Thomas et al. 2004), though no study has documented detailed dentition
patterns on the blocks. Rodents‘ gnawing behaviour leaves small multiple bitemarks scratched
on the bitten surface. Rodents‘ and lagomorphs‘ first incisors continuously grow and wear
down at the same turnover rate to ensure a sharp cutting edge at all times. Such feature may
45
possibly make the edge inconsistent over extended time spans resulting in different dentition
pattern of the same individual animal, though the degree of change or comparability is
unknown.
Positively identifying individual animals from dentition patterns imprinted on wax as
bitemarks has not been hitherto attempted. This study shall allow evaluation of multiple visit
occurrence and its effect on the bait interference technique, and has the potential to expand
into a wide range of applications in wildlife research.
For the purpose of this study, physical characteristics of bitemarks made by animals on wax
medium were classed as a specialised form of toolmarks. Enamel and dentine of the animals‘
teeth which come to contact with the wax during biting process are considerably harder than
the wax substrate, and therefore the resulting deformations in wax were interpreted as a
toolmark made by the tool, i.e., teeth.
1.4 Objectives
The abovementioned issues were identified in monitoring New Zealand mammalian pests
with the current use of bait-interference methods — WaxTags® in particular. The species
identification component of the method provided insight to forensic science approaches,
which in turn presented the possibility to identify individual animals from its bitemarks. This
research was an attempt to develop a means to investigate ecological questions with a forensic
science approach.
46
The objectives of this PhD study were to:
1. Develop a methodology using WaxTags® that allows the species identification of
possums, ship rats, and Norway rats, with definitions of the bitemark characteristics
for each of these three species (Chapter 2).
2. Develop, using laboratory and captive trial techniques, a methodology for using
WaxTags® to identify individual possums from their bitemarks (Chapter 3).
3. Undertake field trials to develop a WaxTag® methodology that allows the
identification of individual possums in the wild (Chapter 4).
4. Determine the prevalence and extent of multiple visits by possums to WaxTags®, and
the influence this has on the reliability of the WaxTag® as a monitoring tool
(Chapter 4).
5. Investigate the utility of WaxTags® to elucidate new information about the home
range, distribution, and activity patterns of individual possums (Chapter 4).
1.5 Structure of thesis
In order to fulfil the objectives, this thesis is arranged as follows: a general introduction and a
literature review (Chapter 1), the defining characteristics of bitemarks on WaxTags®
(Chapter 2), the development of a novel method to identify individual animals (Chapter 3),
the field application of the individual identification technique (Chapter 4), and finally general
discussion and conclusions (Chapter 5).
47
Chapter 2
Species Identification From Bitemarks on WaxTags®
2.1 Introduction
The bait interference method originated by Bamford (1970) was designed to infer the target
animal population abundance from the number of non-toxic bait interfered with by the study
species. In order to ensure interference by the target species, the brushtail possum, Bamford
limited accessibility to the flour-paste bait by raising and shielding the bait to exclude rats and
mice. Later development of the method used wax as the non-toxic medium to be interfered
with, where ―species-specific bite-marks‖ were identified from wax detection devices and
thus eliminating need for elaborate device design to restrict accessibility to the bait (Thomas
et al. 1999, Thomas et al. 2003). Thomas et al. (1999) noted that from bitemarks by captive
animals and from simulated bitemarks using the skulls of the animals ―marks could be easily
identified‖ when made by hedgehogs, possums, rats and rabbits. However, these studies did
not detail the bitemark characteristics that were specific to the species.
Current bait-interference method for monitoring possum abundance which uses the WaxTag®
as the detection device is standardised by a protocol published by the National Possum
Control Agencies (NPCA) — a collective of government authorities, researchers and contract
operators — (NPCA 2008a). According to the protocol species identification of the bitemark
is to be made by field operators who are trained and accredited through NPCA training
courses. The minimum identification achievement level required for a qualified operator is
stipulated in the protocol (NPCA 2008a) as follows: ―Of 40 bitten tags of known (caged
animals) origin, comprising approximately 50% possum bitten tags, the examinee may record
no more than 4 as unknown, and must identify at least 90% of the possum bitten tags
correctly, and may not identify more than one non-possum bitten tag as a possum.‖.
48
Whilst high accuracy (99%) was achieved in correctly identifying possums from simulated
bitemarks created by the skulls (Thomas et al. 2007), qualitative or quantitative criteria to
distinguish the species responsible for bitemarks is limited.
Although biological definitions of the four species can characterise its dentition‘s anatomical
arrangement, number and function, the WaxTag® method requires the species to be identified
from its resultant bitemark characteristics as the method can observe only the bitemarks, not
the animals. In contrast with static dental casts commonly used by dentists for faithful
reproduction of physical characteristics, bitemarks do not necessarily reflect all teeth
characteristics of the biter as it introduces additional variables including movement of the
teeth, movement of the bitten medium, ability of the medium to retain the mark, and
observability of the mark. Bitemarks made by captive target animal species on WaxTags®
were examined to assess and define bitemark characteristics of each target species.
The objective of this chapter was therefore:

To develop a methodology, using WaxTags®, that allows the identification of
possums, and rodents, by defining bitemark characteristics for each species.
2.2 Methods
In order to correctly observe characteristics of bitemarks made by a specific animal species,
animals of known species were exposed with WaxTags® to enable them to interfere, i.e., leave
bitemarks.
49
2.2.1 Captive animals of known species
A total of 36 brushtail possums, 17 ship rats and one Norway rat were live-trapped from
Banks Peninsula and mid-Canterbury of the South Island, New Zealand between April and
November 2005. An additional 21 mice that were live-trapped from the same areas between
October and November 2007, and 15 Norway rats (Wistar laboratory rats) obtained from a
biological supplier were also included in the study. Field specimens‘ species were identified
by its external morphological characteristics as described in King and Barrett (2005).
Animals were held in individual wire cages sized 100 × 40 × 52 cm for possums and 57 × 36
× 30 cm for rodents, with a minimum acclimatization period of two weeks. Each animal was
provided with a nesting chamber, food and water ad libitum. Maintenance feed for both
species were cereal based Opossum Pellets (Weston Animal Nutrition, 23 Southbrook Rd.
Rangiora, New Zealand). All animals were kept and handled under approved conditions by
the Lincoln University Animal Ethics Committee (Animal Welfare Act 1999).
2.2.2 Bitemark detection device: WaxTag®
The detection device used in this study was a commercially available product, the WaxTag®
(N.Z. patent 516900, Pest Control Research, Christchurch, New Zealand), designed to detect
the presence of animals that bite and leave marks on a wax block. The device consisted of a
rounded pyramid-shape 12 cc block of microcrystalline wax measuring 2 × 2.5 cm at its base
and 2.5 cm high moulded onto the acute end of a plastic isosceles triangle tag 6 cm wide and
12 cm tall (Figure 2-1).
50
6 cm
Plastic tag
Wax block
2.5 cm
12 cm
2.5 cm
2 cm
Figure 2-1. WaxTag® structure and dimensions.
Its application in New Zealand by the possum control industry is standardized the NPCA to
index the possum activity from the proportion of WaxTags® bitten per tag line each with 10 or
20 tags placed at 10m intervals in lines positioned at minimum 100m nominal distances,
retrieved after 3 or 7 days (NPCA 2005, 2008a).
The protocol requires tags to be used in the field by nailing or stapling the tag onto a tree or
log at 30 cm above the ground with the wax-block end of the tag pointing downwards. Lines
of 10 to 20 WaxTags® spaced at 10 m intervals are used as sampling units to calculate the
percentage of tags bitten.
Apart from the visual attraction by the plastic tag, additional attraction is provided by a visual
and/or gustatory lure such as a 5:1 mixture of flour and icing sugar rubbed onto the tree bark
above the tag in pre-protocol studies (e.g., Thomas et al. 2003, Thomas et al. 2004).
51
The WaxTag® operational principles are that an animal is visually attracted to the white
coloured tag (Hunter 2004, Kavermann 2004). In field application, the wax block portion of
the device collects interference data by the animal‘s biting behaviour leaving bitemarks on the
wax. From 2005, the WaxTag® producer modified the plastic tag colour from white to blaze
orange to assist in field tag relocation and recovery.
2.2.3 Presentation of WaxTags®
WaxTags® were individually marked with unique 4-digit identification codes from a random
number table to avoid recognition of the tag or animal to which it was presented, thereby
ensuring a double-blind trial upon bitemark observation. The tags were presented to each
individual cage 30 minutes before sunset and tag identification codes were recorded with
corresponding cage number and date. WaxTag® presentation to captive animals simulated
field conditions. Tags were attached vertically onto the cage wall by means of tie-down wire
through a hole opened on the wide base of the tag where it would instead be attached to trees
by a nail or staple in the field. An additional wire was tied at the base of the wax block
stabilizing the tag onto cages. WaxTags® for possums were not lured, and those for rodents
were presented with additional lure of approximately 2 ml peanut butter (half-peanut volume)
onto the wax block surface. Some individual animals were observed to start biting on the wax
immediately after presentation which necessitated checks for the first two 60-minute intervals
post-application for retrieval to avoid total stripping of the wax. Remaining tags were
collected the following morning. The process was repeated for up to five consecutive nights
from June 14, 2005 and October 6, 2005 to attempt retrieval of a minimum of three samples
bearing macroscopically observable bitemarks.
52
2.2.4 Photographic data capture
All collected WaxTags® were brought to the laboratory for further investigation. For the
purpose of measuring a sizable number of specimens in quick succession, the study took full
advantage of the recent affordability of digital photographic data collection and recording.
This non-contact process reduced the risk of damage of the original bitemarks on soft wax by
measurement apparatus, e.g., slide callipers. Additionally, Whittaker et al. (1975) noted that
tooth measurements from photographs are most accurate.
2.2.4.1
Setup
Collected specimens were observed with a stereoscopic microscope (Olympus SZX12) and
magnified images were captured with a digital camera (Olympus DP12) fitted onto the
microscope. Each specimen was observed at × 7 and × 10 magnifications for visible signs of
bitemarks, from which a minimum of one clearly demarcated bitemark was selected per bitten
tag, for taking measurements. Illumination was applied to the specimens by a cold light
source (Schott KL1500).
2.2.4.2
Measurements
In order to standardise the measurements the WaxTag® was attached onto a ball-jointed
mount allowing for universal angle adjustments. The wax block portion was set at an angle so
that the bitemark faced the microscope optic axis at 90 degrees. This was done by placing the
bitemark floor at the farthest distance to the microscope at its median ridge. The resulting
bitemark was positioned to the microscope‘s optical axis perpendicular to the tangent of the
dental arch at the median ridge formed by the inter-dental conjunction between the mesial
incisors (FDI: 11–21, 31–41) (Figure 2-2). Object illumination was supplied with a flexible
goose-neck output adjusted at approximately 45 degrees to the wax, providing a high-contrast
53
image to highlight the bite-mark delineations. WaxTag® and lighting position settings were
re-adjusted for each observation and subsequent image capture to enable a clear view of each
observed bitemark. Each tooth of the dental arch recorded on the wax was defined by the
aforementioned inter-dental ridge. Individual tooth width measurements were defined from
the optical axis of 90 degrees to the bitemark, i.e., from the biting animal‘s viewpoint (Figure
2-3).
In Figure 2-3 tooth mark width measurement scheme is illustrated for striation bitemarks by
(a) possums and (b) rodents as cross-section profiles in wax medium and corresponding
dentition creating respective marks. Observation and image capture was done by orientating
the bitemark with the optic axis perpendicular to the tangent at the median ridge
(corresponding to the median inter-incisor gap). Tooth mark width was measured from the
median ridge to the border of the distal ridge immediately distal to the median ridge, or to the
outer edge of the tooth mark when recognised as the outer edge of the median incisor, i.e. full
tooth mark width. Numbers describe FDI two-digit nomenclature of individual teeth.
54
12 11
21 22
1 cm
Median ridge
®
WaxTag
Figure 2-2. Origins of inter-dental ridges on WaxTag® bitemark made by possum upper
incisors. Numbers describe FDI nomenclature of individual teeth.
55
13
Optic axis
Optic axis
(a)
23
41
12
31
22
Edge
11
Ridge
21
Median
ridge
Median
ridge
Tangent
Tangent
Width
11
Optic axis
Optic axis
(b)
41
21
Edge
1 mm
Width
31
Edge
Median
ridge
Median
ridge
Tangent
Width
Tangent
Width
1 mm
Wax medium and surface
Possum incisor profiles: upper and lower incisors
Rodent incisor profiles: upper and lower incisors
Figure 2-3. Tooth mark width measurement scheme for striation bitemarks by (a) possums
and (b) rodents as cross-section profiles in wax medium and corresponding dentition
creating respective marks. Observation and image capture was done by orientating the
bitemark with the optic axis perpendicular to the tangent at the median ridge
(corresponding to the median inter-incisor gap). Tooth mark width was measured from
the median ridge to the border of the distal ridge immediately distal to the median ridge,
or to the outer edge of the tooth mark when recognised as the outer edge of the median
incisor, i.e. full tooth mark width. Numbers describe FDI two-digit nomenclature of
individual teeth.
56
Image acquisition and record maintenance was done by an image database and analysis
software analySIS® (Soft Imaging System GmbH, Munster, Germany). The camera was set at
auto-exposure measured at the image centre. Images were captured at a nominal × 7 optical
magnification while each bitemark image was accompanied by an identical frame with a scale
added into the field to calibrate image magnification. The captured images were entered into
the image database component of the analySIS® software at 2048 × 1536 pixel resolution
TIFF format. Bitemark widths were determined from an average of five on-screen
measurements taken from the stored images.
2.3 Results
2.3.1 Bitemark type recognition and description
Brushtail possum bitemarks typically display a continuous arc-shaped biting edge of the
combined incisors with differing tooth participation in upper and lower jaws. The upper
incisors form a near-half-circle with all 6 teeth (I1 – I3) participating to form the arc. By
contrast, the first incisors, I1, are the only teeth that constitute the half-circle arc in the lower
jaw. These incisor arrangement patterns can readily be observed as arc-shaped indentation
bitemarks, or as deep U-shaped engravements in bite-through bitemarks.
In rodents, a typical bitemark had two parallel grooves with a curved or flat-bottomed ‗w‘
shaped section with a ridge between representing the inter-incisor gap. Unlike possums, both
upper and lower rodent incisors comprise one pair each of I1 (I1) characteristically leaving
paired bitemarks.
57
1 mm
1 mm
1 cm
(a)
1 cm
(b)
1 mm
1 mm
1 cm
(c)
1 cm
(d)
Figure 2-4. Bitemark types by possums and rats observed from retrieved WaxTags® with
photograph insets of sample bitemarks: (a) possum impression bitemark, (b) rat
impression bitemark, (c) possum striation bitemark, and (d) rat striation bitemark.
58
(a) Rodent bitemark
(b) Possum bitemark
(a) Rodent upper teeth profile
(b) Possum upper teeth profile
(a) Rodent lower teeth profile
(b) Possum lower teeth profile
Figure 2-5. Schematic illustration of striation type bitemarks of (a) rodent and (b) possum
with cut-away section views to show profiles.
59
41
31
Enamel
Dentine
Pulp
Figure 2-6. Morphological characteristics of possum lower incisor impression bitemark cast
observed from dorsal view of occlusal facet of the incisal arch.
60
(a)
(b)
(c)
11
12
21
Enamel layer
22
Sharp inclination
13
Medium inclination
Moderate inclination
23
Direction of inclination
Figure 2-7. Morphological characteristics of upper incisal (occlusal) facet observed on ventral
view of incisal arch impression casts. Full-depth (a) and partial-depth (b) full arch
impression with teeth outline overlay, illustrating direction and degree of tooth facet
inclination among incisor teeth, and (c) schematic topographical illustration of upper
incisal facet with sharp, medium and moderate concave inclination, and direction of
inclination.
2.3.2 Bitemark width measurements
Width measurements were made of 511 single-tooth bitemarks made by the incisors of
possums, ship rats and Norway rats. Mean bitemark widths of single teeth of each species and
averages of each individual animal are summarised in Table 2-1.
61
Paired t-tests showed that bitemark widths differed significantly (p<0.05) between the possum
and each rodent species. Mean measurements for individuals also showed significant
differences (p<0.05) between the possum and rodents. Histograms of independently measured
bitemarks and those averaged for each individual animal demonstrate distinct differences
between possum and rodent bitemarks (Figure 2-8, Figure 2-9).
Table 2-1. Mean single-tooth mark width measurments from possums and rodents.
Tooth marks (mm)
Species
mean ± SD
T. vulpecula (combined)
2.87 ± 0.51
Upper incisors
Lower incisors
(sample size)
Individual’s mean (mm)
mean ± SD
(sample size)
(n=386)
2.88 ± 0.28
(n=30)
2.66 ± 0.40
(n=256)
2.68 ± 0.29
(n=29)
3.27 ± 0.44
(n=130)
3.34 ± 0.27
(n=25)
R. rattus
0.83 ± 0.19
(n=281)
0.84 ± 0.08
(n=11)
R. norvegicus
1.25 ± 0.25
(n=106)
1.24 ± 0.21
(n=7)
Wild
0.85 ± 0.16
(n=11)
0.85 ± [n/a]
(n=1)
Wistar (laboratory)
1.30 ± 0.22
(n=95)
1.31 ± 0.13
(n=6)
- Rattus spp (combined)
0.94 ± 0.28
(n=387)
1.00 ± 0.25
(n=18)
M. musculus
0.46 ± 0.07
(n=73)
0.45 ± 0.21
(n=3)
- Rodentia (combined)
0.87 ± 0.31
(n=460)
0.92 ± 0.30
(n=21)
62
M. musculus (0.46 ± 0.07 mm)
M. musculus (n=73)
R. rattus (n=281)
R. norvegicus (wild) (n=11)
R. norvegicus (Wistar) (n=95)
T. vulpecula - upper incisor (n=256)
T. vulpecula - lower incisor (n=130)
Normal distribution: species (mean ± SD)
Number of samples
R. rattus (0.83 ± 0.19 mm)
50
R. norvegicus (wild, 0.85 ± 0.16 mm)
R. norvegicus (Wistar, 1.30 ± 0.22 mm)
T. vulpecula - upper incisors (2.66 ± 0.40 mm)
T. vulpecula - lower incisors (3.27 ± 0.44 mm)
T. vulpecula (2.87 ± 0.51 mm)
0
0
1
2
3
Tooth width measurement (mm)
4
5
Figure 2-8. Single-tooth width measurement distribution of bitemarks by possums and rodents
Species
n = toothmarks (individuals)
n =73 (3)
M. musculus
R. rattus
n =281 (11)
R. norvegicus
n =11 (1)
(wild)
n =95 (6)
R. norvegicus
(Wistar)
n =106 (7)
R. norvegicus
(all)
n =256 (29)
T. vulpecula
(upper incisor)
n =130 (25)
T. vulpecula
(lower incisor)
n =386 (30)
T. vulpecula
(all incisors)
1
2
3
4
Tooth width measurement (mm)
Tooth width measurement (mm)
Figure 2-9. Box plot of tooth width measurements of bitemarks by possums and rodents.
63
5
2.3.2.1
Toolmark identification
Identification of toolmarks is the process of comparing and determining whether a toolmark in
question originates from a particular source. This procedure includes the matching of a
toolmark against another toolmark, or a toolmark against a tool. In order for such comparison
to be made possible, underlying precepts are two-fold: (1) observable or measurable unique
characteristics are present on tools to sufficiently differentiate one tool from another, and (2)
the unique characteristics are transferable and are reproduced on the toolmark.
The species biting WaxTags® produced a clear measureable feature of single-tooth width
which quantitatively defined the species. Class characteristics of bitemarks on WaxTags®
were described and found effective in identifying the species which interfered.
2.4 Discussion
2.4.1 Bitemark description
This Chapter demonstrated, by qualitatively describing bitemarks made by the brushtail
possum and rodent species, that it was possible to descriptively define the species from its
bitemarks. To my knowledge, this is the first study to descriptively define the species‘
bitemarks in detail, beyond what is ―obvious‖ or ―easily identified‖ as a ―V-shape‖ or ―chisel
shape‖ (e.g., Thomas et al. 1999).
Such class characteristics included the number of teeth involved in creating the bitemark, the
incisal arch shape and configuration in terms of participation ratio of each tooth to create the
semi-circular arch in the case of possums, or a more flattened arrangement in rodents.
64
2.4.2 Bitemark measurement
Width measurements of each medial incisor (FDI: 11, 21, 31, 41) were taken from bitemarks
of four species, i.e., brushtail possums, Norway rats, ship rats and mice, and its measurement
distribution was plotted in a histogram (Figure 2-8) and box plot (Figure 2-9). The results
show clearly that possum teeth measurements from bitemarks on WaxTags® were
significantly larger than any of the rodents.
2.4.3 Further study
The class characteristics of bitemarks on WaxTags® were qualitatively described and
quantified by measuring the single-tooth widths made by the species. This should allow for a
more objective verifiable identification of the species which interfered with the WaxTags®. It
should also reinforce the advantages of the WaxTag® method to provide for a technique to
monitor possum population presence and abundance as stipulated by the NPCA (2008a)
protocol.
Furthermore, investigation into subclass characteristics, e.g., sex, age-class, feeding habits or
animal‘s original habitat, that may have the potential to influence bitemark patterns, may
provide an easy and inexpensive method to detect further detailed population parameters, e.g.,
demographics, and behaviour.
By further observing the bitemarks in detail, it was assumed that individual characteristics can
be distinguished and provide a novel tool to individualise interferences in wax, which has the
potential to offer a variety of new ecological studies. This is attempted in Chapter 3.
65
Chapter 3
Identification of Individual Possums From
Bitemarks on Wax
3.1 Introduction
Following on investigation into bitemarks‘ characteristics on wax made by known species in
Chapter 2 to define and differentiate the species, this chapter investigates further detailed
characteristics of bitemarks by one of the species, the brushtail possum Trichosurus vulpecula
to develop and establish a novel method to identify individual animals.
On microscopic examination of possum bitemarks on WaxTags®, parallel scratch lines in the
direction of tooth travel were frequently observed on the bitemark floor. Such marks were
hypothesised to be caused by the biting animal‘s tooth edge scraping on the wax surface. By
observing possum dentition and considering the possum‘s biting behaviour (Gilmore 1966),
the responsible tooth type was likely assumed to be the incisors from the anterior dental arch.
As the edges of possums teeth did not appear to be identical, most possibly because of natural
or pathological wear, the features created as incidental (random) features seemed analogous to
individual characteristics in firearms and toolmark examination (AFTE Training and
Standardization Committee 2001). If the observed incidental imperfections on the incisors
were transferred to the wax in the form of striation toolmarks, it may offer means to identify
individual animals. Unlike human forensics, there is no need or possibility at this point to
identify the very individual animal who bit the wax because operational data that can be
collected from WaxTags® are limited to bitemarks, not the animals. However, if it was
possible to determine whether the same individual animal bit more than one tag, or whether
more than one individual bit a single tag, the most confounding issue in the bait interference
66
method may be addressed, i.e., two bitten tags do not necessarily mean two possums
(Bearman 2002). The core hypothesis to be tested in this chapter was whether bitemarks on
WaxTags® can be used to identify individual possums. As the bitemark on the wax medium is
essentially a toolmark created by the harder material (tooth) on the softer substance (wax),
and the marks were of the striation type, where the biting process made the teeth move in a
lateral direction while being pressed on the wax portion, a forensic toolmark identification
approach to match striation type toolmarks was attempted (Hueske 2011).
By establishing an identification method from bitemarks on WaxTags®, the first attempt made
for any animal species, it provides the potential means to study the multiple visit (contagion)
issue and strengthen the NPCA protocol (2008b). Furthermore, it can be used in a vast range
of research approaches to address biological, ecological, and epidemiological questions, e.g.,
behaviour and population abundance, where identifying the individual animal is necessary.
This may be particularly important for New Zealand possums as they are known to carry and
transmit bovine tuberculosis to livestock, necessitating to control its population density to a
level low enough to prevent transmission: such low density population is extremely difficult
to monitor. Obtaining presence/absence and location information of sparsely distributed
individual animals with an identification tool therefore has the potential to greatly enhance the
ability to monitor and control very small numbers of individual possums.
The objective of this chapter was therefore:

To develop, using laboratory and captive trial techniques, a methodology for using
WaxTags® to identify individual possums from their bitemarks.
67
3.2 Methods
In order to develop and verify a new method to identify individual animals from its bitemarks,
a three-stage process was designed. The first stage was to test the hypothesis that individual
characteristics that occur from animal teeth scraping on wax, and therefore leaving striation
type marks, can be used to identify individual animals. This was done by simulating
bitemarks on wax by scraping possum teeth from skulls, on wax surfaces, and investigating its
utility to identify the animal that produced the mark. Simulated bitemark samples were
compared to other samples of known individuals and classified to each individual.
The second stage involved a blind test of unknown combinations of individual possum skulls
to create simulated bitemarks. This was achieved by asking volunteers to produce simulated
bitemarks from possum skulls of their choice.
The third stage further developed the identification method so as to be applicable to live
samples done by known captive animals. This was further blind-tested from random samples
of bitemarks.
3.2.1 Simulated bitemarks from known individual’s dentition
Simulated bitemarks made in wax from skulls of known individual possums were used to
determine if microscopic examination of bitemarks could identify and differentiate individual
animals.
68
3.2.1.1
Individual animals
Individual possum carcasses were obtained from Landcare Research Limited — Manaaki
Whenua (PO Box 69 Lincoln, New Zealand, hereinafter Landcare). The animals were livecaptured from Canterbury Region, undergone acclimatisation and later used for reproductive
studies in captivity. Ten male and ten female post-experiment carcasses minus its
reproductive organs were frozen (-18°C) at Landcare and donated to this study May to June
2005.
All animals were labelled and kept frozen in Lincoln University freeze storage, until one to
two individuals each day were taken out to thaw overnight at room temperature. Heads were
separated from the body at the atlanto-occipital joint. Skin and soft tissue were removed as
much as possible but carefully enough not to damage the animal‘s teeth with the dissecting
instruments and its remaining body was discarded. Each individual was processed separately
and its head was refrigerated in individually labelled containers.
Each of the 20 individuals‘ heads were placed in separate compartments of fine-meshed nylon
net (recycled women‘s panty-hose) together with a waterproof paper label. Individually
contained heads with its mandibles were soaked in warm water (approximately 30°C) for one
hour, brought to boil and allowed to simmer for three hours before cooling at room
temperature. Individual mesh-net compartments were opened, its contents sieved, and
remaining soft tissue was removed from the bones and teeth using running water, brush,
spatula, needle, and syringe. Each individual was processed separately to avoid mixture of
body parts, i.e. cranium, mandible and teeth. Three days of air-drying at room temperature
was followed by 24 hours drying in a 40°C incubator.
69
All teeth of each individual were identified by its morphological characteristics and confirmed
by its fit into its respective tooth socket. Teeth were re-inserted into each socket, and
cemented by hot-melt adhesive (hot-glue). Mandible halves were aligned by temporarily
articulating the temporomandibular joint using putty-like adhesive, e.g. Blu-Tack®, at
maximum intercuspation, and later joined by hot-glue at the mandibular symphysis. The reconstructed cranium and mandible of each individual were labelled with unique four-digit
identification codes from a random number table, and recorded on a reference table to later
refer to its individuality and origin.
3.2.1.2
Wax medium
The wax medium on which bitemarks were to be simulated was prepared in 10 × 30 × 40 mm
block forms from microcrystalline wax, identical to that used for WaxTags®. Each blank
block were given a unique four-digit identification code, and labelled with a paper strip
melted into one long side of the block close to a corner. The label position was kept constant
to later assist in orientating the block and bite simulation directionality.
3.2.1.3
Bitemark simulation
The cranium was applied by hand to the wax block resting on a bench set at an approximately
45° angle, then pulled backwards while directing downward pressure to simulate the possum
biting a WaxTag® (Figure 3-1a). The degree of applied pressure was guided by the width of
resulting bitemark produced. In order to obtain a sufficient strip of teeth included in the
bitemark, the incisal edges of a minimum number of four teeth from the centre (I1 to I2 FDI:
12, 11, 21, 22) were to be in contact with the wax surface. This procedure ensured that the full
widths of I1 (FDI: 11, 21) made contact and their bitemarks were constantly produced. The
process was repeated until five simulated bitemarks were made for each individual cranium.
70
Cranium movement
(a)
Possum cranium
Bite direction
Wax block
(working surface)
Block number label
θ = 45°
(b)
1 cm
(c)
3 cm
000
Azimuth
090
Start
Working surface
270
4 cm
180
Bite direction
End
Block number label
Figure 3-1. Bitemark simulation setup: (a) wax block setup on stand in relation to possum
cranium and its movement to simulate bite; (b) simulation process with teeth scraping on
wax surface; (c) wax block dimensions and block number label position in relation to
simulated bitemark, with azimuth designations in relation to bite direction where bite
started at azimuth 000 and ended at azimuth 180.
71
Additionally, 10 volunteers were each asked to prepare six simulated bitemarks from skulls of
their choice. The volunteer‘s choice could be anything between one bitemark from each of six
individuals, to six bitemarks of one individual. Visual demonstrations and oral guidance of the
procedures were provided to the volunteer, although no instructions were given except the
total number of required simulations. The bitemark set produced by volunteers had added
variability to the number of individuals as well as the simulated biting process, with the
intention to emulate more closely the reality of factors influencing the bitemarks by actual
possums.
All wax block and cranium identification numbers were recorded to reference the matching
individuals after blind observation trials. A total of 160 bitemarks were produced, i.e., 100 by
all 20 possums, and 60 made by a masked number of individuals.
3.2.1.4
Observation
Stereomicroscopic observations were performed on the bitemarks and images were recorded
by digital camera (Konica-Minolta DiMAGE X31, 4.7–14.1 mm focal length, 320M pixel
capability, JPEG 2048 × 1536 pixel image quality). Image captures were made on an
adjustable platform where the wax block surface distance to the camera lens was adjusted to
4.5 cm to fix its magnification in macro mode (Figure 3-2). Each bitemark image frame was
accompanied with an identical frame including a scale to confirm its magnification size.
Frame numbers were recorded with the wax block identification numbers.
72
Camera
(a)
(b)
Light
source
Wax block with bitemark
Stereo
microscope
Light source
Specimen:
silicone cast
(c)
Figure 3-2. Possum bitemark microscopic characteristics observation setup. (a, b) simulated
bitemark photograph capture setup with digital camera, illumination and wax block with
bitemark; (c) bitemark cast observation setup with stereo microscope, illumination and
silicone cast of bitemark.
Illumination azimuths of 0, 90, 180 and 270 degrees in relation to the simulated bitemarks‘
start–end direction were trialled in various attack angles to the wax block surface, to explore
73
optimum data capture conditions (Figure 3-1). Aforementioned capture of digital images was
done according to each azimuth, resulting in a set of 400 known individual files, each
accompanied with a scale frame. Volunteer-produced bitemarks of masked individuals were
captured as 240 files each accompanied with a scale frame. The 640 captured image files were
further re-assigned 4-digit random-number filename to mask the image‘s origin during
observation trials, and the accompanied scale files were given a suffix ‖-scale‖ to the
corresponding image to allow for magnification standardisation, totalling to 1280 image files.
After image magnification adjustments were made to compensate for the camera‘s auto-focus
function, a 200 × 800 pixel portion of each bitemark image was cropped with the 400 pixel
image centre aligned to the wax ridge that corresponds to the medial inter-tooth gap between
I1 (FDI: 11, 21) to standardise bitemark images for side-to-side comparison (Figure 3-3).
74
Figure 3-3. Image cropping to 200 × 800 pixels.
Cropped images were digitally enhanced with algorithms built in image processing software
(Corel® PHOTO-PAINT versions 9 & 12) in order to develop an effect that allowed rapid and
accurate visual comparison of features for matching individuals. Enhanced images were
compared against each other to assess the accuracy of the matching method (Figure 3-5).
3.2.1.5
Comparison schedule
Cropped and enhanced bitemark images were grouped according to illumination azimuth and
each group was compared independently. For each azimuth group, the first stage comparison
involved randomly selecting a reference image from the five images of each individual
possum, obtaining a reference group of 20 images. The remaining 80 images were pooled as a
comparison group. All 80 images were visually compared side-to-side to the 20 reference
75
images and decided whether a match was recognised from the image characteristics (Figure
3-5). Only positive identification was recorded as a match, and the number of comparison
images matching any reference image was masked during the trial to blind the number that ―is
supposed to match‖ a particular reference. The theoretical number of comparisons made in
this trial is 20 × 80 = 1600 comparisons. This matching process was repeated 10 times for
each of the four azimuths, giving a total number of comparisons of 56,000.
3.2.2 Blind comparison of simulated bitemarks
The second stage of developing the comparison method involved comparing randomly
selected bitemark images to further simulate field conditions where no ‗reference‘ possum
exists to compare other bitemarks with.
At this stage it was found that observing silicone convex casts of concave bitemarks gave
more flexibility in observing and digitally capturing bitemark characteristics for comparison.
3.2.2.1
Cast preparation and observation
Trials at this stage revealed that lighting inside a concave surface at an acute angle to enhance
microscopic characteristics posed a significant challenge, especially as the clear or whitish
colour of wax gave limited diffuse reflection to recognise the surface topography. Convex
casts of the bitemarks were made from an elastic silicone polymer impression material, vinyl
polysiloxane, or polyvinyl siloxane, commonly used in dental and forensic applications
(Morgano et al. 1995, Du Pasquier et al. 1996, Sweet 1997, Wolff et al. 1998). The product
used in this study was Forensic Sil (Armor Forensics, Jacksonville, Florida, USA) due to its
neutral gray colour which creates higher tonal contrast in black-and-white images, and ease of
76
application by a self-mixing applicator. A sample image of bitemark cast production is
illustrated in Figure 3-4.
WaxTag
WaxTag
21 11
11 21
R
L
L
41 31
Silicone polymer
R
31 41
Bitemark cast
(b)
(a)
)
Figure 3-4. Silicone cast preparation on bitemark: (a) silicone polymer application onto the
bitemark and (b) bitemark cast removal after polymer curing. The mirror reversal of left
(L) and right (R) between actual bitemark and cast is demonstrated.
Observation and image capture of casts was done under a stereo microscope fitted with a
× 0.7–4.0 zoom objective lens and × 10 ocular lenses and using an elongate light source from
a fluorescent tube, and from a fixed azimuth of 90 degrees in relation to the bitemark start-toend direction. Micrographic images of the casts were captured on an Olympus DM12 digital
camera fitted to an Olympus stereoscope SZX12 at × 16 objective zoom and × 10 ocular
lenses.
77
Captured image files followed the convention of assigning 4-digit random-number
identification codes to mask its origin. After the initial trial using direct capture images of
bitemarks, it was found that image cropping was not necessary as long as the median interdental gap was recognisable to serve as a reference point in aligning the compared images
against each other. Direct side-to-side comparison of image files were done to determine the
feasibility of using casts to identify individual possums from the observed characteristics.
3.2.3 Bitemarks from captive known individual possums
The third stage used live possums to bite on WaxTags® to simulate field conditions. Thirtysix captive possums in individual cages were exposed nightly to WaxTags®, the bitten tags
collected, and the bitemarks were compared from direct images of the bitemarks, and silicone
polymer casts. This section determines whether actual bitemarks made by live animals on
WaxTags® can be used to identify individuals.
3.2.3.1
Individual animals, WaxTag® presentation and bitemark observation
The same source of 36 captive brushtail possums used in species identification (Chapter 2)
was used to collect 107 bitten WaxTags®. All 107 tags were examined for bitemarks and
silicone polymer casts were made for all bitten surfaces. Each individual was caged
independently and therefore it was possible to attribute the bitemark to the biting individual
animal.
3.2.4 Repeatability and performance
An unsupervised trial by a novice observer was made with an open-method approach. The
observer was instructed to classify 100 simulated bitemark images from 20 individual possum
78
skulls using an image enhancement algorithm of choice to the observer as most suited for the
purpose.
Supervised trials were made by two novice observers. Each received a minimum of one day in
training the matching procedure, which continued up to a time when the observer was
confident to start the comparison trial. The first stage comparison with simulated bitemarks
was repeated by the observers and compared to the results to evaluate the repeatability of the
method.
The performance evaluation and inter-observer comparison of results were done using
specific performance measures, i.e., accuracy, precision, specificity and sensitivity. Each
measure was derived from counts of true positives, false positives, true negatives and false
negatives scored by the observer as shown in Table 3-1.
Table 3-1. Confusion matrix to evaluate identification performance.
Actual value
Match
Observed value
Non-Match
Total
Match
True positive
(TP)
False negative
(FN)
Actual matches
Non-match
False positive
(FP)
True negative
(TN)
Actual
non-matches
Total
Observed
matches
Observed
non-matches
Where: true positive (TP) is equivalent with ―hit‖; true negative (TN) is equivalent with
―correct rejection‖; false positive (FP) is equivalent with ―false alarm‖ or ―Type I error‖; and
false negative (FN) is equivalent with ―miss‖ or ―Type II error‖.
79
Calculations to derive performance measures are described in the following equations (3.1) to
(3.4). Additionally, single-measure statistics, i.e., g-mean, Matthews correlation coefficient,
F-measure and Youden's index, were calculated to evaluate the performance quality of
identifications according to equations (3.5) to (3.8).
(3.1) Accuracy
Accuracy, or correctness, is the proportion of correct observations among all observations:
Accuracy 
TP  TN
TP  FN  FP  TN
(3.1)
(3.2) Precision
Precision, equivalent to the positive predictive value, is the proportion of correct positive
identifications (TP) with all observed positive identifications, i.e., the correctness of positive
identifications:
Precision 
TP
TP  FP
(3.2)
(3.3) Sensitivity
Sensitivity, also known as the true positive rate, hit rate or recall, is the proportion of correct
positive identifications (TP) against the actual positive matches:
Sensitivit y 
TP
TP  FN
(3.3)
(3.4) Specificity
Specificity, or true negative rate, is the proportion of correct negative identifications, i.e.,
exclusions (TN), against actual negative matches:
Specificit y 
80
TN
FP  TN
(3.4)
(3.5) Geometric mean
Geometric mean (g-mean) is a single-measure statistic where the resulting value between 0
and 1 indicates poor to perfect match performance:
g  mean  Sensitivit y  Precision
(3.5)
TP
TP

TP  FN TP  FP

(3.6) Matthews correlation coefficient
The Matthews correlation coefficient (MCC) (Baldi et al. 2000), also referred to as the phi
coefficient (φ) or mean square contingency coefficient, takes into account any classification
size differences and is particularly useful when the two classes are of very different sizes. The
calculated coefficient value is between -1 and 1, with 0 as a random match performance, 1 as
a perfect match performance, and -1 as a perfect inverse match performance:
MCC 
TP  TN  FP  FN
TP  FP  TP  FN  TN  FP  TN  FN 
(3.6)
(3.7) F-measure
The F-measure (van Rijsbergen 1979), or F-score, is the harmonic mean, or the weighted
average, of precision and sensitivity, where the score value between 0 and 1 indicates worst
and best match performances, respectively:
F 


 1  TP
  1  TP   2  FN  FP


2

 
  2 1 
F1  2 
2
2
Precision  Sensitivit y
 Precision  Sensitivit y

Precision  Sensitivit y
Precision  Sensitivit y
81
(3.7)
(3.8) Youden's index
Youden's index (Youden 1950), or Youden‘s J statistic, is one of the single-measure indices
to evaluate the binary classification performance which takes into account the sensitivity and
specificity of bitemark match measures:
Youden ' s index 
TP
TN

1
TP  FN FP  TN
(3.8)

TP  TN  FN  FP
TP  FN  FP  TN 
3.3 Results
3.3.1 Bitemark features for identification
Observation of possum bitemarks under the stereomicroscope revealed fine striations on the
wax surface running parallel to the direction of tooth travel where the wax had contact with
the incisal edges including upper I1 to I3 (Figure 3-1). These striations closely resembled those
found on WaxTag® bitemarks of upper and lower incisors by possums. Ripple-like stripes of
identical profiles occurring at near-perpendicular angles to the tooth travel axis were also
present on some samples (Figure 3-5), which resembled nicks or breaks in bitemarks on the
WaxTag®. The parallel fine striations were considered to result from tooth imperfections at
the last point of contact with the wax while it slid on the substrate in biting, and left scrape
marks. Ripple-like perpendicular stripes were considered to represent uneven travel speeds of
teeth during the biting motion, such as loose teeth or uneven hand pull in the simulated
bitemarks, or uneven pull or hesitation by the possum on WaxTags®. Image enhancement
techniques were used on the cropped images to improve feature detectability and individual
matching probability.
82
3.3.2 Image capture and enhancement
Due to the low-contrast tone of the wax bearing bitemarks, various observation and image
capture settings were assessed for the enhancement of features suitable for individual
identification. The most effective illumination set-up to observe and enhance bite-mark
features was when the light source was approximately at a 45° angle from the camera‘s
optical axis, and from an azimuth of 0° or 180° to the axis of tooth travel. Illumination
settings were explored with raw light emitted from a gooseneck light source at differing
elevations and azimuths to the bitemark. A single light source enhanced the shadow-sourced
contrast. In addition to the tonal differences between the diffuse reflection of the wax and
shadows created by the light source, specular reflection from the wax highlighted areas with a
certain tilt while simultaneously placing dissimilar angled areas, e.g., scrapes, as shadows
enabling a high contrast against the striations.
Image processing tools in standard image editing software (Corel® PHOTO-PAINT versions
9 & 12) were capable of enhancing microscopic striations on captured bite-mark images to
reveal their fine details. Contrast, brightness and tone-curve adjustment options were available
to enhance the details, though fine-tuning of single and combined adjustments were difficult
to record and apply to a large number of samples as a standard filtering process. Among the
standard image adjustment tools, local equalization (Gonzalez and Woods 2002) was effective
in enhancing the bite-mark‘s characteristics (Figure 4). This filter adjusts the intensity of each
image pixel according to a histogram equalization applied locally from its surrounding
neighbourhood of n × m pixels (50 × 50 default) thereby greatly enhancing subtle tones or
intensity changes in the image.
83
3.3.3 Individual match trials
Match trials on simulated bitemarks resulted in 97.41% ± 2.07 (mean ± SD) of correct
matched pairs. Two enhanced images to be compared were aligned so that the scrape mark
striations‘ dark/light band location, width and sequence could be visually matched to judge if
the two samples came from the same individual (Figure 3-5). In some bitemarks, ripple
patterns that assisted in identification were observed, though this was unreliable because the
same individual may or may not reproduce this pattern, whereas scrape mark striations were
more consistently found in the same individual. Various observation methods were tested,
including rotation of the computer monitor by 90°, to try to reduce the strain on the observer‘s
eyes.
Microscopic characteristics on bitemark casts were sufficient to allow identification (Figure
3-6). Direct visual comparison of images was adequate to align, compare, and conclude
whether the two specimens were a match or not.
84
(a)
(b)
(c)
(d)
(e)
Figure 3-5. Sample bitemark images cropped (a, d), enhanced (b, c) and aligned (b–c). A
schematic sample generated from greyscale intensity values (e) demonstrate positive
identification possibility from a pair of unequal sized images.
85
Figure 3-6. Example of bitemark characteristics on casts used to identify individual animals.
86
3.3.4 Repeatability and performance
3.3.4.1
Uncontrolled observation
The novice observer who was instructed to classify 100 simulated bitemarks chose auto
equalisation to enhance bitemark characteristics. The trial successfully resulted in 95% correct
classification with no false positives, and 5% false negatives. Five samples were not matched
to any group and were considered equivalent to inconclusive samples. Of the 20 individuals
used to simulate bitemarks 25% (5/20) individuals were each found to have 20% (1/5) of
bitemarks that were not identifiable in this trial.
3.3.4.2
Controlled observation
Performance comparisons of controlled trials by trained observers are shown in Figure 3-7 to
Figure 3-10. The percentage correct identification, accuracy, specificity, sensitivity and
precision of the matching performances of three observers were evaluated and illustrated in
Figure 3-7 and Figure 3-8, which showed two contrastingly different results. While all
performance indicators of one of the observers (AS) did not significantly differ from the
original trial (KS), the other observer (CS) was significantly scoring lower performances in all
except specificity and accuracy. Overall performance evaluation scores calculated from the
trials, i.e., g-mean, Matthews correlation coefficient, F-measure and Youden's index are
shown in Figure 3-9, and the fluctuation of percentage correct identification with increasing
trial repeats are given in Figure 3-10. Figure 3-11 illustrates the lack of significant
performance differences between the four illumination azimuths when the images are
enhanced by local equalization.
87
Correct
identification
Positive
identification(%)
(%)
100
50
0
KS
AS
CS
Observer
Figure 3-7. Reference match trial identification performance by three observers — percent
correct identification.
88
Value
1
0.5
0
KS
AS
CS
Observer
Sensitivity
Specificity
Precision
Accuracy
Figure 3-8. Reference match trial identification performance by three observers — sensitivity,
specificity, precision and accuracy.
89
Value
1
0.5
0
KS
AS
CS
Observer
g-mean(1)
Matthews correlation coefficient
F-measure
Youden's index
Figure 3-9. Reference match trial identification performance indices by three observers —
g-mean, Matthews correlation coefficient, F-measure and Youden's index.
Correct
identification
(%)
identification(%)
Positive
100
50
0
1
2
3
4
5
6
7
8
9
10
Trial repeats
Figure 3-10. Reference match trial identification performance indices by three observers —
correct identification rate fluctuation with trial repeats.
90
Value
000
090
180
270
Azimuth
Sensitivity
Speficity
Precesion
Accuracy
Figure 3-11. Blind trial identification performance at differing azimuths (observer KS)
3.4 Discussion
3.4.1 Observation
Despite trialling various illumination schemes, bitemarks made on the semi-transparent wax
block consistently produced a monotone image with limited tone difference. Bitemarks were
therefore subject to enhancement to make microscopic features more observable and
comparable. Image enhancement algorithms built in the image processing software were used,
including contrast enhancement, edge detection, auto equalisation, histogram equalisation and
local equalisation. After trialling all methods available, local equalisation (Gonzalez and
Woods 2002) was chosen as most suitable because of its effectiveness in enhancing a small
tone difference between striations.
91
3.4.2 Identification
Observable characteristics found on bitemarks made by simulating bitemarks on wax were
sufficient to enable highly accurate identification. This was true in comparing a known set of
individuals as well as a random selection of known individuals. In this study microscopic
striations that result from the incisor‘s edge scraping on the wax were the most prominent
feature used to identify the individual animals. In contrast, human bitemark identification
commonly uses macroscopic features such as tooth alignment as the main feature to identify
the bitemarks (Miller et al. 2009). In human forensic cases, the medium on which bitemarks
are found is mostly skin, where it is subject to distortion due to the skin‘s flexibility creep
(DeVore 1971). In this possum study, the tooth and/or bitemark uniqueness was not
confirmed, though the results positively demonstrated that individual identification was
possible from bitemarks through visual analysis, comparison and evaluation.
In analysing human bitemarks, the forensic toolmark examination approach most commonly
used is the impression type toolmark comparison (AFTE 1992) where the feature pattern
distribution and locations on the tool, i.e., teeth, are compared with the toolmark, i.e., the
bitemark. In contrast, possum bitemarks in this study were analysed by the striation toolmark
comparison approach in forensic firearm and toolmark examination (AFTE 1992). This was
the first attempt to focus on mammal bitemarks made by teeth acting as tools to create
striation marks on wax. One aspect of bitemark creation that enabled this approach was the
possum‘s biting action of pulling on the material (Gilmore 1966) to cause drag marks.
Another variation source may have been the possum‘s incisors‘ likelihood to bear incidental
markings due to its natural wear during use.
92
Cognitive understanding of how pattern matches were achievable in striation patterns were
among intriguing issues faced during the trials, although further pursuit of the topic was
abandoned due to limited time and knowledge background.
3.4.3 Comparison of bitemark casts
Once it was established that the striations can be used to characterise simulated individual
bitemarks, actual bitemarks by live animals were used to develop a method to capture the
characteristics from WaxTags®. Due to the difficulty of imposing illumination inside a
concave surface of a bitemark, negative convex casts were found useful to adequately
illuminate and enhance the microscopic features. An elastometric silicone casting material
Forensic Sil was used to acquire the casts. The grey colour of Forensic Sil also enabled to
observe and photographically capture striation details without image enhancement techniques
used for wax blocks.
3.4.4 Repeatability
This newly developed method showed promise that it is a repeatable technique by other
observers, provided training is given and that the observer is keen on doing the task.
Unfortunately one of the novice observers (CS) showed limited interest in the project and
went as far as commenting it was questionable whether such method was of any use. It is not
surprising such attitude may have influenced the output.
Training methods of novice observers were not thoroughly examined after the trials nor were
compared with alternative approaches. Enhancement attempts of performance levels beyond
those that were achieved by each observer were not attempted.
93
Whilst the study took considerable time to develop the individual identification method up to
a satisfactory performance level, attempts to further raise performance were not made. Formal
examination of the training and learning processes may provide a valuable guide to
understand essential elements in achieving high identification performance, as well as to
streamline the method.
Additionally, the development of a purpose-oriented training schedule should assist in an
effective transfer of the technique, which may need a standardised level of achievement to
assure its proper application in identifying individuals from bitemarks. Collaboration with
forensic science training providers may assist in formulating the training programme.
3.4.5 Further study
The high performance scores in correctly matching individual possums from bitemarks
proved that it was possible to use the observable features to identify individual animals under
laboratory conditions. This allowed the study to proceed to the next stage to determine
whether individual identification of wild possum is possible from bitemarks on WaxTags®
under field conditions.
94
Chapter 4
Individual Identification of Wild Possums
From Bitemarks
4.1 Introduction
Various ecological research methods rely on correctly identifying the object of interest to
collect information. From a broad to specific focus; presence/absence and identification of the
species is needed to understand a community composition; demographic information from age
and sex identification assists in studying population dynamics; marking or identifying
individuals or groups allow population abundance estimates to be calculated as well as
conducting detailed behaviour studies by following each individual or group across the
landscape and/or time (Dinsmore and Johnson 2005, Lancia et al. 2005, Schroeder and Robb
2005, Silvy et al. 2005).
Bait-interference techniques have proved to be useful in determining possum presence, but
studies that have attempted to use bait-interference to determine abundance have had varied
results (Bamford 1970). Presence/absence information may provide useful abundance indices
when there is a known or assumed relationship between abundance and presence information
(Caughley 1977a). Though bait interference provides a positive presence indication where
baits have been interfered with, the unknown probability in time and space of an individual
interfering with multiple baits, or of multiple individuals interfering with a single bait, make
the results difficult to apply to indices of population abundance (McGlinchy and Warburton
2000, Fraser et al. 2002).
95
The latest development of the bait interference method presented in an operative protocol
(NPCA 2008a) investigates possum bitemarks left on a wax block (WaxTag®), and infers the
animal‘s activity by calculating the proportion of a set sample of blocks bitten. This field
protocol relies on training and accrediting qualified field operators to identify the species that
interfered with the tag and left its bitemarks. While a study obtained a high accuracy (99%) of
correctly identifying possum bitemarks made from possum skulls (Thomas et al. 2007), the
study did not extend to bitemarks made by live animals or to quantify the species‘ bitemark
characteristics.
In Chapter 2, species identification from quantifiable characteristics of bitemarks was shown
to be possible from live animals, and in Chapter 3, a novel method to identify known
individuals‘ bitemarks on WaxTags® under laboratory conditions was developed. The
question remains about the applicability of the new technique to the field environment i.e., to
determine whether the technique can be used to identify wild, free-ranging individuals.
In contrast to laboratory conditions where the biting species is known and its biting behaviour
can be checked any time, field application allows any combination of multiple biting species
to freely bite any number of WaxTag® at any location, and for an unknown duration
overnight. Possum bitemarks may be obscured by other species biting on the same tag.
Additionally, it would be impossible to monitor each individual‘s biting behaviour and
respond to some over-eager biters as were encountered in the captive trials, e.g., some
possums started biting the tags as soon as the WaxTag® was brought into the cage, even
before the tag was secured to the cage. In a worst-case scenario, complete removal of the wax
was expected by such individuals in the wild. Furthermore, the biting animals were purposely
not captured, compared to human forensics where it may be the usual case to identify the
96
suspect biter. This was to emulate the operational field conditions when using WaxTags® for
monitoring purposes. The NPCA WaxTag® protocol (2008a) is entirely free from the need to
confirm the actual biter‘s identity, as it does not require any direct encounter with animals.
Results from laboratory trials in the previous Chapters were considered sufficiently reliable to
overcome the need to confirm findings by actually capturing the animals that produced
bitemarks.
WaxTags® were used in a field environment to assess the utility of individual identification in
bait interference monitoring. Previous studies using bait interference encountered the
unknown probability of an individual interfering with more than one bait, or more than one
individuals interfering with a single bait (Bamford 1970, Jane 1979, 1981, Arulchelvam and
Brown 1995, Spurr 1995). This was an immeasurable variable that limited the use of a direct
count of the baits being interfered with to infer the monitored animal‘s abundance because it
was not necessarily proportional to the actual abundance. Bearman (2002) correctly described
the WaxTag® method‘s intrinsic problem as its inability to prove that if two baits were
interfered with, different individual animals interfered with them. Subsequently, if such
individual identification is possible, we should also be able to collect information of the
individual‘s spatial and temporal movements to observe behavioural patterns in visiting
multiple times or multiple tags.
Identification of wild individual possums from its bitemarks, as was found possible in
controlled laboratory trials, is the first attempt of its kind. It will not only add to the
enrichment of tools to study the possum, but also open a new door of opportunities where the
method can be applied to different animal species, especially when the non-invasive nature of
the WaxTag® may be advantageous, such as in endangered or protected species.
97
With the abovementioned background, the objectives of this Chapter were therefore to:
1. Undertake field trials to develop a WaxTag® methodology that allows the
identification of individual possums in the wild,
2. Determine the prevalence and extent of multiple visits by possums to WaxTags®, and
the influence this has on the reliability of the WaxTag® as a monitoring tool,
3. Determine if the addition of a food reward, in the form of an icing sugar/flour mix,
influences WaxTag® visitation by possums, and,.
4. Investigate the utility of the WaxTag® to elucidate new information about the home
range, distribution, and activity patterns of individual possums.
4.2 Methods
4.2.1 Study area
The work presented in this Chapter was undertaken at Bottle Lake Forest Reserve, an 845 ha
pine plantation near Christchurch City, New Zealand (43° 31' 60 S, 172° 37' 60 E, Figure
4-1). The area has multiple uses. It is a public recreational area, providing for walking,
running, mountain-biking and horse-trekking, (Christchurch City Council 2003). The forest is
owned by the Selwyn Plantation Board Limited (SPBL).
Radiata pine (Pinus radiata D. Don) comprise 99.5% of the trees in the plantation, the
remainder are Douglas fir (Pseudotsuga menziesii (Mirb.) Franco), macrocarpa (Cupressus
98
macrocarpa Hartw. ex Gordon), and Corsican pine (Pinus nigra var. maritima (Ait.) Melv.)
(Hewett and Banks 1999). Undergrowth is generally sparse, but where present, the most
conspicuous species are blackberry (Rubus fruticosus L.) and common gorse (Ulex europaeus
L.). The soil classification is Waikuku deep loamy sand for most of the inland area, with an
approximately one-kilometre wide band of Kairaki deep sand on the coastal edge (Manaaki
Whenua - Landcare Research 1997). The forest is suitable possum habitat (Nugent et al.
2000), and was free of possum control leading into this field study (SPBL personal
communication).
4.2.2 Site selection within the study area
As the Bottle Lake Forest contains patches of forest of mixed age structure, sites of older trees
were selected, because they were more likely to harbour possums. Preliminary site selection
was by combined satellite images and ortho-photographs of the surrounding area downloaded
from Google™ Earth version 4.2 (2007). Captured screen images were combined using Corel
PHOTOPAINT software (Versions 9 and 12) to produce whole area images of each forest
section. Ground-truthing with a Garmin® GPS II® was then undertaken to confirm tree
maturity and ground cover. Further information on planted species, maturity, logging scheme,
and physical boundaries was obtained from SPBL, and applied to refine area and block
definitions. For the purposes of this study it was decided to nominate suitable sample sites in
areas where species composition was homogenous, tree stands were mature, and where
undergrowth permitted reasonable access to the area. Trees in nominated areas were all over
15 years old (range 15 – 48 years).
Having defined suitable study habitat, a 100 × 100 m grid was generated and overlaid on a
forest image with numbered grid cells. Computer generated random numbers defined sample
99
grids where they fell on a suitable sample block. Paired sample plots of 110 × 110 m were
placed at 100 m distances i.e. a whole sample set of 110 × 320 m (Figure 4-1) were drawn on
the map within the nominated area to meet the following conditions: (1) sample set reference
point (north-west corner of first grid) was located in the randomly selected sample grid, (2)
the sample set of two grid plots fitted within 10 m inside the suitable sample block, and (3)
the sample grid orientation followed tree row orientation. The latest aerial photographs of the
selected sample sites were obtained from SPBL for final update and refinement of plot setting
on the map. Sample site nomination was continued until a suitable sample site was identified
in the Bottle Lake Forest (Figure 4-1).
4.2.3 WaxTag® layout design
The sample plot design comprised paired sub-plots with each sub-plot consisting of a 12 × 12
grid arrangement, separated by a 100 m distance, resulting in a 110 × 320 m area (Figure 4-2),
as described above. Each of the paired sample grids was given letters ‗A‘ and ‗B‘ without
specifying which lure protocol version it would follow. The grid nodes where WaxTags®
were deployed were allocated alpha-numeric codes to specify location within the grids. Each
WaxTag® was randomly assigned a unique four-digit identification (ID) number written on
the plastic tag with permanent ink before the trials. WaxTags® were taken from a pool of prenumbered tags and attached to a photo-luminescent tag, also colloquially known as a glo-tag,
as per the NPCA protocol (2005, 2008a). Each glo-tag was marked with its alpha-numeric
grid node location code, which assisted in confirmation and location recording at tag retrieval
because they were re-used at the same location during the trial regardless of interference of
the bait. Food lure application was done only once on the first day and was not renewed or
added to, in accordance with the NPCA protocol (2008a).
100
4.2.4 WaxTag® field deployment
WaxTag® deployment sites were located by firstly measuring the distance on a vehicle
odometer from distinct geographical features, e.g., road junctions, and were confirmed by a
GPS reading. Secondly, beyond the road reference point, off-road coordination was achieved
with compass readings and distance measurement. GPS reception was poor inside the wooded
area due to extensive canopy cover so was abandoned. Field distances were measured by a
―beltchain field measuring unit‖ (GeoSystems PO Box 8160, Riccarton, Christchurch 8440),
also known as field-chain or hip-chain, which measures the length of cotton thread reeled out
from a mobile device attached to one‘s belt, with one end of the thread tied to a fixed
reference point (Figure 4-3).
At every 10 m point on the hip chain while marking the nominal grid, the closest tree within a
5 m radius was selected. Where no tree was found, any suitable support, e.g., a stump, log,
shrub, or fallen tree, was substituted. WaxTag® attachment followed the operational protocol
to set the wax portion of the tag 30 cm above the ground, and a photo-luminescent strip
(GloTag) was attached with the tag to the trunk (Figure 4-4). One of the two grid plots (A, B)
was randomly chosen to follow previous protocol with no food lure (NPCA 2005) and the
other to follow the current protocol with food lure applied onto the trunk (NPCA 2008a). The
food lure was a 5:1 mixture of flour and icing sugar. The food lure was applied directly onto
the tree bark below the attached tag with the aid of a one-litre plastic container with a
perforated cap. WaxTags® were set up during daylight commencing 11 March 2008, left
overnight, and checked daily until 21 March 2008.
101
10 km
Christchurch
Lincoln University
100 km
Christchurch
43° 31' 60 S
172° 37' 60 E
Mature tree
stand (15+ yrs)
Sample site
(paired grids)
1 km
Figure 4-1. Study area: Bottle Lake Forest Reserve, Christchurch, New Zealand.
102
01 02 03 04 05 06 07 08 09 10 11 12
(a)
A
B
C
D
E
F
320 m
G
H
I
J
K
10 m
L
10 m
100 m
01 02 03 04 05 06 07 08 09 10 11 12
(b)
M
N
O
P
Q
R
110 m
S
T
U
V
W
X
110 m
Figure 4-2. Sampling grid arrangement. Grids were composed of 12 × 12 nodes at 10 m
intervals, resulting in two 110 m × 110 m square plots. Minimum distance between
closest nodes in grid (a) and (b) was 100 m. Node location notation was presented as a
row + column combination, e.g., C10 for 3rd row 10th column node. Node A01 was
designated as grid start reference.
103
Case lid with window
Thread spool
Thread drum, rotating trip meter as
thread is pulled out
Trip meter
0
0
Cotton thread
2
4
1cm
Mobile unit case
attached to belt
Distance travelled (not to scale) = Length of thread pulled out
= Trip meter reading
End of thread fixed on tree etc. (not to scale)
Figure 4-3. Components of hip-chain and its functional principle. Free end of thread is fixed
to a reference location, e.g. tree, while the mobile unit (yellow box) is carried by the
researcher along the pre-determined transect. Distance travelled from the reference
location is measured by length of thread pulled out from mobile unit recorded by the trip
meter.
104
Nail/screw
Glo-tag
WaxTag
30 cm
Food lure
Figure 4-4. WaxTag® field deployment. WaxTags® and glo-tags were attached together to tree
trunk by a wood screw at 30 cm above ground. In one grid plot, food lure (flour/sugar
mixture) was applied to the tree below the WaxTag®. Photograph taken after one night.
4.2.5 WaxTag® retrieval and recording
Each WaxTag® that showed signs of interference was retrieved, its identification (ID) number
and location recorded, and a new WaxTag® was attached in the identical location, together
with the same glo-tag. Any doubtful interference was recorded and the WaxTag® replaced to
minimise false negatives. A two-person recording/retrieval system with each observer
checking alternative rows was used to assist efficiency. Data were later combined from each
person‘s record sheet. The grid plot name, WaxTag® setup date, retrieval date, weather
conditions and observer were recorded on each sheet, and additional observations, e.g.,
detached WaxTag®, were also recorded. All retrieved WaxTags® were collected, carried and
stored in a paper pulp-based 5 × 6 mid-size egg tray with its wax portion suspended in the
105
depression by the plastic tag, to minimise physical contact with sources that could interfere
with the bitemark.
Laboratory observation to screen out false positives from questionable marks was done under
a stereo microscope fitted with a × 0.7–4.0 zoom objective lens and × 10 ocular lenses and
illuminated with a linear light source by a fluorescent tube (Figure 3-2). Negative casts were
taken for all confirmed and possible bitemarks with Forensic Sil (Armor Forensics,
Jacksonville, Florida USA) an addition-curing silicone elastomer, polyvinylsiloxane.
Micrographic images of the casts were captured on an Olympus DM12 digital camera fitted to
an Olympus stereoscope SZX12 at × 16 objective zoom and × 10 ocular lenses. Bite
orientation and illumination conditions were kept constant throughout all image captures. All
individual identification procedures followed the previously established observation method
with bitemarks from known captive possums, described in Chapter 3. Casts from WaxTag®
bitemarks were pooled and re-sorted according to the assigned tag ID. Blind test observation
was assured due to the random nature of each tag ID and its arbitrary deployment in the field.
No location information was made available during the individual identification process in
cast observation, and the identified individuals were later associated with the spatial and
temporal attributes at the post-identification stage. Identified individuals were given ID codes
identical to the first observed WaxTag® number on which its bitemark was recognised as an
individual.
4.2.6 Data collation
After all bitten WaxTags® were assessed for individual possum bitemarks, nightly bitten tag
locations were plotted according to individuals in distribution grid maps. The number of tags
bitten, its location, by which individual and for which night were the basic spatial and
106
temporal data collected for analysis. Information derived from raw data included that of each
individual, e.g., distance travelled; that of tags, e.g., proportion of tags bitten; and that of grid
location, e.g., multiple visits to same tag location.
4.2.7 NPCA protocol
The current operational standard to index possum activity is stipulated in the NPCA protocol
(2008a). It calculates the proportion of 20 WaxTags® arranged in a line at 10 m intervals that
are bitten by possums. A Bite Mark Index (BMI) is calculated as the mean percentage of
WaxTag® lines that are set up in the monitored area at a minimum distance of 100 m between
lines, along with its associated statistics of standard error and 95% confidence intervals. Two
duration options of field exposure, i.e., 3 nights and 7 nights, are provided in the protocol for
operational practicality. In this trial bitten tags form the grid were re-sampled as lines to
simulate the protocol, and emulated BMIs were calculated accordingly from the bitten grids
up to the 3rd, 7th and 10th nights.
4.3 Results
4.3.1 Retrieved WaxTags®
A total number of 490 tags was retrieved from the field with positive and questionable marks
for the two grids with different lure types, 95.3% (467) were bitten by possums, 1.6% (8) by
rats, and 3.1% (15) were false positives, i.e., not bitemarks. After excluding false positives,
the distribution of total tags with positive bitemarks was biased toward possum bitemarks
(Table 4-1). Considering the sample sizes, further data analyses focused only on possum
bitten WaxTags®.
107
Table 4-1. Number of WaxTags® retaining bitemarks by possums and rodents.
Treatment
Possum
Rodent
Total
Visual lure
192
1
193 (40.6%)
Visual + food lure
275
7
282 (59.4%)
Total
467 (98.3%)
8 (1.7%)
475
4.3.2 Influence of food lure on WaxTags® interference
The addition of food lure significantly increased (Analysis of Variance = ANOVA, p<0.05)
the cumulative number of WaxTag® setup locations being bitten at least once, i.e. number of
bitten tags without replacement analogous to field application and collection after the
respective nights and discounting any multiple visits (Figure 4-5). Both numbers of bitten
WaxTags® with and without food lure reached asymptote after five nights. The cumulative
number of bitten tags with replacement, which takes into account multiple visits to the same
tag, similarly showed a significant increase (ANOVA, p<0.05) with the addition of food lure
(Figure 4-6). Contrastingly, the number of bitten tags, with or without food lure, did not
approach asymptote and showed a continuous increase during the 10 nights. A nightly count
of bitten tags showed a significant increase (ANOVA, p<0.05) with application of food lure
on nights one, two and three, while no significant effect was detected from night four onwards
(Figure 4-7).
108
Cumulative visited tag locations (line)
Number WaxTags
10
5
No food lure
Food lure
0
1
2
3
4
5
6
7
8
9
10
Nights
Figure 4-5. Cumulative number of WaxTags® bitten per line without replacement. Both
numbers of bitten WaxTags® with and without food lure reach asymptote after five
nights. Error bar = SEM. Significantly more tags with food lure were bitten throughout
the 10 nights.
109
Cumulative tags bitten per line
30
Number WaxTags
20
10
No food lure
Food lure
0
1
2
3
4
5
6
7
8
9
10
Nights
Figure 4-6. Cumulative number of WaxTags® bitten per line with replacement. Both numbers
of bitten WaxTags® with and without food lure do not reach asymptote and continuously
increase. Error bar = SEM. Significantly more tags with food lure were bitten throughout
the 10 nights.
110
number tags bitten per line per night
Number WaxTags
10
5
No food lure
Food lure
0
1
2
3
4
5
6
7
8
9
10
Nights
Figure 4-7. Number of WaxTags® bitten per line each night. Error bar = SEM. Significantly
more tags with food lure were bitten up to the third night. No significant difference
between lure type was observed after the fourth night. (p<0.05)
111
4.3.3 Repeated visits to tags
The frequency and distribution of multiple visits to WaxTags® were not homogenous (Figure
4-8). Some grid locations were visited a maximum six times but others were not visited at all.
No clear pattern of visit frequency was observed, although a spatial gradient was loosely
visible. Patches with no bitemarks registered were more commonly bordered by single-night
biting activity, compared with frequently bitten areas which could be sharply bordered by
much less frequent visit area.
112
(a)
10 m
(b)
10 m
Number nights visited
1 2
3
4
5
1 2
3
4
5
6
Bubble size
No food lure
With food lure
®
Figure 4-8. Locations where WaxTags were repeatedly bitten during 10-night period. Grid
(a) with no food lure and grid (b) with food lure. Actual distance between grids was
100 m. Result shows that no saturation occurred after 10 nights.
113
4.3.4 Identification of individual possums
Following the method to identify individually-known captive possums from their bitemarks
(Chapter 3), it was possible to identify individuals from field specimens of a wild population
of possums. The interpretation central to the observations of field samples followed that of
captive possums: where positive identification was made on multiple bitemarks, i.e. the
striations and/or the impression marks of bitemarks of corresponding teeth matched, the
bitemarks were made by the same individual animal. Conversely, where the identification was
negative, it was concluded that the bitemarks were not made by the same individual.
In specific terms, where a bitemark on a WaxTag® from a certain grid location matched that
of another WaxTag® at a different location, the observation was interpreted as the same
individual possum bit one of the two tags, travelled to the other location, and bit the other tag.
When a bitemark on a WaxTag® from a certain night matched that from another night, the
interpretation was that the same individual animal bit the tags across a temporal span. Where
a bitemark on a WaxTag® matched another bitemark on the same tag, it was deduced that the
same individual possum bit the same tag multiple times on the same night. Such multiple bites
by the same individual on the same night were counted as a single individual identified on the
tag.
A sample identification illustrated in Figure 4-9 shows grid locations and microscopic images
of sample bitemark casts on WaxTags® 0077 and 4986 recovered from the first night, and
WaxTag® 6118 recovered from the second night. Matching striation patterns of tooth 31 were
observed in all three tags, i.e. positive identification was made on the bitemarks. The
interpretation from the sample was that an individual possum bit multiple WaxTags® across a
spatial span of grid locations C02, J10 and L11, and across a temporal span of one night.
114
A
1
2
3
4
5
6
7
8
9 10 11 12
...... 6
A
B
B
C
C
D
D
E
E
F
F
G
G
H
H
I
I
J
J
K
L
K
L
nd
2 night (partial)
st
1 night
7
8
9 10 11 12
10 m
®
WaxTags 0077,
4986 & 6118
Other WaxTags
with bitemarks
Tag 0077
Tag 4986
Tag 6118
1st night
location C02
tooth 31
1st night
location J10
tooth 31
2nd night
location L11
tooth 31
®
1 mm
Figure 4-9. Grid locations and microscopic images of sample bitemark casts on WaxTags®
0077 and 4986 recovered from the first night, and WaxTag® 6118 recovered from the
second night. Identification was made on the bitemarks from the three tags, interpreted as
the same individual possum biting across a spatial span of grid locations C02, J10 and
L11, and across a temporal span of one night.
115
4.3.5 Identified individuals
Examination of 3341 bitemark cast images from 467 possum-bitten WaxTags® yielded a total
of 504 identifiable bitemarks, i.e., those either positively identified as made by the same
individual or excluded as made by a different individual. Six bitemarks from 6 tags were
designated as inconclusive. The largest night number of identified bitemarks was 114 on night
one and smallest on night eight at 15. From the total 461 tags with at least one identifiable
bitemark, 38 (8.2%) were bitten by a second individual, and five (1.1%) were bitten by a third
individual (Table 4-2).
Table 4-2. Individual identification made from possum bitemarks on WaxTags®
Number of WaxTags® with identified individuals*
Night
Tags bitten
Individual #1
Individual #2
Individual #3
All
Inconclusive
1
92
91
20
3
114
1
2
92
92
6
0
98
0
3
70
70
4
0
74
0
4
46
46
4
2
52
0
5
34
33
0
0
33
1
6
36
36
1
0
37
0
7
27
26
1
0
27
1
8
16
15
0
0
15
1
9
35
33
2
0
35
2
10
19
19
0
0
19
0
467
461
38
5
504
6
Total
* Number of WaxTags® with nth individual identified. Individual #n refers to number of individuals identified on
same tag, e.g., on night four, two tags yielded three identified individuals
116
Twenty groups of distinctive bitemark patterns were identified from 504 bitemarks originating
from 461 WaxTags®. This was interpreted as detecting 20 possum individuals in the trial. Six
bitemarks were inconclusive due to limited observable characteristics to either include in or
exclude from any group, or to place in its own entity. A detailed observation output is given in
Appendix E.
4.3.6 Activity patterns of individual possums
All WaxTags® bitten by identified individuals were associated with grid location coordinates
and time attributes. The number of tags, the distance between the furthermost tags, and the
minimum convex polygon (MCP) area were calculated for each observation night from the
attributes and results plotted in Figure 4-10. The individuals were ranked according to the
maximum number of tags bitten per night and simultaneously indicated whether the
individual bit a tag with or without food lure. The presence of food lure did not have a
significant effect on the maximum number of bitten tags (p<0.05), maximum distance
between tags (p<0.05) or maximum MCP area covered by the individual (p<0.05). An output
summary is given in Appendix F.
The presence of a food lure on WaxTags® showed a significant effect (ANOVA, p<0.05) on
the mean number of individuals detected on sample lines on the first night (Figure 4-11).
There was no significant difference in the number of identified individuals biting after the
second night, but the rate of change in the number of individuals detected was significantly
higher (Restricted Maximum Likelihood = REML variance components analysis, p<0.05) in
food-lured tags area than that in non food-lured tags area.
117
35
(a)
Number of tags
30
25
20
15
10
5
(b)
0
350
300
Distance (m)
250
200
150
100
50
(c)
0
3.0
Individual animal number:
0077 (blue): Individuals that bit tags without food lure on first night.
0719 (pink): Individuals that bit tags with food lure on first night.
2.5
Area (ha)
2.0
1.5
1.0
0.5
0.0
8349
1885
3443
6990
0919
8355
4458
3082
1833
0375
4242
2272
0139
2353
2382
0866
0560
0077
0131
0719
8349
1885
3443
6990
0919
8355
4458
3082
1833
0375
4242
2272
0139
2353
2382
0866
0560
0077
0130
0719
Individual animal
Figure 4-10. Box-and-whisker plots of nightly (a) number of tags bitten, (b) distance between
furthest bitten tags and (c) minimum convex polygon area, of individual possums.
Individuals are sorted to the order of least to most number of tags bitten in all three charts
for comparison.
118
detected individuals per line
4
3
No food lure
Individuals
Food lure
2
1
0
1
2
3
4
5
6
7
8
9
10
Nights
Figure 4-11. Number of individual possums identified per line. Error bars = SEM.
The information obtained from plotting WaxTag® locations that were identified as bitten by
each of the 20 individual possums is described in the following sections including (1) the
number of tags, with and without food lure, identified with the individual‘s bitemarks; (2) the
number of nights that these bitemarks were observed i.e. ‗active nights‘; (3) the maximum
number of tags bitten on a single night; (4) the maximum distance between the furthest bitten
tags on a single night; (5) the maximum area of minimum convex polygon (MCP) covered on
a single night; (6) the centre of nightly activity calculated as an arithmetic centre of mass
(centroid) from number and location of bitten tags; (7) the centroid confinement or expansion
from food-lured or non food lured grid where the first bitten tag was observed; (8) the nightly
119
movement of centroids (centroid shift) describing the shift of activity centre; (9) the number
of tags bitten by other individuals i.e. visits by multiple individuals; and (10) the number of
tags bitten on multiple nights by the same individual.
Individual 0077 (Figure 4-12) left bitemarks on a total of 69 WaxTags® in eight active nights.
The maximum number of tags bitten on one night was 16 on the first night followed by 15 on
the third night. It was most spatially active on night three covering 1.40 ha of MCP and 216 m
travelled. It was largely active in the grid with no food lure (8/8 active nights) with 88% (7/8
active nights) of its centroid confined within the grid. Centroid shifts totalled to 396 m. Foodlured tags interfered with were limited to those closest to the non-lured tags and were 9%
(6/69) of total bitten tags. Ten tags (14% = 10/69) bitten by individual 0077 were also bitten
by other individuals on the same night. WaxTags® set on 56 grid locations yielded 69 tags
bitten by this individual, broken down to 44 locations (79% = 44/56) visited once, 11
locations visited twice and one location visited three times by the individual i.e. 21% (12/56)
of locations visited multiple times.
Individual 0375 (Figure 4-13) bit a total of 10 tags on five active nights with a peak of three
tags on the first night. The largest distance travelled was 71 m on night three. Calculation of
nightly MCPs was not possible because bitten tag locations were linear or single. All bitten
tags were in the grid with no food lure, with centroids all confined within the grid. Centroids
shifted a total 72 m. Other individuals, on the same night, bit 30% (3/10) of tags bitten by this
individual. Of the nine grid locations where individual 0375 left bitemarks, one location (11%
= 1/9) was visited twice.
120
Individual 2353 (Figure 4-14) was active on six nights, biting a maximum seven tags on the
first night from a total of 19 tags. It travelled a maximum 215 m distance on night four and
covered 0.52 ha of MCP area on nights one and four. Activity was mostly in the grid where
tags did not have food lure (6/6 active nights). Three tags with food lure (75%) and one tag
without food lure were bitten on night four. These three tags were the only ones bitten with
food lure resulting in 16% (3/19) of all bitten tags. Centroids were confined within the gird
without food lure in 83% (5/6) of active nights, from a shifting total of 569 m. Four tags (21%
= 4/19) were bitten by other individuals. The 19 tags bitten by this individual were at 17 grid
locations, i.e., 15 locations visited once and two locations visited twice by the individual.
Individual 0866 (Figure 4-15) was one of three most temporally active possums (10/10 nights)
biting 58 tags. It bit a maximum number of 10 tags on nights three and nine; the minimum
was one tag on night 10. The individual travelled 218 m and covered 1.30 ha MCP on night
three. Number 0866 was active in the non food-lured grid on all nights. It also bit one, four
and one tags with food lure on nights two, three and four, respectively, comprising 10%
(6/58) of bitten tags and 30% (3/10) of active nights. All bitten food-lured tag locations were
confined to those closest to the non food-lured grid. Centroids shifted a total of 480 m with
20% (2/10) of active nights extending outside the non food-lured grid. Nine tags (16%) were
bitten by other individuals on same nights. The 58 bitten tags were from 46 locations, i.e., 34
locations bitten once and 12 locations bitten twice.
Individual 1885 (Figure 4-16) was identified from its first and only bitten tag on the sixth
night. No other tag with or without food lure was bitten by this individual, nor did any other
individual interfere with the bitten tag.
121
Individual 0139 (Figure 4-17) was first identified on night two with five bitten tags, and was
active on 40% (4/10) of observed nights with a total 13 bitten tags. The largest distance
between tags was 40 m and it covered an MCP area of 0.06 ha on night two. Centroid shifts
totalled 42 m. All bitten tags were with no food lure with none was interfered with by other
individuals on the same nights. The 13 bitten tags were retrieved from nine grid locations of
which six were bitten once, two bitten twice and one bitten three times.
Individual 2272 (Figure 4-18) was first identified on night three. On night four it bit four tags,
travelled 243 m and covered 0.36 ha MCP area, all maximum measurements. It was active on
60% (6/10) of nights interfering with a total of 17 tags. On all active nights a total of 15 tags
with no food lure were bitten, whereas two tags with food lure (12% = 2/17) were bitten only
on night four (17% = 1/6). Centroids were within the non food-lure grid in 83% (5/6) of active
nights shifting a total of 388 m. Two tags (12% = 2/17) were interfered with by other
individuals on nights four and nine. All 17 tags retrieved with bitemarks were from 17
different grid locations, i.e., all 17 tags were bitten once.
Individual 6990 (Figure 4-19) was first identified on night two travelling 10 m between the
two bitten tags. Four non food-lured tags were bitten on nights two to four resulting in 30%
(3/10) activity. One tag (25% = 1/4) was bitten by another individual, 0335, on the same
night. MCP polygon areas cannot be calculated; its centroid shift totalled 90 m. The four
bitten tags were retrieved from four locations, i.e., all tags were bitten once.
Individual 3443 (Figure 4-20) interfered with one tag on nights one and four (20% activity),
both tags were without food lure. One of these tags (50% = 1/2) was bitten by individual 0077
122
on the same night. The centroid shifted 82 m between the nights. No tag was bitten multiple
times by the individual.
Individual 0131 (Figure 4-21) left bitemarks on a total of 110 tags over 10 active nights. It
interfered with the greatest total number tags among all identified individuals and was one of
the three most temporally active individuals (No. 0866, 0131 & 2382). The maximum number
tags bitten per night was 31 covering its maximum 0.82 ha MCP area on night one. Its
maximum distance 310 m was travelled on night four. Except for two tags, all were lured with
food (98% = 108/110). Most activity areas were confined to the food-lured grid with nine
centroids (90%) confined within the grid area and the centroid of night four extending outside.
The total centroid shift was 419 m. Fourteen tags (13% = 14/110) were interfered with by
other individuals on the same night, of which 86% (12/14) were on night one. Of the 77 tag
locations where tags were bitten by individual 0131, 50 were bitten once, 23 were bitten
twice, two were bitten three times and two were bitten four times.
Individual 0560 (Figure 4-22) interfered with 41 tags of which 98% (40/41) were lured with
food. It bit one non-lure tag on night four travelling its 180 m maximum distance on that
night. The maximum number of bitten tags per night was 12 on night one, the maximum MCP
area was 0.34 ha on night two. The individual was active on nine nights (90%) with
interference observed on food-lure tags on all active nights. Centroids were mostly (89%
= 8/9) within the food-lure grid except night four, when it shifted 477 m. Ten tags (24%
= 10/41) were bitten by other individuals, of which 70% (7/10) were on night one. The 41
tags bitten by individual 0560 were retrieved from 34 grid locations, broken down to 27
locations visited once and seven locations visited twice.
123
Individual 0719 (Figure 4-23) was 90% (9/10) active biting 92 total tags. The maximum, 33
tags, was on night two, and the maximum distance, 311 m, was travelled on night four. This
distance was the furthest travelled among all 20 identified individuals. The maximum MCP
area was 2.8 ha on night four. Of the 92 bitten tags 80% (74/92) had food-lure and were bitten
on all nine active nights. The individual extended its foraging to interfere with 18 (20%
= 18/92) non food-lure tags on 44% (4/9) of active nights. Centroids were within food-lure
grid area on 78% (7/9) of active nights; it extended outside that area on nights four and ten.
The centroid shifted a total 617 m. Twenty-percent (18/92) of total tags were interfered with
other individuals. The 92 tags were retrieved from 72 grid locations; tags were bitten once at
56 locations, twice at 12 locations and three times at four locations.
Individual 2382 (Figure 4-24) was active on all 10 nights with maximum of seven bitten tags
on the first night. It travelled a maximum of 290 m and covered a 0.92 ha MCP area on night
six. The number of tags bitten totalled 37 among which 33 (89%) were food-lured, and four
(11 %) were without on nights four, five and six. Eighty-percent (8/10) of centroids were
within the food-lure grid, with centroids for nights four and five extending outside the grid.
The total centroid shift amounted to 254 m. This individual shared five tags (14% = 5/37)
with other individuals. The 37 bitten tags were from 30 grid locations; at 23 locations tags
were bitten once and at seven locations were bitten twice.
Individual 3082 (Figure 4-25) left two bitemarks on food-lured tags on night one. Both tags
were bitten by other individuals. The distance between the bitten tags was 130 m.
124
Individual 8355 (Figure 4-26) was 30% (3/10) active, nights one, four and eight, biting five
food-lured tags. The highest number of tags bitten on one night was two, on nights one and
eight. The maximum distance was 22 m between tags on night one, nightly MCP area cannot
be calculated. The centroid shifted a total 155 m. Other individuals interfered with 40% (2/5)
of tags. All five tags were bitten once each at five grid locations.
Individual 4242 (Figure 4-27) showed 60% (6/10) activity with a maximum four tags on night
four from a total 10 bitten tags. All six nights observed a total seven food-lured tags bitten,
while three tags (30% = 3/10) on night four were from the grid without food lure. Largest
MCP area 0.09 ha was on night four. The centroid was all within the food-lure grid except
night four, shifting a total 394 m. No tags were bitten by other individuals. Most tags (80%
= 8/10) were bitten once at eight locations while one tag was bitten twice at one location.
Individual 8349 (Figure 4-28) bit one tag with food lure on the first night. This tag was also
bitten by individual 0719.
Individual 1833 (Figure 4-29) bit nine tags, of which 89% (8/9) were with food lure. Its first
active night was night two, with six active nights. The largest distance travelled (64 m) and
MCP area covered (0.02 ha) were on night three. Five centroids (83% = 5/6) were within the
food-lure grid, with one centroid outside the grid. The total centroid shift was 433 m. No tags
were bitten by other individuals on the same night. The nine tags were bitten once by the
individual at seven grid locations and twice at one location.
125
Individual 0919 (Figure 4-30) bit two food-lured tags spaced 20 m apart on night three. One
of the tags was also bitten by individual 0719.
Individual 4458 (Figure 4-31) also bit two food-lured tags; they were 41 m apart on night
nine. No other individual interfered with the tags.
In total, 226 grid locations were bitten by 20 possums during 10 nights, giving a mean of 11.3
(range: 1–77) grid locations bitten by an individual possum. This was further broken down to
a total 176 grid locations bitten by 18 individuals up to 3 nights averaging 9.8 (range: 1–52)
grids per possum, and a total 219 grid locations bitten by 19 individuals up to 7 nights with a
mean 11.5 (range: 1–72) grids bitten per possum (Table 4-3). Inverse calculations showed that
the mean number identified possum per bitten grid location were 0.10, 0.09 and 0.09 for
cumulative 3, 7 and 10 nights respectively.
Table 4-4 summarises possum biting activity during the 10-night trial. The mean number of
WaxTags® bitten per night by the 20 individuals was 2.5 tags/night, when calculated without
consideration to multiple individuals biting the same tag (overlap). The maximum number
tags bitten by an individual ranged from 1 to 33 tags on a single night. The mean nightly
distance travelled by the 20 individual possums was 40.3 m/night, ranging from 0 m to 311 m
in one night. Mean nightly Minimum Convex Polygon (MCP) area was 0.1 ha with the range
between 0 ha and 2.8 ha covered by an individual per night.
126
Table 4-3. Cumlative bitten WaxTags® and grid locations up to 3, 7 and 10 nights.
3 nights
7 nights
Individual #
Total tags
Total grids
0719
59
0131
78
0077
10 nights
Total tags
Total grids
Total tags
Total grids
52
86
62
100
69
92
72
72
110
77
39
37
62
53
69
56
0560
28
25
35
30
41
34
0866
2382
25
22
41
34
58
46
14
13
31
28
37
30
2353
8
8
17
15
19
17
0139
9
7
11
9
13
9
2272
3
3
13
13
17
17
4242
1
1
7
6
10
9
0375
7
6
10
9
10
9
1833
4
4
7
5
9
8
3082
2
2
2
2
2
2
4458
0
0
0
0
2
2
8355
2
2
3
3
5
5
0919
2
2
2
2
2
2
6990
3
3
4
4
4
4
1885
0
0
1
1
1
1
3443
1
1
2
2
2
2
8349
1
1
1
1
1
1
Total (with overlap)
286
251
435
358
504
403
Total (actual tag/grid)
254
176
397
219
467
226
Total possums
18
18
19
19
20
20
Possum per tag/grid
0.07
0.10
0.05
0.09
0.04
0.09
Tag/grid per possum
14.1
9.8
20.9
11.5
23.4
11.3
The detailed measurements of all individual possums‘ activities by each night are summarised
in Appendix F.
127
128
(1,8)
(3)
(2)
(6)
(1,4)
(1)
2
2
2
1
1
1
8355
0919
6990
1885
3443
8349
0.1
0.2
0.1
0.4
0.2
0.5
0.2
0.2
0.9
1.0
1.0
1.7
1.3
1.9
3.7
5.8
4.1
6.9
11.0
9.2
Mean
0
0
0
0
0
0
1
0
1
0.5
1
3
0
1.5
3.5
6.5
2
7
5.5
3.5
Median
1
2
1
4
2
5
2
2
8
9
9
17
9
17
30
46
34
56
77
72
Total grids
1.0
1.7
1.0
3.7
2.0
3.3
2.0
2.0
5.1
6.8
4.7
10.5
8.1
12.3
20.8
29.2
27.2
43.6
63.9
60.4
Mean
1
2
1
4
2
3
2
2
5
6.5
5
11.5
9
13
22.5
31
29
50
68
67
Median
Bitten-tag grid locations (multiple
visits not counted)
-
-
-
10
20
22
41
130
64
71
180
243
40
215
290
218
180
216
310
311
(2)
(3)
(1)
(9)
(1)
(3)
(3)
(4)
(4)
(2)
(4)
(6)
(3)
(4)
(3)
(4)
(4)
Maximum (night #)
1.0
2.0
3.2
4.1
13.0
9.6
16.1
19.0
43.5
9.2
57.2
113.9
109.2
55.7
106.4
112.0
131.1
Mean
0
0
0
0
0
0
0
0
0
0
5
92
114
33
124.5
94.5
102
Median
Distance travelled per night (m)
-
-
-
-
-
-
-
-
-
-
0.10
0.40
0.10
0.50
0.90
1.30
0.30
1.40
0.80
2.80
(4)
(4)
(2)
(1,4)
(6)
(3)
(1,2)
(3)
(1)
(4)
Maximum (night #)
0.01
0.05
0.01
0.11
0.22
0.41
0.06
0.40
0.30
0.72
Mean
Area covered per night (ha)
Mean (overlapped)
128
7.4
2.5
1.8
20.1
15.5
16.7
128.1
40.3
33.2
0.4
0.11
NB: Where only one tag was bitten per night, distances cannot be calculated. Similarly the area cannot be calculated where bitten tags were single or arranged linearly.
(9)
2
4242
4458
(4)
4
2272
(1)
(4)
4
0139
2
(2)
5
2353
3082
(1)
7
2382
1833
(1)
7
0866
(3)
(3,9)
10
0560
(1)
(1)
12
3
(1)
16
0077
3
(1)
31
0131
0375
(2)
33
Maximum (night #)
0719
Individual #
Number tags bitten per night
Table 4-4. Summary WaxTag® biting activity of individual possums over 10 nights.
0
0
0
0
0.05
0.3
0
0.3
0.25
0.3
Median
The following plots (Figure 4-12 to Figure 4-31) graphically illustrate each individual‘s
change in biting behaviour over time and space. Keys to each colour plot are given in Legend
1, showing interfered tags with and without food lure, those visited by other possum(s),
centroids of bitten tag distribution, and spatial nightly distribution in MCP. Cumulative MCP
over all 10 nights and maximum nightly distance between tags are also plotted. Keys to each
greyscale plot are given in Legend 2, showing cumulative number of visits by the individual
animal (size = number of visits) with centroid (size = number of tags visited) on each of 10
nights, and its spatial shift between nights.
129
320 m
Night 1
2
3
4
5
7
8
9
10
10
m
6
Legend 1
Legend 2
Visit to tag with no food lure
1 2 3 4 5
Visit to tag with food lure
Visit by multiple individuals
20
5
Centroid (centre of mass)
1–10
Minimum convex polygon
(MCP)
MCP where bitten tag
locations are linear
MCP (cumulative over all
10 nights)
Maximum distance
between tags
30
10
Number of visits
to each location
(10-night total)
Centroid size =
number of visited
tags per night
Centroid shift
10 m
Scale
Figure 4-12. Distribution of WaxTags® bitten by individual possum 0077 for each of 10
nights, and cumulative MCP for all nights (colour plots), with cumulative number of
visits and nightly shift of centroid (greyscale plots). Legend for colour plots is shown in
―Legend 1‖. Legend for greyscale plot is shown in ―Legend 2‖.
130
Night 1
2
3
4
5
7
8
9
10
10 m
6
Legend 1
Legend 2
Visit to tag with no food lure
1 2 3 4 5
Visit to tag with food lure
Visit by multiple individuals
20
5
Centroid (centre of mass)
1–10
Minimum convex polygon
(MCP)
MCP where bitten tag
locations are linear
MCP (cumulative over all
10 nights)
Maximum distance
between tags
30
10
Number of visits
to each location
(10-night total)
Centroid size =
number of visited
tags per night
Centroid shift
10 m
Scale
Figure 4-13. Distribution of WaxTags® bitten by individual possum 0375 for each of 10
nights, and cumulative MCP for all nights (colour plots), with cumulative number of
visits and nightly shift of centroid (greyscale plots). Legend for colour plots is shown in
―Legend 1‖. Legend for greyscale plot is shown in ―Legend 2‖.
131
Night 1
2
3
4
5
7
8
9
10
10 m
6
Legend 1
Legend 2
Visit to tag with no food lure
1 2 3 4 5
Visit to tag with food lure
Visit by multiple individuals
20
5
Centroid (centre of mass)
1–10
Minimum convex polygon
(MCP)
MCP where bitten tag
locations are linear
MCP (cumulative over all
10 nights)
Maximum distance
between tags
30
10
Number of visits
to each location
(10-night total)
Centroid size =
number of visited
tags per night
Centroid shift
10 m
Scale
Figure 4-14. Distribution of WaxTags® bitten by individual possum 2353 for each of 10
nights, and cumulative MCP for all nights (colour plots), with cumulative number of
visits and nightly shift of centroid (greyscale plots). Legend for colour plots is shown in
―Legend 1‖. Legend for greyscale plot is shown in ―Legend 2‖.
132
Night 1
2
3
4
5
7
8
9
10
10 m
6
Legend 1
Legend 2
Visit to tag with no food lure
1 2 3 4 5
Visit to tag with food lure
Visit by multiple individuals
20
5
Centroid (centre of mass)
1–10
Minimum convex polygon
(MCP)
MCP where bitten tag
locations are linear
MCP (cumulative over all
10 nights)
Maximum distance
between tags
30
10
Number of visits
to each location
(10-night total)
Centroid size =
number of visited
tags per night
Centroid shift
10 m
Scale
Figure 4-15. Distribution of WaxTags® bitten by individual possum 0866 for each of 10
nights, and cumulative MCP for all nights (colour plots), with cumulative number of
visits and nightly shift of centroid (greyscale plots). Legend for colour plots is shown in
―Legend 1‖. Legend for greyscale plot is shown in ―Legend 2‖.
133
Night 1
2
3
4
5
7
8
9
10
10 m
6
Legend 1
Legend 2
Visit to tag with no food lure
1 2 3 4 5
Visit to tag with food lure
Visit by multiple individuals
20
5
Centroid (centre of mass)
1–10
Minimum convex polygon
(MCP)
MCP where bitten tag
locations are linear
MCP (cumulative over all
10 nights)
Maximum distance
between tags
30
10
Number of visits
to each location
(10-night total)
Centroid size =
number of visited
tags per night
Centroid shift
10 m
Scale
Figure 4-16. Distribution of WaxTags® bitten by individual possum 1885 for each of 10
nights, and cumulative MCP for all nights (colour plots), with cumulative number of
visits and nightly shift of centroid (greyscale plots). Legend for colour plots is shown in
―Legend 1‖. Legend for greyscale plot is shown in ―Legend 2‖.
134
Night 1
2
3
4
5
7
8
9
10
10 m
6
Legend 1
Legend 2
Visit to tag with no food lure
1 2 3 4 5
Visit to tag with food lure
Visit by multiple individuals
20
5
Centroid (centre of mass)
1–10
Minimum convex polygon
(MCP)
MCP where bitten tag
locations are linear
MCP (cumulative over all
10 nights)
Maximum distance
between tags
30
10
Number of visits
to each location
(10-night total)
Centroid size =
number of visited
tags per night
Centroid shift
10 m
Scale
Figure 4-17. Distribution of WaxTags® bitten by individual possum 0139 for each of 10
nights, and cumulative MCP for all nights (colour plots), with cumulative number of
visits and nightly shift of centroid (greyscale plots). Legend for colour plots is shown in
―Legend 1‖. Legend for greyscale plot is shown in ―Legend 2‖.
135
Night 1
2
3
4
5
7
8
9
10
10
m
6
Legend 1
Legend 2
Visit to tag with no food lure
1 2 3 4 5
Visit to tag with food lure
Visit by multiple individuals
20
5
Centroid (centre of mass)
1–10
Minimum convex polygon
(MCP)
MCP where bitten tag
locations are linear
MCP (cumulative over all
10 nights)
Maximum distance
between tags
30
10
Number of visits
to each location
(10-night total)
Centroid size =
number of visited
tags per night
Centroid shift
10 m
Scale
Figure 4-18. Distribution of WaxTags® bitten by individual possum 2272 for each of 10
nights, and cumulative MCP for all nights (colour plots), with cumulative number of
visits and nightly shift of centroid (greyscale plots). Legend for colour plots is shown in
―Legend 1‖. Legend for greyscale plot is shown in ―Legend 2‖.
136
Night 1
2
3
4
5
7
8
9
10
10 m
6
Legend 1
Legend 2
Visit to tag with no food lure
1 2 3 4 5
Visit to tag with food lure
Visit by multiple individuals
20
5
Centroid (centre of mass)
1–10
Minimum convex polygon
(MCP)
MCP where bitten tag
locations are linear
MCP (cumulative over all
10 nights)
Maximum distance
between tags
30
10
Number of visits
to each location
(10-night total)
Centroid size =
number of visited
tags per night
Centroid shift
10 m
Scale
Figure 4-19. Distribution of WaxTags® bitten by individual possum 6990 for each of 10
nights, and cumulative MCP for all nights (colour plots), with cumulative number of
visits and nightly shift of centroid (greyscale plots). Legend for colour plots is shown in
―Legend 1‖. Legend for greyscale plot is shown in ―Legend 2‖.
137
Night 1
2
3
4
5
7
8
9
10
10 m
6
Legend 1
Legend 2
Visit to tag with no food lure
1 2 3 4 5
Visit to tag with food lure
Visit by multiple individuals
20
5
Centroid (centre of mass)
1–10
Minimum convex polygon
(MCP)
MCP where bitten tag
locations are linear
MCP (cumulative over all
10 nights)
Maximum distance
between tags
30
10
Number of visits
to each location
(10-night total)
Centroid size =
number of visited
tags per night
Centroid shift
10 m
Scale
Figure 4-20. Distribution of WaxTags® bitten by individual possum 3443 for each of 10
nights, and cumulative MCP for all nights (colour plots), with cumulative number of
visits and nightly shift of centroid (greyscale plots). Legend for colour plots is shown in
―Legend 1‖. Legend for greyscale plot is shown in ―Legend 2‖.
138
10 m
Night 1
2
3
4
5
6
7
8
9
10
Legend 1
Legend 2
Visit to tag with no food lure
1 2 3 4 5
Visit to tag with food lure
Visit by multiple individuals
20
5
Centroid (centre of mass)
1–10
Minimum convex polygon
(MCP)
MCP where bitten tag
locations are linear
MCP (cumulative over all
10 nights)
Maximum distance
between tags
30
10
Number of visits
to each location
(10-night total)
Centroid size =
number of visited
tags per night
Centroid shift
10 m
Scale
Figure 4-21. Distribution of WaxTags® bitten by individual possum 0131 for each of 10
nights, and cumulative MCP for all nights (colour plots), with cumulative number of
visits and nightly shift of centroid (greyscale plots). Legend for colour plots is shown in
―Legend 1‖. Legend for greyscale plot is shown in ―Legend 2‖.
139
10 m
Night 1
2
3
4
5
6
7
8
9
10
Legend 1
Legend 2
Visit to tag with no food lure
1 2 3 4 5
Visit to tag with food lure
Visit by multiple individuals
20
5
Centroid (centre of mass)
1–10
Minimum convex polygon
(MCP)
MCP where bitten tag
locations are linear
MCP (cumulative over all
10 nights)
Maximum distance
between tags
30
10
Number of visits
to each location
(10-night total)
Centroid size =
number of visited
tags per night
Centroid shift
10 m
Scale
Figure 4-22. Distribution of WaxTags® bitten by individual possum 0560 for each of 10
nights, and cumulative MCP for all nights (colour plots), with cumulative number of
visits and nightly shift of centroid (greyscale plots). Legend for colour plots is shown in
―Legend 1‖. Legend for greyscale plot is shown in ―Legend 2‖.
140
10
m
Night 1
6
2
3
4
5
7
8
9
10
Legend 1
Legend 2
Visit to tag with no food lure
1 2 3 4 5
Visit to tag with food lure
Visit by multiple individuals
20
5
Centroid (centre of mass)
1–10
Minimum convex polygon
(MCP)
MCP where bitten tag
locations are linear
MCP (cumulative over all
10 nights)
Maximum distance
between tags
30
10
Number of visits
to each location
(10-night total)
Centroid size =
number of visited
tags per night
Centroid shift
10 m
Scale
Figure 4-23. Distribution of WaxTags® bitten by individual possum 0719 for each of 10
nights, and cumulative MCP for all nights (colour plots), with cumulative number of
visits and nightly shift of centroid (greyscale plots). Legend for colour plots is shown in
―Legend 1‖. Legend for greyscale plot is shown in ―Legend 2‖.
141
10 m
Night 1
2
3
4
5
6
7
8
9
10
Legend 1
Legend 2
Visit to tag with no food lure
1 2 3 4 5
Visit to tag with food lure
Visit by multiple individuals
20
5
Centroid (centre of mass)
1–10
Minimum convex polygon
(MCP)
MCP where bitten tag
locations are linear
MCP (cumulative over all
10 nights)
Maximum distance
between tags
30
10
Number of visits
to each location
(10-night total)
Centroid size =
number of visited
tags per night
Centroid shift
10 m
Scale
Figure 4-24. Distribution of WaxTags® bitten by individual possum 2382 for each of 10
nights, and cumulative MCP for all nights (colour plots), with cumulative number of
visits and nightly shift of centroid (greyscale plots). Legend for colour plots is shown in
―Legend 1‖. Legend for greyscale plot is shown in ―Legend 2‖.
142
10 m
Night 1
2
3
4
5
6
7
8
9
10
Legend 1
Legend 2
Visit to tag with no food lure
1 2 3 4 5
Visit to tag with food lure
Visit by multiple individuals
20
5
Centroid (centre of mass)
1–10
Minimum convex polygon
(MCP)
MCP where bitten tag
locations are linear
MCP (cumulative over all
10 nights)
Maximum distance
between tags
30
10
Number of visits
to each location
(10-night total)
Centroid size =
number of visited
tags per night
Centroid shift
10 m
Scale
Figure 4-25. Distribution of WaxTags® bitten by individual possum 3082 for each of 10
nights, and cumulative MCP for all nights (colour plots), with cumulative number of
visits and nightly shift of centroid (greyscale plots). Legend for colour plots is shown in
―Legend 1‖. Legend for greyscale plot is shown in ―Legend 2‖.
143
10 m
Night 1
2
3
4
5
6
7
8
9
10
Legend 1
Legend 2
Visit to tag with no food lure
1 2 3 4 5
Visit to tag with food lure
Visit by multiple individuals
20
5
Centroid (centre of mass)
1–10
Minimum convex polygon
(MCP)
MCP where bitten tag
locations are linear
MCP (cumulative over all
10 nights)
Maximum distance
between tags
30
10
Number of visits
to each location
(10-night total)
Centroid size =
number of visited
tags per night
Centroid shift
10 m
Scale
Figure 4-26. Distribution of WaxTags® bitten by individual possum 8355 for each of 10
nights, and cumulative MCP for all nights (colour plots), with cumulative number of
visits and nightly shift of centroid (greyscale plots). Legend for colour plots is shown in
―Legend 1‖. Legend for greyscale plot is shown in ―Legend 2‖.
144
10
m
Night 1
6
2
3
7
8
4
5
9
Legend 1
10
Legend 2
Visit to tag with no food lure
1 2 3 4 5
Visit to tag with food lure
Visit by multiple individuals
20
5
Centroid (centre of mass)
1–10
Minimum convex polygon
(MCP)
MCP where bitten tag
locations are linear
MCP (cumulative over all
10 nights)
Maximum distance
between tags
30
10
Number of visits
to each location
(10-night total)
Centroid size =
number of visited
tags per night
Centroid shift
10 m
Scale
Figure 4-27. Distribution of WaxTags® bitten by individual possum 4242 for each of 10
nights, and cumulative MCP for all nights (colour plots), with cumulative number of
visits and nightly shift of centroid (greyscale plots). Legend for colour plots is shown in
―Legend 1‖. Legend for greyscale plot is shown in ―Legend 2‖.
145
10
m
Night 1
6
2
3
4
5
7
8
9
10
Legend 1
Legend 2
Visit to tag with no food lure
1 2 3 4 5
Visit to tag with food lure
Visit by multiple individuals
20
5
Centroid (centre of mass)
1–10
Minimum convex polygon
(MCP)
MCP where bitten tag
locations are linear
MCP (cumulative over all
10 nights)
Maximum distance
between tags
30
10
Number of visits
to each location
(10-night total)
Centroid size =
number of visited
tags per night
Centroid shift
10 m
Scale
Figure 4-28. Distribution of WaxTags® bitten by individual possum 8349 for each of 10
nights, and cumulative MCP for all nights (colour plots), with cumulative number of
visits and nightly shift of centroid (greyscale plots). Legend for colour plots is shown in
―Legend 1‖. Legend for greyscale plot is shown in ―Legend 2‖.
146
10 m
Night 1
2
3
4
5
6
7
8
9
10
Legend 1
Legend 2
Visit to tag with no food lure
1 2 3 4 5
Visit to tag with food lure
Visit by multiple individuals
20
5
Centroid (centre of mass)
1–10
Minimum convex polygon
(MCP)
MCP where bitten tag
locations are linear
MCP (cumulative over all
10 nights)
Maximum distance
between tags
30
10
Number of visits
to each location
(10-night total)
Centroid size =
number of visited
tags per night
Centroid shift
10 m
Scale
Figure 4-29. Distribution of WaxTags® bitten by individual possum 1833 for each of 10
nights, and cumulative MCP for all nights (colour plots), with cumulative number of
visits and nightly shift of centroid (greyscale plots). Legend for colour plots is shown in
―Legend 1‖. Legend for greyscale plot is shown in ―Legend 2‖.
147
10 m
Night 1
2
3
4
5
6
7
8
9
10
Legend 1
Legend 2
Visit to tag with no food lure
1 2 3 4 5
Visit to tag with food lure
Visit by multiple individuals
20
5
Centroid (centre of mass)
1–10
Minimum convex polygon
(MCP)
MCP where bitten tag
locations are linear
MCP (cumulative over all
10 nights)
Maximum distance
between tags
30
10
Number of visits
to each location
(10-night total)
Centroid size =
number of visited
tags per night
Centroid shift
10 m
Scale
Figure 4-30. Distribution of WaxTags® bitten by individual possum 0919 for each of 10
nights, and cumulative MCP for all nights (colour plots), with cumulative number of
visits and nightly shift of centroid (greyscale plots). Legend for colour plots is shown in
―Legend 1‖. Legend for greyscale plot is shown in ―Legend 2‖.
148
10
m
Night 1
6
2
3
4
5
7
8
9
10
Legend 1
Legend 2
Visit to tag with no food lure
1 2 3 4 5
Visit to tag with food lure
Visit by multiple individuals
20
5
Centroid (centre of mass)
1–10
Minimum convex polygon
(MCP)
MCP where bitten tag
locations are linear
MCP (cumulative over all
10 nights)
Maximum distance
between tags
30
10
Number of visits
to each location
(10-night total)
Centroid size =
number of visited
tags per night
Centroid shift
10 m
Scale
Figure 4-31. Distribution of WaxTags® bitten by individual possum 4458 for each of 10
nights, and cumulative MCP for all nights (colour plots), with cumulative number of
visits and nightly shift of centroid (greyscale plots). Legend for colour plots is shown in
―Legend 1‖. Legend for greyscale plot is shown in ―Legend 2‖.
149
An overlay diagram of all 20 individuals‘ MCPs (Figure 4-32a) failed to show any distinctive
pattern of high and/or concentrated activity in the study area, while there were some
recognisable areas that showed higher activity compared to lower activity, both in a relative
sense. It was possible to recognise a faint inclination in overlap density towards the centre of
the grid in each lure types. When the MCP overlays are done separately by origin of first
bitemark i.e. whether the first bitten WaxTag® was with food lure or not (Figure 4-32b &
Figure 4-32c), it was observed bilaterally that some individual possums that initially
encountered one type of lure both showed expansion beyond areas without any WaxTags®
and biting those in the neighbouring grid with the opposite lure setting. From the patterns‘
darker, higher overlap areas there appears to be a central wedge style expansion of bitten tags
from non food-lured grid to the food-lured grid (Figure 4-32b), compared to the peripheral V
shaped expansion in the opposite direction (Figure 4-32c). A combination of Figure 4-32b &
Figure 4-32c illustrates the more homogenous distribution of MCP overlap (Figure 4-32d).
150
(a)
(b)
(c)
(d)
ssss
Degree of polygon overlap
ssss
Low
High
ssss
ssss
- All individuals
ssss
st
- No food lure on 1 night
ssss
st
- With food lure on 1 night
ssss
ssss
ssss
Figure 4-32. Overlay of all 20 identified individual possums‘
MCP plots in Figure 4-12 to
ssss
Figure 4-31, summarising individuals‘ nightly records
over
10 nights. From left to right:
ssss
(a) all individuals in greyscale, possums that visitedssss
WaxTags® (b) with no food lure, and
ssss of two lure-type initiated
(c) with food lure on first night, respectively, and overlap
groups (d). Area colour intensity levels correspond ssss
to degree of polygon overlap.
ssss
ssss
ssss
ssss
4.3.7 BMI emulation
ssss
ssss
ssdd
The emulated BMI values from all grid data for nights 3,
7 and 10 were 61.1%, 76,6% and
ddd
ddd
78.5%, respectiveley, and were positively rrelated to theddd
number of indidividuals identified
ddd
from bitemarks as summarised in Table 4-5. Positive correlation
was observed in WaxTags®
ddd
ddd
®
ddd
with and without food lure, as well as all WaxTags combined.
Figure 4-33 shows that
ddd
ddd
regression analysis of the observed number of possumsddd
with BMIs from tags with and without
ddd
ddd (r2 = 0.85–0.87).
food lure showed considerable level of positive correlation
ddd
ddd
ddd
ddd
ddd
151 ddd
ddd
ddd
ddd
ddd
Table 4-5. BMI emulation from WaxTag® grids.
Nights
All WaxTags®
BMI (%) 95% CI
No food lure
BMI (%) 95% CI
Food lure
BMI (%) 95% CI
Possums
3
61.1
8.4
47.2
8.4
75.0
9.6
18
7
76.0
6.5
66.7
9.4
85.4
5.0
19
10
78.5
6.5
69.4
10.1
87.5
4.3
20
Emulated BMI (error bars = ± 95% CI)
1.0
Night 3
Night 7
Night 10
0.5
All WaxTags
All WaxTags regression (r2 = 0.85)
No food lure
No food lure regression (r2 = 0.84)
Food lure
Food lure regression (r2 = 0.87)
0.0
18
19
20
Possum abundance
Figure 4-33. Relationship of emulated BMI with observed possum abundance.
4.4 Discussion
4.4.1 Individual identification
There were four objectives to the work presented in this Chapter. The first of these objectives
was to undertake field trials to test whether the WaxTag® methodology can allow the
152
identification of individual possums in the wild, from their bitemarks. This objective was
achieved. In this field trial, 504 bitemarks, obtained from 467 tags deployed in the field, gave
sufficient information in 3341 bitemark images to allow the identification of 20 individual
possums. To the best of my knowledge, this is the first time that this has been done for freeranging wild possums. It may, in fact, be the first time that any free-ranging wild animal
species was individualised from its bitemark in wax.
.
This new methodology has numerous possible applications, three of which address the next
three objectives of this Chapter, outlined below.
4.4.2 Multiple visits
The second objective in this Chapter was to determine the prevalence of multiple visits by
possums to WaxTags®. It was clear that possums will visit WaxTags® on multiple occasions.
There were 18 individual possums (90%) that bit more than one tag over a period of 10
nights. Clearly, therefore, WaxTags® pose a potential risk of over-estimating the prevalence
of possums from this aspect. On the other hand, there were also many incidences of individual
tags being bitten by more than one possum, in which case may a cause an under-estimation of
possum abundance. Whilst multiple visits to WaxTags® may make the direct interpretation of
its index value to the possum abundance difficult, the high probability that an individual may
bite at least one tag likely offers a highly sensitive method for determining its presence in
areas where numbers are thought to be low.
153
4.4.3 Food reward
The third objective in this Chapter was to determine if the addition of a food reward, in the
form of an icing sugar/flour mix, influences WaxTag® visitation by wild possums. It was clear
that a food reward did cause an enhanced visitation rate by wild possums. There was a
significant enhancement in the first three nights after WaxTags® were deployed. It is likely
that possums were better able to find the WaxTags® in the presence of the food reward. It is
also possible that possums that obtained a food reward at a WaxTag® site were more likely to
continue to look for, and bite, further WaxTags®. The two individual possums that bit the
most WaxTags® both obtained a food reward the first time they encountered a WaxTag®. This
finding has important implications in terms of using WaxTags® to monitor possum
populations. With a food reward present, it is likely that an over-estimation of possum
prevalence will occur. However, depending on the desired sensitivity for any particular
possum monitoring activity, the use of a food reward could be beneficial to enhance the
likelihood that possums are detected, particularly in cases where numbers are thought to be
low. This could be of particular use in Australia, at sites where possums are thought to be
locally extinct. A prominent change from the NPCA protocol 2005 version to the current
2008 version was the addition of food lure, i.e., sugar blaze to the existing visual lure. While
pre-protocol studies (e.g., Thomas et al. 2003, Thomas et al. 2004) on the WaxTag® method
used a food lure imitating the contemporary trap-catch method, concerns were raised whether
the animal‘s food reward had any effect on its behaviour, e.g., seeking more tags to interfere
with (Commins 2005). The 2005 protocol circumvented this assumed effect by using only
visual lures.
4.4.4 Further ecological information
The fourth objective in this Chapter was to investigate the utility of WaxTags® to elucidate
information about the home range, distribution, and activity patterns of individual possums. It
154
was clear that WaxTags® can be used to gain new information about the home range,
distribution and activity patterns of individual possums. In Figure 4-12 to Figure 4-31 this
type of information is given for 20 individual possums.
In summary of findings from field trials, individual identification of wild, free-ranging
possums was proven possible using the bitemarks that individuals leave on WaxTags®,
deployed within their environs. This novel methodology has many potential applications. It
was used to determine that individual possums can bite multiple WaxTags®, and multiple
possums can bite single tags. It was also used to determine that a food lure will increase the
incidence of WaxTags® being bitten. Finally, by deploying a grid of WaxTags® in the field,
information on the movement of individual possums can be obtained.
4.4.5 NPCA protocol
Although the grid arrangement setting in this study does not follow the NPCA WaxTag®
method protocol (2008a) where lines of 20 tags are set with a minimum distance of 100 m
between lines, this finding on multiple visits prevalence suggest that the protocol may need to
be further investigated and refined to function as an abundance index as suggested in the next
section.
The proportion of WaxTags® that were bitten over 3, 7 and 10 nights, i.e., the BMI as
stipulated in the NPCA protocol (2008a), was positively related to the possum abundance. A
crude regression analysis was also performed to estimate the possum population from the
emulated BMI (Figure 4-33). A high correlation value was achieved (r2 = 0.85–0.87) although
only three data-points were used and was therefore not considered a robust measure. It should
155
be reiterated that this was a very crude attempt to apply the principles of NPCA protocol in
calculating a BMI from the proportion of bitten tags to index the possum abundance, and its
significance is therefore limited and should be regarded with extreme caution.
4.4.6 Further directions
Methods to individually identify free-ranging animals have provided a valuable tool in
collecting a vast range of ecological, behavioural, demographical, and biological information
(e.g., McGregor and Peake 1998). Individualisation of field signs or traces have been
attempted in wildlife species from its calls, footprints, or genetic material contained in faeces
and hair follicles (e.g., Smallwood and Fitzhugh 1993). This study demonstrated the first case
that bitemarks on wax can be used to identify the biting animal, which has the potential to be
applied into a vast spectrum of ecological methods that need individuals to be identified.
Consultation with potential users of this method may allow for a wider scope to develop a
new application. Transfer of the identification method, also mentioned in Chapter 3, may also
be a necessary step to ensure the method is usable to other interested parties.
Furthermore, this study provided definitive evidence that multiple visits to WaxTags® do
occur, which confirms the concern of researchers who use this method to monitor possums.
The NPCA protocol (2008a) acknowledged the possibility of the phenomenon, and restricted
the interpretation of its derived BMI as an activity index. If the index is to be used as a
measure of possum abundance (Thomas et al. 2007), thorough consideration is necessary to
take the multiple visit phenomenon into account. The positive correlation between observed
possum abundance and emulated BMI does, however, suggest a possible direction for
research to refine and/or develop the method to obtain a more robust measure of abundance
from bitemarks on WaxTags®. Further studies may include comparison of population
156
abundance measures by independent methods, e.g., mark-recapture (Lancia et al. 2005) with
BMI derived from full compliance to the NPCA (2008a) protocol. Where monitoring was
done with simultaneous application of the trap-catch method and WaxTag® method in the
same habitat, a crude means to directly compare the proportion of bitten WaxTags® in the tag
line with those caught in the trap-catch line may be possible by discarding counts of those
individuals repeatedly detected on multiple tags.
Considerable labour was involved in analysing and comparing the large number of specimens.
Automation of the method may not only speed up the process, but also allow a larger sample
size to be analysed. This aspect is further discussed in Chapter 5.
Another future consideration may be to determine whether there is an upper limit to the
number of individuals that can be reliably identified from the limited examination area of
bitemarks on the wax block. In this study 20 individuals were identified, although it is not
known if the same procedure was applicable if 100 individuals were present in the study area.
157
Chapter 5
General Summary and Conclusions
5.1 Introduction
This study was centred on the core issue of using a forensic approach to identify the
individuals leaving bitemarks on the WaxTag®, a bait interference method device, to monitor
the New Zealand pest species. Chapters 1 and 2 introduced the principles with which the
WaxTag® method operates to collect information from the animals. Although the method
fundamentally depends on the ability to identify the species that interfered with the WaxTag®,
bitemarks of probable species were not defined in previous studies. The method's intrinsic
weakness lays in its unknown probability of a single individual interfering with multiple
devices, and likewise, a single device interfered with by multiple individuals. Therefore,
making an inference of population abundance from the number of WaxTags® interfered with,
or the proportion thereof, was impossible if not confounded.
One of the principle theories in identification relates closely to fields of forensic science
disciplines, i.e., forensic bitemark analysis, forensic firearm and toolmark identification. The
basic premises are that; (1) there exists features on the investigated item that is sufficiently
unique to enable assignment to a particular individual or group of individuals, and (2) the
unique features are transferred to the marked substance in a discernable characteristic form to
allow comparison of the tool against the mark, or a mark against another mark.
158
5.2 General discussions
5.2.1 Forensics
The ―striated scratch mark‖ by teeth biting into foodstuff were recognised by Solheim and
Leidal (1975) to be made by the incisal edge or ―vestibular‖ (labial) surface of the incisor
moving across the material during the biting process, similar in principle with possum incisor
edges producing striation marks on the wax surface as it moves along the surface. The method
of analysis and comparison in their work was from profiles of the striation, unlike this possum
study which was visual matching of striation marks Profile comparison of possum striation
bitemarks on wax and its casts were attempted although identification was likewise not
possible in this study, and further pursuit was abandoned. This study was the first case the
scratch mark by the incisal edge was compared and matched from its striated surfaces using a
toolmark examination approach.
A comparison microscope normally used in toolmark analysis was used in analysing and
matching impression type bitemark in cheese (Bernitz and Kloppers 2002), demonstrating an
unusual case of bitemark pattern comparison from microscopic features. This study also
focused on microscopic characteristics of the bitemarks to identify possums, although lack of
immediate access to a comparison microscope confined the observation and comparison
procedures to a computer screen. A striation match trial using an actual comparison
microscope under arrangement with a forensic laboratory may yield additional findings,
particularly in relation to the speed and ease of comparison.
5.2.2 Bitemark stability
Wear and attrition of the possum‘s incisor occlusal facet and resulting labial-occlusal facet
edge variation were most likely the causes of individuality. This raised the question of how
159
long does this variable remains stable to enable identification or how fast does it change with
time. Nicks and marks on soft tissue, e.g., sperm whale flukes, appear to be sufficiently stable
to allow reliable identification after a time span of 4.5 years (Childerhouse et al. 1996) In this
study the maximum trial time span of 10 days resulted in no observable change detected in
any individual, although the detectability of individuals beyond this time duration remains
unknown. Tooth-wear according to the possum‘s age has been evaluated on the upper left first
molar (M1; FDI:27) (Cowan and White 1989) although no study has been made on the
incisors. Diets are known to have effect on the tooth wear (Kaiser et al. 2009, Kaiser et al.
2010) and would likely to have effect on possum incisor wear depending on the population‘s
geographical and/or seasonal change in diet composition.
5.2.3 Wildlife management
Identification of individual animals allows a wide range of research methods to understand its
biology and ecology, besides estimating its abundance and distribution. This novel technique
is essentially non-invasive, enabling the detection of elusive and nocturnal individuals with
presumed minimal effect on its behaviour, especially for endangered species as its application
is not restricted to pest species. Compared to other available identification methods, this
method‘s spatial and temporal detection resolution can be easily set at a desired density: to
gather detailed information at a much higher precision than VHS/GPS collars, or to cover a
much larger area.
5.3 Study components
The current study was comprised of components illustrated in Figure 5-1, and described
below:
160
5.3.1 Species identification
The study's objective of defining bitemarks made by possums and rodents was described in
Chapter 2. Captive animals of known species were exposed to WaxTags® to collect bitemark
samples of known species. Blind measurements of tooth-mark widths from the bitemarks
showed a distinctive distribution. Tooth-mark width measurements were found useful to
define quantitatively the species responsible for the interference. Qualitative descriptions of
the species' bitemarks were also recorded, which may serve as a key to define a species from
its bitemarks.
5.3.2 Individual identification — laboratory
In Chapter 3 it was determined that under laboratory conditions, examination of microscopic
features on traces of WaxTag® interference, i.e. bitemarks, enabled individualisation of the
interfering animal. Using the novel approach of visually comparing individual characteristics
on the bitemark made in wax, it was possible to determine whether a particular bitemark was
made by the same individual animal that made another bitemark. Simulated bitemarks from
possum skulls and WaxTag® bitemarks from captive individual animals were assigned
random reference numbers to make a blind-test comparison of bitemarks from animals of
unknown (masked) identity. Although this study did not attempt to relate bitemarks to
possums i.e., identify the actual individual animal, information from identifying bitemarks
alone sufficed to conclude that the same or different unknown individual animal interfered
with one or more WaxTags®.
161
The new method is, to the best of my knowledge, the first example of successfully identifying
individuals from visually matching striations from its bitemarks. This new tool gave a means
to individually trace animals that bite WaxTags® over time or space.
5.3.3 Individual identification — field
Chapter 4 described field trials conducted to evaluate the utility of the new method. Although
no attempt was made to directly obtain any information from the wild animals, it was possible
to identify 20 groups of bitemarks on field-applied WaxTags®. This result was interpreted as
detecting 20 individual animals' bait-interference activity in the study area. Presence of the
target species in the study was confirmed by determining the species as was defined in
Chapter 2. The possum abundance was determined as a minimum of 20 live animals.
Individual identification from bitemarks by wild possums has illustrated, for the first time, the
most confounding intrinsic issues of the original WaxTag® method, i.e. multiple visits. The
previously unknown extent of multiple visits was observed spatially and temporally, the effect
of food lure on WaxTags® was determined, and activity areas were detected as minimum
convex polygons.
5.4 Conclusions
From the study components (5.2) summarised above, the following conclusions are made:
1. Measureable single tooth-mark widths and qualitatively observable characteristics
of bitemarks made by the brushtail possum, ship rat, Norway rat and mouse
defined the species that interfered with the WaxTag®. Possum tooth-mark width
measurements were significantly larger than all rodent species‘ measurements.
162
2. Microscopic observation and comparison of striation marks on bitemarks produced
under controlled laboratory environment permit individual identification of
possum bitemarks on WaxTags®.
3. Field application of this identification method makes it possible to differentiate
between individual wild possums.
4. Occurrence of multiple visits to WaxTags® by individual possums in the field was
widely varied — from extensively large number (33 tags in one night), distance
(311 m in one night), area (2.8 ha in one night) and temporal repetition (all 10
nights), to nil (one tag bitten on one night).
5. Food lure applied to the WaxTag® setup significantly increased the number of tags
bitten per night by individuals up to three nights, and showed no difference
afterwards. Presence of food lure did not significantly affect the number of
individuals detected during the study period.
6. This new method of non-invasive individual identification from bitemarks in
WaxTags® offered spatial and temporal information of the possums‘ behaviour at a
precision never achieved by any previous method, and has vast potential to
generate novel information in wild animals.
5.5 Future directions
5.5.1 Quantified identification
Quantification of identification method was attempted to mathematically compare and
evaluate similarity or correlation (Appendix G). Although attempts were made for fine-tuned
standardised image capture, the level of artefact inclusion was high. Therefore the results‘
data/noise ratio was not sufficient to allow mathematical comparison. Purpose-designed
163
image capture is necessary to investigate the method‘s potential for mathematical comparison,
and ultimately, automatic comparison.
5.5.2 Objective identification criteria
Establishment of objective criteria for identification would greatly enhance the reliability and
repeatability of identification. The subjective nature of pattern analysis in forensic science is
currently undergoing a paradigm shift to establish objective criteria which will be more robust
in its evidential value in court (Pretty and Sweet 2001a, 2010). The NAS report (2009) has
been particularly critical on the scientific basis of all identification methods except DNA
profiling, providing for a healthy stimulus to strengthen research efforts. In a broader scale,
the application of subjective traditional pattern analysis methods in this thesis raised the
intriguing question of how observers can recognise, extract and compare / identify an object.
This spills into the field of neurosensing and cognition and was not pursued in this study,
although it was felt excitingly interesting to look into.
5.5.3 Computer assisted identification
Together with research in the abovementioned topics to provide reliable methods and criteria
to quantify and identify individuals, automating the identification process through
computerised recognition has the potential to greatly enhance the efficiency by improving
accuracy and precision, increasing the ability to process a large number of specimens and
reducing labour/time costs.
Dental identification was achieved with commingled remains of Viet Nam war casualties with
assistance from Computer Assisted Postmortem Identification (CAPMI) system (Dailey 1997).
164
Similarly, Balasubramaniam et al. (2005) presented an individual identification system from
dental radiograph images. An intelligent dental identification system (IDIS) was developed by
Chomdej et al. (2006) to support dental identification from dental records, while also
accommodating incomplete and altered dental information input. In bitemark analysis, a shape
similarity index (SI) was generated from a shape comparison interactive program (SCIP) to
quantify the bitemark similarity between its biting dental cast, and was successfully used
under experimental conditions to provide the likelihood of a bitemark on skin or foodstuff to
be sourced to the biting set of teeth (Nambiar et al. 1995a, b). Naru and Dykes (1997)
attempted computerised dental–bitemark comparison from cross-correlation scores, although
have concluded that ―[the] method may have value when applied to certain mark types‖. They
also conceded that the when the transfer of dental features onto skin is not faithful enough to
replicate its details to a sufficient level, any comparison system may risk producing a false
result, which is believed to be an accurate statement regardless of an computerised or manual
comparison. Martin-de las Heras and Tafur (2011) observed that 3D image analysis of
bitemarks on wax provide a highly reliable result when the subjective decision of examiners
were forced to make a dichotomous response, and cautioned that a lower level of accuracy
could be expected if the method was applied to cutaneous bitemarks.
Likewise, many automated recognition systems have been developed with varied levels of
success in fingerprint recognition (e.g., Nyongesa et al. 2004, Meuwly 2009, Kumar and
Deva Vikram 2010, Langenburg 2011, Moses 2011), firearm and toolmark identification (e.g.,
Blackwell and Framan 1980, Geradts et al. 1995b, a, Alexandre 1996, Geradts and Keijzer
1996, Banno 2004, Banno et al. 2004, 2005, Roberge and Beauchamp 2006, Senin et al.
2006, Brinck 2008, Hamby et al. 2009), and wildlife identification (e.g., Burghardt et al.
2004b, Gope et al. 2005, Burghardt and Ćalić 2006, Burghardt and Campbell 2007, Anderson
et al. 2010), with some systems available commercially.
165
Adaptation of 3D laser scanning techniques to this study‘s bitemark surface on wax, as was
successfully done in bullet striation marks (Bachrach et al. 2010), may eliminate the need to
make a cast or apply standardised illumination, which was necessary in this study to visualise
3D features on a 2D image format. The applicability to the bitemark‘s concave surface as
opposed to the bullet‘s convex surface remains unknown.
5.5.4 Other applications of WaxTags®
The WaxTag® is a passive non-toxic detection device that poses no potential harm to target or
non-target animals. Therefore the non-invasive technique can target protected species if
discernable characteristics can be identified from the animal's interference, or for other target
pest species where it shares the habitat with a protected species.
Provided the collected data type, detectability and other assumptions are met, individually
identified animal occurrences can be used to measure its abundance e.g., (Efford 2004, Efford
et al. 2004, Efford et al. 2009), pattern and spatial analysis (Rangel et al. 2006, Rangel et al.
2010, Rosenberg and Anderson 2011). Home range studies, behaviour studies may also make
use of WaxTags® and enhance its findings from individual identification of the biter. Output
oriented field sampling design will further allow for a wide range of spatial analysis of
individual detection (Perry et al. 2002).
166
Chapter 1
WaxTag® operational principles
and forensic science
Chapter 2
Species identification
WaxTag® as a
monitoring tool
Chapter 3
Individual identification
— laboratory
Chapter 4
Individual identification
— field
Key Outputs





Single tooth-mark widths defined possum and rodent species' bitemarks.
Striation on bitemarks produced under laboratory environment enabled individual
identification of possum bitemarks
Individual wild possums were identified from field-applied WaxTags®.
Widely varied occurrences of multiple visits to WaxTags® by individual possums
were proven.
Although food lure significantly increased the number of tags bitten per night by
individuals up to three nights, no difference was observed afterwards, nor did it
increase the sensitivity to detect more individuals.
Figure 5-1. Relationship between study components, and the key outputs.
167
5.6 Contribution to knowledge
The question of identifying individual pest animals from bitemarks on WaxTags® to monitor
the species was addressed in this thesis by defining the interfering species‘ bitemarks, and
developing a novel method to identify individual animals from characteristics found on the
bitemarks. Although initially the bait interference method arose from the need to understand
the population abundance, particularly in wildlife management, the main approach used to
identify the individual characteristics were from the domain of forensic science from which
principles of individual identification were applied.
Interestingly, the forensic science disciplines are currently undergoing a major shift to review
the scientific foundations of what was previously assumed as a fact, e.g., the infallibility of
fingerprint identification or firearm identification (NAS 2009). Although this research used
the traditional cognitive method of pattern analysis and matching, the results add to empirical
evidence that the identification principles are useful to reliably identify individuals.
Conducting further research using cross-disciplinary approaches in this direction may advance
knowledge in both domains by identifying and strengthening the gaps in the methods and
their application.
168
References
Animal Welfare Act 1999. Public Act 1999 No 142. Statues of New Zealand.
Aboshi, H., J. A. Taylor, T. Takei and K. A. Brown. 1994. Comparison of bitemarks in
foodstuffs by computer imaging: a case report. The Journal of Forensic OdontoStomatology 12:41-44.
Abrams, J. L., D. A. McEntee, A. M. Paterson, S. C. Ogilvie, D. N. McLane and K. L.
Campbell. 2004. A comparative assessment of lures for the possum (Trichosurus
vulpecula). Lincoln University Contract Report, (unpubl.), Lincoln, N.Z. 17 p.
Acevedo, M. A., C. J. Corrada-Bravo, H. Corrada-Bravo, L. J. Villanueva-Rivera and T. M.
Aide. 2009. Automated classification of bird and amphibian calls using machine
learning: a comparison of methods. Ecological Informatics 4:206-214.
Adams, B. J. 2003. The diversity of adult dental patterns in the United States and the
implications for personal identification. Journal of Forensic Sciences 48:497-503.
von Ahn, L., M. Blum, N. Hopper and J. Langford. 2003. CAPTCHA: Using hard AI
problems for security. In: E. Biham (ed.) Advances in cryptology — EUROCRYPT
2003: International Conference on the Theory and Apploications of Cryptographic
Techniques, Warsaw, Poland, May 2003, Proceedings. 294-311. Springer, Berlin.
von Ahn, L., B. Maurer, C. McMillen, D. Abraham and M. Blum. 2008. reCAPTCHA:
human-based character recognition via web security measures. Science 321:14651468.
Aksu, M. N. and J. P. Gobetti. 1996. The past and present legal weight of bite marks as
evidence. The American Journal of Forensic Medicine and Pathology 17:136-140.
Al-Diri, B., A. Hunter, D. Steel and M. Habib. 2010. Automated analysis of retinal vascular
network connectivity. Computerized Medical Imaging and Graphics 34:462-470.
Al-Talabani, N., N. D. Al-Moussawy, F. A. Baker and H. A. Mohammed. 2006. Digital
analysis of experimental human bitemarks: application of two new methods. Journal
of Forensic Sciences 51:1372-1375.
Alberink, I. B. and A. C. C. Ruifrok. 2007. Performance of the FearID earprint identification
system. Forensic Science International 166:145-154.
Alexandre, G. 1996. Computerized classification of the shoeprints of burglars' soles. Forensic
Science International 82:59-65.
Allen, A., B. Golden, M. Taylor, D. Patterson, D. Henriksen and R. Skuce. 2008. Evaluation
of retinal imaging technology for the biometric identification of bovine animals in
Northern Ireland. Livestock Science 116:42-52.
Allen, L. R., R. Engeman and H. Krupa. 1996. Evaluation of three relative abundance indices
for assessing dingo populations. Wildlife Research 23:197-206.
American Board of Forensic Odontology. 1997. ABFO guidelines and standards. In: C. M.
Bowers and G. L. Bell (eds.) Manual of forensic odontology. 299-357. American
Society of Forensic Odontology, Saratoga Springs, N.Y.
169
Anderson, C. J. R., J. D. Roth and J. M. Waterman. 2007. Can whisker spot patterns be used
to identify individual polar bears? Journal of Zoology 273:333-339.
Anderson, C. J. R., N. D. V. Lobo, J. D. Roth and J. M. Waterman. 2010. Computer-aided
photo-identification system with an application to polar bears based on whisker spot
patterns. Journal of Mammalogy 91:1350-1359.
Articus, K., J.-E. Mattsson, L. Tibell, M. Grube and M. Wedin. 2002. Ribosomal DNA and tubulin data do not support the separation of the lichens Usnea florida and U.
subfloridana as distinct species. Mycological Research 106:412-418.
Arulchelvam, I. M. and J. A. Brown. 1995. The relative accuracy, precision, and costeffectiveness of the bait-consumption and bait-interference monitoring techniques.
Landcare Research Contract Report LC9495/159, (unpubl.), Lincoln, N.Z. 8 p.
Arzoumanian, Z., J. Holmberg and B. Norman. 2005. An astronomical pattern-matching
algorithm for computer-aided identification of whale sharks Rhincodon typus. Journal
of Applied Ecology 42:999-1011.
Association of Firearm and Tool Mark Examiners. 1992. Theory of identification, range of
striate comparison reports and modified glossary definitions - an AFTE Criteria for
Identification Commitee report. Association of Firearm and Tool Mark Examiners
Journal 24:336-340.
Association of Firearm and Tool Mark Examiners. 1998. Theory of identification as it relates
to toolmarks. Association of Firearm and Tool Mark Examiners Journal 30:86-88.
Association of Firearm and Toolmark Examiners Training and Standardization Committee.
2001. Glossary of the Association of Firearm and Tool Mark Examiners, 4th edition.
Auger-Méthé, M. and H. Whitehead. 2007. The use of natural markings in studies of longfinned pilot whales (Globicephala melas). Marine Mammal Science 23:77-93.
Avon, S.-L., C. Victor, J. T. Mayhall and R. E. Wood. 2010. Error rates in bite mark analysis
in an in vivo animal model. Forensic Science International 201:45-55.
Bachrach, B., A. Jain, S. Jung and R. D. Koons. 2010. A statistical validation of the
individuality and repeatability of striated tool marks: screwdrivers and tongue and
groove pliers. Journal of Forensic Sciences 55:348-357.
Baker, A. N., A. N. H. Smith and F. B. Pichler. 2002. Geographical variation in Hector's
dolphin: recognition of new subspecies of Cephalorhynchus hectori. Journal of the
Royal Society of New Zealand 32:713-727.
Baker, C. S., F. Cipriano and S. R. Palumbi. 1996. Molecular genetic identification of whale
and dolphin products from commercial markets in Korea and Japan. Molecular
Ecology 5:671-685.
Baker, C. S., D. Steel, Y. Choi, H. Lee, K. S. Kim, S. K. Choi, Y.-U. Ma, C. Hambleton, L.
Psihoyos, R. L. Brownell and N. Funahashi. 2010. Genetic evidence of illegal trade in
protected whales links Japan with the US and South Korea. Biology Letters 6:647-650.
Balasubramaniam, S. R., G. V. Kumar, R. A. Narayanan, S. Raju, A. Banumathi and A.
Kannammal. 2005. Person identification by matching dental images. In: Proceedings
of the International Conference on Cognition and Recognition. 857-862. P E S College
of Engineering, Maysore, India.
170
Baldi, P., S. Brunak, Y. Chauvin, C. A. F. Andersen and H. Nielsen. 2000. Assessing the
accuracy of prediction algorithms for classification: an overview. Bioinformatics
16:412-424.
Bamford, J. 1970. Evaluating opossum poisoning operations by interference with non-toxic
baits. Proceedings of the New Zealand Ecological Society 17:118-125.
Banno, A. 2004. Estimation of bullet striation similarity using neural networks. Journal of
Forensic Sciences 49:500-504.
Banno, A., T. Masuda and K. Ikeuchi. 2004. Three dimensional visualization and comparison
of impressions on fired bullets. Forensic Science International 140:233-240.
Banno, A., T. Masuda and K. Ikeuchi. 2005. Forensic retrieval of striations on fired bullets by
using 3D geometric data. IAPR Conference on Machine Vision Applications
(MVA2005), May 2005.
Bashir, K., T. Xiang and S. Gong. 2010. Gait recognition without subject cooperation. Pattern
Recognition Letters 31:2052-2060.
Batcheler, C. L., J. H. Darwin and L. T. Pracy. 1967. Estimation of opposum (Trichosurus
vulpecula) populations and results of poison trials from trapping data. New Zealand
Journal of Science 10:97-114.
Bearman, R. 2002. Wax blocks: developing an alternative possum monitoring method.
Internal Department of Conservation Report TWIAO-12415, (unpubl.), Wellington,
N.Z. 27 p.
Beausoleil, N. J., D. J. Mellor and K. J. Stafford. 2004. Methods for marking New Zealand
wildlife: amphibians, reptiles and marine mammals. Department of Conservation,
Wellington, N.Z. 147 p.
Beier, P. and S. C. Cunningham. 1996. Power of track surveys to detect changes in cougar
populations. Wildlife Society Bulletin 24:540-546.
Bernitz, H. and B. A. Kloppers. 2002. Comparison microscope identification of a cheese
bitemark: a case report. The Journal of Forensic Odonto-Stomatology 20:13-16.
Bernitz, H., W. F. P. van Heerden, T. Solheim and J. H. Owen. 2006. A technique to capture,
analyze, and quantify anterior teeth rotations for application in court cases involving
tooth marks. Journal of Forensic Sciences 51:624-629.
Bernstein, M. L. 2005. Nature of bitemarks. In: R. B. J. Dorion (ed.) Bitemark evidence. 5980. Marcel Dekker, New York.
Besana, J. L. and T. L. Rogers. 2010. Personal identification using the frontal sinus. Journal
of Forensic Sciences 55:584-589.
Bianucci, G., B. Sorce, T. Storai and W. Landini. 2010. Killing in the Pliocene: shark attack
on a dolphin from Italy. Palaeontology 53:457-470.
Biasotti, A. A. 1959. A statistical study of the individual characteristics of fired bullets.
Journal of Forensic Sciences 4:34-50.
Biasotti, A. A. and J. Murdock. 1984. "Criteria for identification" or "state of the art" of
firearm and toolmark identification. Association of Firearm and Tool Mark Examiners
Journal 16:16-24.
171
Biasotti, A. A. 1989. Methods applied to the comparison of class and individual
characteristics in firearms and toolmark identification. Association of Firearm and
Tool Mark Examiners Journal 21:260-263.
Bishara, S. E., J. R. Jakobsen, J. E. Treder and M. J. Stasl. 1989. Changes in the maxillary and
mandibular tooth size–arch length relationship from early adolescence to early
adulthood : a longitudinal study. American Journal of Orthodontics and Dentofacial
Orthopedics 95:46-59.
Bishara, S. E., P. Khadivi and J. R. Jakobsen. 1995. Changes in tooth size–arch length
relationships from the deciduous to the permanent dentition: a longitudinal study.
American Journal of Orthodontics and Dentofacial Orthopedics 108:607-613.
Black, N. A., A. Schulman-Janiger, R. L. Ternullo and M. Guerrero-Ruiz. 1997. Killer whales
of California and Western Mexico: a photograph catalog of photo-identified
individuals. NOAA Technical Memorandum NMFS NOAA-TM-NMFS-SWFSC-247,
NOAA. 174 p.
Blackwell, G. L., M. A. Potter and J. A. McLennan. 2002. Rodent density indices from
tracking tunnels, snap-traps and Fenn traps: do they tell the same story? New Zealand
Journal of Ecology 26:43-51.
Blackwell, R. and E. Framan. 1980. Automated firearms identification system (AFIDS):
Phase I. Association of Firearm and Tool Mark Examiners Journal 12:11-37.
Blackwell, S. A., R. V. Taylor, I. Gordon, C. L. Ogleby, T. Tanijiri, M. Yoshino, M. R.
Donald and J. G. Clement. 2007. 3-D imaging and quantitative comparison of human
dentitions and simulated bite marks. International Journal of Legal Medicine 121:917.
Bodziak, W. J. 2005a. Forensic footwear evidence. In: S. H. James and J. J. Nordby (eds.)
Forensic science: an introduction to scientific and investigative techniques. 361-376.
CRC Press, Boca Raton, Fla.
Bodziak, W. J. 2005b. Forensic tire impression and tire track evidence. In: S. H. James and J.
J. Nordby (eds.) Forensic science: an introduction to scientific and investigative
techniques. 377-390. CRC Press, Boca Raton, Fla.
Boersen, M. R., J. D. Clark and T. L. King. 2003. Estimating black bear population density
and genetic diversity at Tensas River, Louisiana using microsatellite DNA markers.
Wildlife Society Bulletin 31:197-207.
Bollongino, R., J. Burger and S. Hummel. 2003. DNA typing from elephant tusks and
rhinoceros horn - Strategies and applications in wildlife conservation and animal
forensics. Forensic Science International 136:374-375.
Bookhout, T. A., (ed.) 1994. Research and management techniques for wildlife and habitats,
5th edition. The Wildlife Society, Bethesda. 740 p.
Borgula, L. M., F. G. Robinson, M. Rahimi, K. E. Chew, K. R. Birchmeier, S. G. Owens, J.
A. Kieser and G. R. Tompkins. 2003. Isolation and genotypic comparison of oral
streptococci from experimental bitemarks. The Journal of Forensic OdontoStomatology 21:23-30.
Bouchrika, I., M. Goffredo, J. Carter and M. Nixon. 2011. On using gait in forensic
biometrics. Journal of Forensic Sciences 56:882-889.
172
Bowers, C. M. 1997. Determining age from teeth: the estimation of age from dental
development. In: C. M. Bowers and G. L. Bell (eds.) Manual of forensic odontology.
74-85. American Society of Forensic Odontology, Saratoga Springs, N.Y.
Bowers, C. M. and R. J. Johansen. 2002. Photographic evidence protocol: the use of digital
imaging methods to rectify angular distortion and create life size reproductions of bite
mark evidence. Journal of Forensic Sciences 47:178-185.
Bowers, C. M. 2006. Problem-based analysis of bitemark misidentifications: the role of DNA.
Forensic Science International 159:S104-S109.
Bowers, C. M. 2008. Compelling cases for change. Science 320:1722-1722.
Bowers, C. M. and I. A. Pretty. 2009. Expert disagreement in bitemark casework. Journal of
Forensic Sciences 54:915-918.
Bowers, C. M. and G. L. Bell, (eds.) 1997. Manual of forensic odontology, 3rd edition.
American Society of Forensic Odontology, Saratoga Springs. 357 p.
Brinck, T. B. 2008. Comparing the performance of IBIS and BulletTRAX-3D technology
using bullets fired through 10 consecutively rifled barrels. Journal of Forensic
Sciences 53:677-682.
Brown, C. G. and W. W. Bryant. 1995. Consecutively rifled gun barrels present in most crime
labs. Association of Firearm and Tool Mark Examiners Journal 27:254-258.
Brown, J. A. and M. D. Thomas. 2000. Residual trap-catch methodology for low-density
possum populations. Part 1, Improving the precision of possum population density
estimates. Research report no. UCDMS2000/6, University of Canterbury. Dept. of
Mathematics and Statistics, Christchurch, N.Z. 29 p.
Brown, J. A., R. J. McAuliffe and G. J. Hickling. 2004. A new trap-catch index of patchiness
in animal distribution. Wildlife Research 31:433-436.
Brown, K. P., H. Moller, J. Innes and N. Alterio. 1996. Calibration of tunnel tracking rates to
estimate relative abundance of ship rats (Rattus rattus) and mice (Mus musculus) in a
New Zealand forest. New Zealand Journal of Ecology 20:271-275.
Brown, T. and G. N. Rutty. 2005. Identification: prints, footprint. In: J. Payne-James, R. W.
Byard, T. S. Corey and C. Henderson (eds.) Encyclopedia of forensic and legal
medicine. 013-018. Elsevier, Amsterdam.
Brundage, D. J. 1998. The identification of consecutively rifled gun barrels. Association of
Firearm and Tool Mark Examiners Journal 30:438-444.
Burghardt, T., J. Ćalić and B. T. Thomas. 2004a. Tracking animals in wildlife videos using
face detection. European Workshop on the Integration of Knowledge, Semantics and
Digital Media Technology, 2004. EWIMT 2004.
Burghardt, T., B. Thomas, P. J. Barham and J. Ćalić. 2004b. Automated visual recognition of
individual African penguins. Fifth International Penguin Conference, Ushuaia, Tierra
del Fuego, Argentina, September 2004, Ushuaia, Tierra del Fuego, Argentina.
Burghardt, T. and J. Ćalić. 2006. Analysing animal behaviour in wildlife videos using face
detection and tracking. IEEE Proceedings - Vision, Image, and Signal Processing
153:305-312.
173
Burghardt, T. and N. Campbell. 2007. Individual animal identification using visual biometrics
on deformable coat patterns. In: Proceedings of the 5th International Conference on
Computer Vision Systems. University Library of Bielefeld.
Bush, M. A., H. I. Cooper and R. B. J. Dorion. 2010a. Inquiry into the scientific basis for
bitemark profiling and arbitrary distortion compensation. Journal of Forensic Sciences
55:976-983.
Bush, M. A., K. Thorsrud, R. G. Miller, R. B. J. Dorion and P. J. Bush. 2010b. The response
of skin to applied stress: investigation of bitemark distortion in a cadaver model.
Journal of Forensic Sciences 55:71-76.
Bush, M. A., P. J. Bush and H. D. Sheets. 2011a. Statistical evidence for the similarity of the
human dentition. Journal of Forensic Sciences 56:118-123.
Bush, M. A., P. J. Bush and H. D. Sheets. 2011b. A study of multiple bitemarks inflicted in
human skin by a single dentition using geometric morphometric analysis. Forensic
Science International 211:1-8.
Byers, R. E. 1981. Field method for evaluation of rodenticides for control of Microtus
pinetorum in apple orchards. In: E. W. Schafer, Jr. and C. R. Walker (eds.) Vertebrate
pest control and management materials: proceedings of the Third Symposium on Test
Mehods for Vertebrate Pest Control and Management Materials. 77-85. American
Society for Testing and Materials, Philadelphia.
Carey, P. W., C. O'Connor, R. M. McDonald and L. R. Matthews. 1997. Comparison of the
attractiveness of acoustic and visual stimuli for brushtail possums. New Zealand
Journal of Zoology 24:273-276.
Casanova-Rosado, J. F., C. E. Medina-Solis, A. A. Vallejos-Sanchez, A. J. Casanova-Rosado,
G. Maupome and L. Avila-Burgos. 2005. Dental attrition and associated factors in
adolescents 14 to 19 years of age: a pilot study. International Journal of
Prosthodontics 18:516-519.
Cattaneo, C. and D. De Angelis. 2009. Visual recognition systems in identification. In: A.
Jamieson and A. A. Moenssens (eds.) Wiley encyclopedia of forensic science. John
Wiley & Sons, Ltd, New York.
Caughley, G. 1977a. Analysis of vertebrate populations. Wiley, London. 234 p.
Caughley, G. 1977b. Sampling in aerial survey. Journal of Wildlife Management 41:605-615.
Caughley, G. and A. R. E. Sinclair. 1994. Wildlife ecology and management. Blackwell
Scientific Publications, Boston. 334 p.
Ceugniet, M. and A. Izumi. 2004. Vocal individual discrimination in Japanese monkeys.
Primates 45:119-128.
Chattah, N. L.-T. and P. Smith. 2006. Variation in occlusal dental wear of two Chalcolithic
populations in the southern Levant. American Journal of Physical Anthropology
130:471-479.
Chen, C., J. Liang and X. Zhu. 2011. Gait recognition based on improved dynamic Bayesian
networks. Pattern Recognition 44:988-995.
Cheng, J., Y. Sun and L. Ji. 2010. A call-independent and automatic acoustic system for the
individual recognition of animals: a novel model using four passerines. Pattern
Recognition 43:3846-3852.
174
Chesmore, E. D. and E. Ohya. 2004. Automated identification of field-recorded songs of four
British grasshoppers using bioacoustic signal recognition. Bulletin of Entomological
Research 94:319-330.
Chew, M. and H. S. Baird. 2003. BaffleText: a human interactive proof. In: T. Kanungo, E.
H. B. Smith, J. Hu and P. B. Kantor (eds.) Document Recognition and Retrieval X,
Santa Clara, CA, USA, 20 January 2003, Proceedings. 305-316. SPIE.
Childerhouse, S. J., S. M. Dawson and E. Slooten. 1996. Stability of fluke marks used in
individual photoidentification of male sperm whales at Kaikoura, New Zealand.
Marine Mammal Science 12:447-451.
Chomdej, T., W. Pankaow and S. Choychumroon. 2006. Intelligent dental identification
system (IDIS) in forensic medicine. Forensic Science International 158:27-38.
Christchurch City Council. 2003. Bottle Lake Forest Park fact sheet. Christchurch City
Council, Christchurch.
Clout, M. and K. Ericksen. 2000. Anatomy of a disastrous success: the brushtail possum as an
invasive species. In: T. L. Montague (ed.) The brushtail possum: biology, impact and
management of an introduced marsupial. 1-9. Manaaki Whenua Press, Lincoln, N.Z.
Cole, S. A. 2009. Forensics without uniqueness, conclusions without individualization: the
new epistemology of forensic identification. Law, Probability and Risk 8:233-255.
Coleman, J. and P. Caley. 2000. Possums as a reservoir of bovine Tb. In: T. L. Montague
(ed.) The brushtail possum: biology, impact and management of an introduced
marsupial. 92-104. Manaaki Whenua Press, Lincoln, N.Z.
Commins, P. 2005. Possum monitoring report: Matea WaxTag trial. Commins Enterprises,
(unpubl.).
Committee on Identifying the Needs of the Forensic Science Community and National
Academy of Sciences. 2009. Strengthening forensic science in the United States: a
path forward. National Academies Press, Washington, D.C.
Conner, M. C., R. F. Labisky and D. R. Progulske, Jr. 1983. Scent-station indices as measure
of population abundance for bobcats, raccoons, gray foxes, and opossums. Wildlife
Society Bulletin 11:146-152.
Cooper, J. E. and M. E. Cooper. 1998. Future trends in forensic veterinary medicine.
Seminars in Avian and Exotic Pet Medicine 7:210-217.
Corbett, M. E. and D. Spence. 1984. A forensic investigation of teeth marks in soap. British
Dental Journal 157:270-271.
Cork, D. L., J. E. Rolph, E. S. Meieran and C. V. Petrie, (eds.) 2008. Ballistic imaging.
National Academies Press, Washington, D.C. 322 p.
Cowan, E. J. and R. Koppl. 2011. An experimental study of blind proficiency tests in forensic
science. The Review of Austrian Economics 24:251-271.
Cowan, P. 2000. Biological control of possums: prospects for the future. In: T. L. Montague
(ed.) The brushtail possum: biology, impact and management of an introduced
marsupial. 262-270. Manaaki Whenua Press, Lincoln, N.Z.
Cowan, P. E. and A. J. White. 1989. Evaluation of a tooth-wear age index for brushtail
possums, Trichosurus vulpecula. Australian Wildlife Research 16:321-322.
175
Cowan, P. E. 1990. Brushtail possum. In: C. M. King (ed.) The handbook of New Zealand
mammals. 68-98. Oxford University Press, Auckland, N.Z.
Coward, R. C. 2007. The stability of lip pattern characteristics over time. The Journal of
Forensic Odonto-Stomatology 25:40-56.
Cunado, D., M. S. Nixon and J. N. Carter. 2003. Automatic extraction and description of
human gait models for recognition purposes. Computer Vision and Image
Understanding 90:1-41.
Curran, J. M. and T. N. Hicks. 2009. Glass evidence: Bayesian approach to. In: A. Jamieson
and A. A. Moenssens (eds.) Wiley encyclopedia of forensic science. John Wiley &
Sons, Ltd, New York.
Cuthbert, R. 2003. Sign left by introduced and native predators feeding on Hutton's
shearwaters Puffinus huttoni. New Zealand Journal of Zoology 30:163-170.
Dailey, J. C. 1997. Computer assisted identification of vietnam war dental remains. In: C. M.
Bowers and G. L. Bell (eds.) Manual of forensic odontology. 227-231. American
Society of Forensic Odontology, Saratoga Springs, N.Y.
Dailey, J. C. 2005. The comparison. In: R. B. J. Dorion (ed.) Bitemark evidence. 423-451.
Marcel Dekker, New York.
Dailey, M. N. and G. W. Cottrell. 1999. Organization of face and object recognition in
modular neural network models. Neural Networks 12:1053-1074.
Daugman, J. 2009. How iris recognition works. In: A. C. Bovik (ed.) The essential guide to
image processing (second edition). 715-739. Academic Press, Boston.
Davis, D. E. and R. L. Winstead. 1980. Estimating the numbers of wildlife populations. In: S.
D. Schemnitz (ed.) Wildlife management techniques manual. 221-245. The Wildlife
Society, Washington, D.C.
Davis, J. E. 1958. An introduction to tool marks, firearms and the striagraph. Charles C.
Thomas, Springfield (Illinois). 282 p.
Day, T., C. O'Connor and L. Matthews. 2000. Possum social behaviour. In: T. L. Montague
(ed.) The brushtail possum: biology, impact and management of an introduced
marsupial. 35-46. Manaaki Whenua Press, Lincoln, N.Z.
De Barba, M., L. P. Waits, E. O. Garton, P. Genovesi, E. Randi, A. Mustoni and C. Groff.
2010. The power of genetic monitoring for studying demography, ecology and
genetics of a reintroduced brown bear population. Molecular Ecology 19:3938-3951.
De Kinder, J., P. Prévot, M. Pirlot and B. Nys. 1998. Surface topology of bullet striations: an
innovating technique. Association of Firearm and Tool Mark Examiners Journal
30:294-299.
Deedrick, D. W. and S. L. Koch. 2004. Microscopy of hair part II: a practical guide and
manual for animal hairs. Forensic Science Communications 6.
Deinet, W. 1981. Studies of models of striated marks generated by random processes. Journal
of Forensic Sciences 26:35-50.
Deng, W., J. Hu, J. Guo, W. Cai and D. Feng. 2010. Emulating biological strategies for
uncontrolled face recognition. Pattern Recognition 43:2210-2223.
176
Dessimoz, D. and C. Champod. 2008. Linkages between biometrics and forensic science. In:
A. K. Jain, P. Flynn and A. A. Ross (eds.) Handbook of biometrics. 425-459. Springer
US, New York.
DeVore, D. T. 1971. Bite marks for identification? — A preliminary report. Medicine,
Science, and the Law 11:144-145.
DeYoung, R. W. and R. L. Honeycutt. 2005. The molecular toolbox: genetic techniques in
wildlife ecology and management. Journal of Wildlife Management 69:1362-1384.
Dinsmore, S. J. and D. H. Johnson. 2005. Population analysis in wildlife biology. In: C. E.
Braun (ed.) Techniques for wildlife investigations and management. 154-184. The
Wildlife Society, Bethesda.
Drennan, J. E., P. Beier and N. L. Dodd. 1998. Use of track stations to index abundance of
sciurids. Journal of Mammalogy 79:352-359.
Dror, I. E. 2005. Perception is far from perfection: the role of the brain and mind in
constructing realities. Brain and Behavioural Sciences 28:763-763.
Dror, I. E., A. E. Péron, S.-L. Hind and D. Charlton. 2005. When emotions get the better of
us: the effect of contextual top-down processing on matching fingerprints. Applied
Cognitive Psychology 19:799-809.
Dror, I. E. and D. Charlton. 2006. Why experts make errors. Journal of Forensic
Identification 56:600-616.
Dror, I. E., D. Charlton and A. E. Péron. 2006. Contextual information renders experts
vulnerable to making erroneous identifications. Forensic Science International
156:74-78.
Dror, I. E. 2009. On proper research and understanding of the interplay between bias and
decision outcomes. Forensic Science International 191:e17-e18.
Dror, I. E. and S. A. Cole. 2010. The vision in "blind" justice: expert perception, judgment,
and visual cognition in forensic pattern recognition. Psychonomic Bulletin & Review
17:161-167.
Dror, I. E., C. Champod, G. Langenburg, D. Charlton, H. Hunt and R. Rosenthal. 2011.
Cognitive issues in fingerprint analysis: inter- and intra-expert consistency and the
effect of a 'target' comparison. Forensic Science International 208:10-17.
Du Pasquier, E., J. Hebrard, P. Margot and M. Ineichen. 1996. Evaluation and comparison of
casting materials in forensic sciences: applications to tool marks and foot/shoe
impressions. Forensic Science International 82:33-43.
Dutton, G. 2009. Firearms: bullet and cartridge case identification. In: A. Jamieson and A. A.
Moenssens (eds.) Wiley encyclopedia of forensic science. John Wiley & Sons, Ltd,
New York.
Efford, M. 2004. Density estimation in live-trapping studies. Oikos 106:598-610.
Efford, M. G., D. K. Dawson and C. S. Robbins. 2004. DENSITY: software for analysing
capture-recapture data from passive detector arrays. Animal Biodiversity and
Conservation 27:217-228.
Efford, M. G., D. L. Borchers and A. E. Byrom. 2009. Density estimation by spatially explicit
capture-recapture: likelihood-based methods. In: D. L. Thomson, E. G. Cooch and M.
177
J. Conroy (eds.) Modeling demographic processes in marked populations. 255-269.
Springer, New York.
Ekdahl, M. O., B. L. Smith and D. F. L. Money. 1970. Tuberculosis in some wild and feral
animals in New Zealand. New Zealand Veterinary Journal 18:44-45.
Erickson, G. M. and K. H. Olson. 1996. Bite marks attributable to Tyrannosaurus rex:
preliminary description and implications. Journal of Vertebrate Paleontology 16:175178.
Everhart, M. J. 2005. Bite marks on an elasmosaur (Sauropterygia; Plesiosauria) paddle from
the Niobrara Chalk (Upper Cretaceous) as probable evidence of feeding by the
lamniform shark, Cretoxyrhina mantelli. Vertebrate Palaeontology 2:14-24.
Everhart, M. J. 2009. A bitten skull of Tylosaurus kansasensis (Squamata: Mosasauridae) and
a review of mosasaur-on-mosasaur pathology in the fossil record. Transactions of the
Kansas Academy of Science 111:251-262.
Faden, D., J. A. Kidd, J. Craft, L. S. Chumbley, M. D. Morris, L. J. Genalo and e. al. 2007.
Statistical confirmation of empirical observations concerning tool mark striae.
Association of Firearm and Tool Mark Examiners Journal 39:205-214.
Fageth, R., W. G. Allen and U. Jäger. 1996. Fuzzy logic classification in image processing.
Fuzzy Sets and Systems 82:265-278.
Frank, L. G. 1986. Social organization of the spotted hyaena (Crocuta crocuta). I.
Demography. Animal Behaviour 34:1500-1509.
Franklin, D. 2010. Forensic age estimation in human skeletal remains: Current concepts and
future directions. Legal Medicine 12:1-7.
Fraser, K. W., J. A. Brown and B. Warburton. 2002. Vector (possum and ferret) population
monitoring: a review. Landcare Research Contract Report LC0203/040, (unpubl.),
Lincoln, N.Z. 48 p.
Freeman, R. A. 1978. Consecutively rifled polygon barrels. Association of Firearm and Tool
Mark Examiners Journal 10:40-42.
Garrett, B. L. and P. J. Neufeld. 2009. Invalid forensic science testimony and wrongful
convictions. Virginia Law Review 95. 97 p.
Geradts, Z. J. M. H., J. Keijzer and I. Keereweer. 1995a. A new approach to automatic
comparison of striation marks. In: B. Jacob and W. Bonte (eds.) Advances in forensic
sciences - Proceedings of the 13th Meeting of the IAFS, Düsseldorf 1993. 266-269.
Verlag Dr. Köster, Berlin.
Geradts, Z. J. M. H., J. Keijzer and I. Keereweer. 1995b. Automatic comparison of striation
marks and automatic classification of shoe prints. In: L. I. Rudin and S. K. Bramble
(eds.) Investigative and trial image processing. 151-164. The International Society for
Optical Engineering (SPIE), San Diego.
Geradts, Z. J. M. H. and J. Keijzer. 1996. TRAX for toolmarks. Association of Firearm and
Tool Mark Examiners Journal 28:183-190.
Gilmore, D. P. 1966. Studies on the biology of Trichosurus vulpecula Kerr. Thesis, Doctor of
Philosophy. University of Canterbury, Christchurch. 300 p.
Glass, R. T. 2002. Body identification by forensic dental means. General Dentistry 50:34-38.
178
Glass, R. T. 2005. Forensic odontology. In: S. H. James and J. J. Nordby (eds.) Forensic
science: an introduction to scientific and investigative techniques. 79-98. CRC Press,
Boca Raton, Fla.
Goddard, K. 2011. Wildlife forensic science. In: A. Mozayani and C. Noziglia (eds.) The
forensic laboratory handbook: procedures and practice. 563-579. Humana Press, New
York.
González-Colmenares, G., M. C. Botella-López, G. Moreno-Rueda and J. R. FernándezCardenete. 2007. Age estimation by a dental method: a comparison of Lamendin's and
Prince & Ubelaker's technique. Journal of Forensic Sciences 52:1156-1160.
Gonzalez-Rodriguez, J., J. Fiérrez-Aguilar, J. Ortega-Garcia and J. J. Lucena-Molina. 2006.
Biometric identification in forensic cases according to the Bayesian approach. In: M.
Tistarelli, J. Bigun and A. K. Jain (eds.) Biometric Authentication. 177-185. Springer
Berlin / Heidelberg, Berlin.
Gonzalez, R. C. and R. E. Woods. 2002. Digital image processing, 2nd edition. Prentice Hall,
Upper Saddle River. 793 p.
Gope, C., N. Kehtarnavaz, G. Hillman and B. Würsig. 2005. An affine invariant curve
matching method for photo-identification of marine mammals. Pattern Recognition
38:125-132.
Gowans, S. and H. Whitehead. 2001. Photographic identification of northern bottlenose
whales (Hyperoodon ampullatus): sources of heterogeneity from natural marks.
Marine Mammal Science 17:76-93.
Graham, E. A. M. 2009. DNA: an overview. In: A. Jamieson and A. A. Moenssens (eds.)
Wiley encyclopedia of forensic science. John Wiley & Sons, Ltd, New York.
Green, W. Q. 1984. A review of ecological studies relevant to management of the common
brushtail possum. In: A. P. Smith and I. D. Hume (eds.) Possums and gliders. 483-499.
Surrey Beatty in association with The Australian Mammal Society, Chipping Norton,
Australia.
Grigione, M. M., P. Burman, V. C. Bleich and B. M. Pierce. 1999. Identifying individual
mountain lions Felis concolor by their tracks: refinement of an innovative technique.
Biological Conservation 88:25-32.
Grzybowski, R., J. Miller, B. Moran, J. Murdock, R. Nichols and R. Thompson. 2003.
Firearm/toolmark identification: passing the reliability test under federal and state
evidentiary standards. Association of Firearm and Tool Mark Examiners Journal
35:209-241.
Hall, E. E. 1983. Bullet markings from consecutively rifled Shilen DGA barrels. Association
of Firearm and Tool Mark Examiners Journal 15:33-53.
Hall, J. 1992. Consecutive cuts by bolt cutters and their effect on identification. Association of
Firearm and Tool Mark Examiners Journal 24:260-272.
Hall, L. J. and E. Player. 2008. Will the introduction of an emotional context affect fingerprint
analysis and decision-making? Forensic Science International 181:36-39.
Haltenorth, T. and H. Diller. 1980. A field guide to mammals of Africa including Madagascar.
Collins, London.
179
Hamby, J. E. and J. W. Thorpe. 1999. The history of firearm and toolmark identification.
Association of Firearm and Tool Mark Examiners Journal 31:266-284.
Hamby, J. E., D. J. Brundage and J. W. Thorpe. 2009. The identification of bullets fired from
10 consecutively rifled 9mm Ruger pistol barrels: a research project involving 507
participants from 20 countries. Association of Firearm and Tool Mark Examiners
Journal 41:99-110.
Hamby, J. E. 2010. The examination of bullets fired from 10 consecutively manufactured
9 mm barrels — A project involving 502 participants from 20 countries. Science &
Justice 50:30-30.
Harari, D., G. Hermolin and O. Harari. 2005. The effect of age on morphology and eruption
of the lower incisors in mature rats. Archives of Oral Biology 50:953-958.
Harvey, W., P. Millington, J. C. Barbenel and J. H. Evans. 1976. Experimental human bitemarks. In: W. Harvey (ed.) Dental identification and forensic odontology. 124-135.
Kimpton, London.
Hay, J. R. 1981. The kokako. Forest Bird Research Group, Wellington. 168 p.
Haynes, G. 1983. A guide for differentiating mammalian carnivore taxa responsible for gnaw
damage to herbivore limb bones. Paleobiology 9:164-172.
Hayward, W. G., G. Rhodes and A. Schwaninger. 2008. An own-race advantage for
components as well as configurations in face recognition. Cognition 106:1017-1027.
Herzog, C. J., R. W. Kays, J. C. Ray, M. E. Gompper and W. J. Zielinski. 2007. Using
patterns in track-plate footprints to identify individual fishers. Journal of Wildlife
Management 71:955-963.
Hewett, D. and E. Banks. 1999. Bottle Lake Forest Park management plan. Christchurch City
Council, Christchurch.
Hodge, E. E. 1988. Guarding against error. Association of Firearm and Tool Mark Examiners
Journal 20:290-293.
Hoffman, K. L. and N. K. Logothetis. 2009. Cortical mechanisms of sensory learning and
object recognition. Philosophical Transactions of the Royal Society B: Biological
Sciences 364:321-329.
Howitt, D., F. Tulleners, K. Cebra and S. Chen. 2008. A calculation of the theoretical
significance of matched bullets. Journal of Forensic Sciences 53:868-875.
Hueske, E. E. 2011. Firearms and toolmarks. In: A. Mozayani and C. Noziglia (eds.) The
forensic laboratory handbook: procedures and practice. 227-264. Humana Press, New
York.
Hunter, A. E. 2004. An assessment of visual lures for the possum Trichosurus vulpecula.
Thesis, Master of Applied Science. Lincoln University, Lincoln, N.Z. 57 p.
Innes, J. G. 1990. Ship rat. In: C. M. King (ed.) The handbook of New Zealand mammals.
206-225. Oxford University Press, Auckland, N.Z.
Jackson, M. 2009. Firearm examination: ballistics. In: A. Jamieson and A. A. Moenssens
(eds.) Wiley encyclopedia of forensic science. John Wiley & Sons, Ltd, New York.
180
Jane, G. T. 1979. Opposum density assessment using the bait interference method. New
Zealand Journal of Forestry 24:61-66.
Jane, G. T. 1981. Application of the Poisson model to the bait interference method of possum
Trichosurus vulpecula assessment. In: B. D. Bell (ed.) Proceedings of the First
Symposium on Marsupials in New Zealand. 185-195. Zoology Publications from the
Victoria Univeristy of Wellington, Wellington, N.Z.
Janson, G., P. V. P. Oltramari-Navarro, R. B. S. de Oliveira, C. L. Quaglio, S. H. d. C. SalesPeres and B. Tompson. 2010. Tooth-wear patterns in subjects with Class II Division 1
malocclusion and normal occlusion. American Journal of Orthodontics and
Dentofacial Orthopedics 137:14.e11-14.e17.
Jewell, Z. C., S. K. Alibhai and P. R. Law. 2001. Censusing and monitoring black rhino
(Diceros bicornis) using an objective spoor (footprint) identification technique.
Journal of Zoology 254:1-16.
Ji, W., C. R. Veitch and J. L. Craig. 1999. An evaluation of the efficiency of rodent trapping
methods: the effect of trap arrangement, cover type, and bait. New Zealand Journal of
Ecology 23:45-51.
Johnson, T. L. 2005. The suspect. In: R. B. J. Dorion (ed.) Bitemark evidence. 415-421.
Marcel Dekker, New York.
Jolly, G. M. 1969. Sampling methods for aerial census of wildlife populations. East African
Agricultural and Forestry Journal (special issue) 34:46-49.
Kaiser, T. M., J. Brasch, J. C. Castell, E. Schulz and M. Clauss. 2009. Tooth wear in captive
wild ruminant species differs from that of free-ranging conspecifics. Mammalian
Biology - Zeitschrift für Säugetierkunde 74:425-437.
Kaiser, T. M., J. Fickel, W. J. Streich, J. Hummel and M. Clauss. 2010. Enamel ridge
alignment in upper molars of ruminants in relation to their natural diet. Journal of
Zoology 281:12-25.
Kannikeswaran, N. and D. Kamat. 2009. Mammalian bites. Clinical Pediatrics 48:145-148.
Katona, S. K., P. M. Harcourt, J. S. Perkins and S. D. Kraus. 1980. Humpback whales: a
catalogue of individuals identified by fluke photographs, 2nd edition. College of the
Atlantic, Bar Harbor. 169 p.
Katterwe, H. 2009. Toolmarks. In: A. Jamieson and A. A. Moenssens (eds.) Wiley
encyclopedia of forensic science. John Wiley & Sons, Ltd, New York.
Kauffman, E. G. 2009. Mosasaur predation on Upper Cretaceous nautiloids and ammonites
from the United States Pacific coast. Palaios 19:96-100.
Kavermann, M. J. 2004. Increasing the attractiveness of WaxTags® to possums (Trichosurus
vulpecula) using visual and olfactory lures. Thesis, Bachelor of Science with Honours.
Lincoln University, Lincoln, N.Z. 47 p.
Kelly, M. J. 2001. Computer-aided photograph matching in studies using individual
identification: an example from Serengeti cheetahs. Journal of Mammalogy 82:440449.
Kenna, J., M. Smyth, L. McKenna, C. Dockery and S. D. McDermott. 2011. The recovery
and persistence of salivary DNA on human skin. Journal of Forensic Sciences 56:170175.
181
Kennedy, D. 2011. Forensic dentistry and microbial analysis of bite marks. Australian Police
Journal 2011:6-15.
Kevin Zhou, S., R. Chellappa and N. Ramanathan. 2009. Unconstrained face recognition from
a single image. In: A. C. Bovik (ed.) The essential guide to image processing (second
edition). 677-713. Academic Press, Boston.
Kiely, T. F. 2005. Forensic evidence. In: S. H. James and J. J. Nordby (eds.) Forensic science:
an introduction to scientific and investigative techniques. 649-666. CRC Press, Boca
Raton, Fla.
Kieser, J. A., H. T. Groeneveld and C. B. Preston. 1985. Patterns of dental wear in the Lengua
Indians of Paraguay. American Journal of Physical Anthropology 66:21-29.
Kieser, J. A. and H. T. Groeneveld. 1987a. A metric analysis of Cercopithecus aethiops
dentition. International Journal of Primatology 8:261-280.
Kieser, J. A. and H. T. Groeneveld. 1987b. Static intraspecific allometry of jaws and teeth in
Cercopithecus aethiops. Journal of Zoology 212:499-510.
Kieser, J. A. and H. T. Groeneveld. 1988a. Allometric relations of teeth and jaws in man.
American Journal of Physical Anthropology 77:57-67.
Kieser, J. A. and H. T. Groeneveld. 1988b. Patterns of metric variability in the dentition of
Papio ursinus. American Journal of Primatology 14:141-151.
Kieser, J. A. and H. T. Groeneveld. 1989a. Patterns of sexual dimorphism and of variability in
the dentition of Otolemur crassicaudatus. International Journal of Primatology
10:137-147.
Kieser, J. A. and H. T. Groeneveld. 1989b. Allocation and discrimination based on human
odontometric data. American Journal of Physical Anthropology 79:331-337.
Kieser, J. A., N. A. Firth and H. Buckley. 2001. Dental misidentification on the basis of
presumed unique features. The Journal of Forensic Odonto-Stomatology 19:36-39.
Kieser, J. A. 2005. Weighing bitemark evidence: a postmodern perspective. Forensic Science,
Medicine, and Pathology 1:75-80.
Kieser, J. A., G. Tompkins, D. Buckingham, N. A. Firth and M. Swain. 2005. Bitemarks:
presentation, analysis, and evidential reliability. In: M. Tsokos (ed.) Forensic
pathology reviews. 157-179. Humana Press, Totowa.
Kieser, J. A., V. Bernal, J. N. Waddell and S. Raju. 2007. The uniqueness of the human
anterior dentition: a geometric morphometric analysis. Journal of Forensic Sciences
52:671-677.
Kim, Y.-K., H. S. Kho and K. H. Lee. 2000. Age estimation by occlusal tooth wear. Journal
of Forensic Sciences 45:303-309.
Kindelan, J. D., G. Rysiecki and W. P. Childs. 1998. Hypodontia: genotype or environment?
A case report of monozygotic twins. British Journal of Orthodontics 25:175-178.
King, C. M. and R. L. Edgar. 1977. Techniques for trapping and tracking stoats (Mustela
erminea); a review, and a new system. New Zealand Journal of Zoology 4:193-212.
King, C. M., (ed.) 1990. The handbook of New Zealand mammals. Oxford University Press,
Auckland, N.Z. 600 p.
182
King, C. M. and P. Barrett, (eds.) 2005. The handbook of New Zealand mammals, 2nd edition.
Oxford University Press, Melbourne. 610 p.
Kittelson, J. M., J. A. Kieser, D. M. Buckingham and G. P. Herbison. 2002. Weighing
evidence: quantitative measures of the importance of bitemark evidence. The Journal
of Forensic Odonto-Stomatology 20:31-37.
Kovach, A. I., M. K. Litvaitis and J. A. Litvaitis. 2003. Evaluation of fecal mtDNA analysis
as a method to determine the geographic distribution of a rare lagomorph. Wildlife
Society Bulletin 31:1061-1065.
Kumar, R. and B. R. Deva Vikram. 2010. Fingerprint matching using multi-dimensional
ANN. Engineering Applications of Artificial Intelligence 23:222-228.
Lancia, R. A., J. D. Nichols and K. H. Pollock. 1994. Estimating the number of animals in
wildlife populations. In: T. A. Bookhout (ed.) Research and management techniques
for wildlife and habitats. 215-253. The Wildlife Society, Bethesda.
Lancia, R. A., W. L. Kendall, K. H. Pollock and J. D. Nichols. 2005. Estimating the number
of animals in wildlife populations. In: C. E. Braun (ed.) Techniques for wildlife
investigations and management. 106-153. The Wildlife Society, Bethesda.
Lange, N. D., R. P. Thomas, J. Dana and R. M. Dawes. 2011. Contextual biases in the
interpretation of auditory evidence. Law and Human Behavior 35:178-187.
Langenburg, G. 2009. Friction ridge skin: comparison and identification. In: A. Jamieson and
A. A. Moenssens (eds.) Wiley encyclopedia of forensic science. John Wiley & Sons,
Ltd, New York.
Langenburg, G. 2011. Scientific research in the forensic discipline of friction ridge
individualization. In: Scientific Working Group on Friction Ridge Analysis Study and
Technology and National institute of Justice (eds.) SWGFAST - The fingerprint
sourcebook. 1-31. Scientific Working Group on Friction Ridge Analysis, Study and
Technology, Washington, D.C.
Lasser, A. J., A. J. Warnick and G. M. Berman. 2009. Three-dimensional comparative
analysis of bitemarks. Journal of Forensic Sciences 54:658-661.
Laws, R. M. 1966. Age criteria for the African elephant, Loxodonta a. africana. East African
Wildlife Journal 4:1-37.
Layton, J. J. 1966. Identification from a bite mark in cheese. Journal of the Forensic Science
Society 6:76-80.
Lewin, C. and A. Herlitz. 2002. Sex differences in face recognition—Women's faces make the
difference. Brain and Cognition 50:121-128.
Lewison, R., E. L. Fitzhugh and S. P. Galentine. 2001. Validation of a rigorous track
classification technique: identifying individual mountain lions. Biological
Conservation 99:313-321.
Linhart, S. B. and F. F. Knowlton. 1975. Determining the relative abundance of coyotes by
scent station lines. Wildlife Society Bulletin 3:119-124.
Litonjua, L. A., S. Andreana, P. J. Bush and R. E. Cohen. 2003. Tooth wear: attrition, erosion,
and abrasion. Quintessence International 34:435-446.
183
Lovelock, T. J. 2009. Glass. In: A. Jamieson and A. A. Moenssens (eds.) Wiley encyclopedia
of forensic science. John Wiley & Sons, Ltd, New York.
Lukacs, P. M. and K. P. Burnham. 2005. Estimating population size from DNA-based closed
capture-recapture data incorporating genotyping error. Journal of Wildlife
Management 69:396-403.
Lukoschek, V., N. Funahashi, S. Lavery, M. L. Dalebout, F. Cipriano and C. S. Baker. 2009.
High proportion of protected minke whales sold on Japanese markets is due to illegal,
unreported or unregulated exploitation. Animal Conservation 12:385-395.
Lynch, Á. B., M. J. F. Brown and J. M. Rochford. 2006. Fur snagging as a method of
evaluating the presence and abundance of a small carnivore, the pine marten (Martes
martes). Journal of Zoology 270:330-339.
Lynnerup, N. and J. Vedel. 2005. Person identification by gait analysis and photogrammetry.
Journal of Forensic Sciences 50:112-118.
Lyver, P. O. B. 2000. Identifying mammalian predators from bite marks: a tool for focusing
wildlife protection. Mammal Review 30:31-44.
MacFarlane, T. W., D. G. MacDonald and D. A. Sutherland. 1974. Statistical problems in
dental identification. Journal of the Forensic Science Society 14:247-252.
MacKenzie, D. I., J. A. Royle, J. A. Brown and J. D. Nichols. 2004. Occupancy estimation
and modeling for rare and elusive species. In: W. L. Thompson (ed.) Sampling rare or
elusive species: concepts, designs, and techniques for estimating population
parameters. 149-172. Island Press, Washington, D.C.
Maiden, N. R. 2009. Firearms: scene investigation. In: A. Jamieson and A. A. Moenssens
(eds.) Wiley encyclopedia of forensic science. John Wiley & Sons, Ltd, New York.
Manaaki Whenua - Landcare Research. 1997. Soil map of Christchurch City. Manaaki
Whenua - Landcare Research, Lincoln, N.Z.
Manjunath, B. C., B. R. Chandrashekar, M. Mahesh and R. M. Vatchala Rani. 2011. DNA
Profiling and forensic dentistry — A review of the recent concepts and trends. Journal
of Forensic and Legal Medicine 18:191-197.
Martin-de las Heras, S., A. Valenzuela, A. J. Valverde, J. C. Torres and J. D. Luna-delCastillo. 2007. Effectiveness of comparison overlays generated with DentalPrint©
software in bite mark analysis. Journal of Forensic Sciences 52:151-156.
Martin-de las Heras, S. and D. Tafur. 2009. Comparison of simulated human dermal
bitemarks possessing three-dimensional attributes to suspected biters using a
proprietary three-dimensional comparison. Forensic Science International 190:33-37.
Martin-de las Heras, S. and D. Tafur. 2011. Validity of a dichotomous expert response in
bitemark analysis using 3-D technology. Science & Justice 51:24-27.
Masson, J. J. 1997. Confidence level variations in firearms identifications through
computerized technology. Association of Firearm and Tool Mark Examiners Journal
29:42-44.
Matty, W. 1985. A comparison of three individual barrels produced from one button rifled
barrel blank. Association of Firearm and Tool Mark Examiners Journal 17:64-69.
184
McGlinchy, A. and B. Warburton. 2000. Review of the potential of wax-blocks and Feratox®
cyanide pellets as an alternative to traps for monitoring possum populations. Landcare
Research Contract Report LC9899/93, (unpubl.), Lincoln, N.Z. 12 p.
McGregor, P. K. and T. Peake. 1998. The role of individual identification in conservation
biology. In: T. M. Caro (ed.) Behavioral ecology and conservation biology. 31-55.
Oxford University Press, New York.
McKenna, C. J., M. L. Haron, K. A. Brown and A. J. Jones. 2000. Bitemarks in chocolate: a
case report. The Journal of Forensic Odonto-Stomatology 18:10-14.
Meekan, M. G., C. J. A. Bradshaw, M. Press, C. McLean, A. Richards, S. Quasnichka and J.
G. Taylor. 2006. Population size and structure of whale sharks Rhincodon typus at
Ningaloo Reef, Western Australia. Marine Ecology-Progress Series 319:275-285.
Meijerman, L., A. Thean and G. J. R. Maat. 2009. Earprints: interpretation of. In: A. Jamieson
and A. A. Moenssens (eds.) Wiley encyclopedia of forensic science. John Wiley &
Sons, Ltd, New York.
Meuwly, D. 2009. Automated fingerprint identification system. In: A. Jamieson and A. A.
Moenssens (eds.) Wiley encyclopedia of forensic science. John Wiley & Sons, Ltd,
New York.
Miller, J. and M. McLean. 1998. Criteria for identification of toolmarks. Association of
Firearm and Tool Mark Examiners Journal 30:15-61.
Miller, J. 2001. An examination of the application of the conservative criteria for
identification of striated toolmarks using bullets fired from ten consecutively rifled
barrels. Association of Firearm and Tool Mark Examiners Journal 33:125-132.
Miller, R. G., P. J. Bush, R. B. J. Dorion and M. A. Bush. 2009. Uniqueness of the dentition
as impressed in human skin: a cadaver model. Journal of Forensic Sciences 54:909914.
Montague, T. L. and B. Warburton. 2000. Non-toxic techniques for possum control. In: T. L.
Montague (ed.) The brushtail possum: biology, impact and management of an
introduced marsupial. 164-174. Manaaki Whenua Press, Lincoln, N.Z.
Moors, P. J. 1990. Norway rat. In: C. M. King (ed.) The handbook of New Zealand mammals.
192-206. Oxford University Press, Auckland, N.Z.
Morgan, D. and G. Hickling. 2000. Techniques used for poisoning possums. In: T. L.
Montague (ed.) The brushtail possum: biology, impact and management of an
introduced marsupial. 143-153. Manaaki Whenua Press, Lincoln, N.Z.
Morgano, S. M., P. Milot, P. Ducharme and L. Rose. 1995. Ability of various impression
materials to produce duplicate dies from successive impressions. The Journal of
Prosthetic Dentistry 73:333-340.
Moses, K. R. 2011. Automated Fingerprint Identification System (AFIS). In: Scientific
Working Group on Friction Ridge Analysis Study and Technology and National
institute of Justice (eds.) SWGFAST - The fingerprint sourcebook. 1-33. Scientific
Working Group on Friction Ridge Analysis, Study and Technology, Washington, D.C.
Moss, C. J. 1983. Oestrous behaviour and female choice in the African elephant. Behaviour
86:167-196.
185
Moss, C. J. 1996. Getting to know a population. In: K. Kangwana (ed.) Studying elephants.
58-74. African Wildlife Foundation, Nairobi.
Mowat, G. and D. Paetkau. 2002. Estimating marten Martes americana population size using
hair capture and genetic tagging. Wildlife Biology 8:201-209.
Murdock, J. E. 1981. A general discussion of gun barrel individuality and an empirical
assessment of the individuality of consecutively button rifled .22 caliber rifle barrels.
Association of Firearm and Tool Mark Examiners Journal 13:84-95.
Murie, O. J. 1954. A field guide to animal tracks. Houghton Mifflin, Boston. 374 p.
Murmann, D. C., P. C. Brumit, B. A. Schrader and D. R. Senn. 2006. A comparison of animal
jaws and bite mark patterns. Journal of Forensic Sciences 51:846-860.
Murphy, E. C. and C. R. Pickard. 1990. House mouse. In: C. M. King (ed.) The handbook of
New Zealand mammals. 225-242. Oxford University Press, Auckland, N.Z.
Murphy, E. C. and J. E. Dowding. 1995. Ecology of the stoat in Nothofagus forest: Home
range, habitat use and diet at different stages of the beech mast cycle. New Zealand
Journal of Ecology 19:97-109.
Nambiar, P., T. E. Bridges and K. A. Brown. 1995a. Quantitative forensic evaluation of bite
marks with the aid of a shape analysis computer program: Part 1; The development of
"SCIP" and the similarity index. The Journal of Forensic Odonto-Stomatology 13:1825.
Nambiar, P., T. E. Bridges and K. A. Brown. 1995b. Quantitative forensic evaluation of bite
marks with the aid of a shape analysis computer program: Part 2; "SCIP" and bite
marks in skin and foodstuffs. The Journal of Forensic Odonto-Stomatology 13:26-32.
Naru, A. S. and E. Dykes. 1996. The use of a digital imaging technique to aid bite mark
analysis. Science & Justice 36:47-50.
Naru, A. S. and E. Dykes. 1997. Digital image cross-correlation technique for bite mark
investigations. Science & Justice 37:251-258.
National Possum Control Agencies. 2004. Protocol for possum population monitoring using
the trap-catch method, 3rd version edition. National Possum Control Agencies,
Wellington, N.Z. 30 p.
National Possum Control Agencies. 2005. Protocol for low-density possum monitoring using
the WaxTag® method. National Possum Control Agencies, Wellington, N.Z. 22 p.
National Possum Control Agencies. 2008a. Protocol for low-density possum monitoring using
the WaxTag® method. National Possum Control Agencies, Wellington, N.Z. 21 p.
National Possum Control Agencies. 2008b. Protocol for possum population monitoring using
the trap-catch method. National Possum Control Agencies, Wellington, N.Z. 34 p.
Nelson, K. J., N. Bowman-Fowler, S. R. Berkowitz and E. F. Loftus. 2009. Eyewitness
testimony. In: A. Jamieson and A. A. Moenssens (eds.) Wiley encyclopedia of
forensic science. John Wiley & Sons, Ltd, New York.
Neufeld, P. J. and B. C. Scheck. 2010. Making forensic science more scientific. Nature
464:351-351.
186
Norton-Griffiths, M. 1975. Counting animals. Handbook - Serengeti Ecological Monitoring
Programme No. 1, African Wildlife Leadership Foundation, Nairobi. 110 p.
Norton, D. 2000. Benefits of possum control for native vegetation. In: T. L. Montague (ed.)
The brushtail possum: biology, impact and management of an introduced marsupial.
232-240. Manaaki Whenua Press, Lincoln, N.Z.
Nouvellet, P., C. D. Buesching, H. L. Dugdale, C. Newman and D. W. Macdonald. 2011.
Mouthing off about developmental stress: individuality of palate marking in the
European badger and its relationship with juvenile parasitoses. Journal of Zoology
283:52-62.
Nugent, G., P. Sweetapple, J. Coleman and P. Suisted. 2000. Possum feeding patterns: dietary
tactics of a reluctant folivore. In: T. L. Montague (ed.) The brushtail possum: biology,
impact and management of an introduced marsupial. 10-19. Manaaki Wheuna Press,
Lincoln, N.Z.
Nyongesa, H. O., S. Al-Khayatt, S. M. Mohamed and M. Mahmoud. 2004. Fast robust
fingerprint feature extraction and classification. Journal of Intelligent & Robotic
Systems 40:103-112.
Ogilvie, S. C., M. D. Thomas, H. Fitzgerald and D. R. Morgan. 1996. Sodium
monofluoroacetate (1080) bait-shyness in a wild brushtail possum (Trichosurus
vulpecula) population. Proceedings of the New Zealand Plant Protection Conference
49:143-146.
Ogilvie, S. C., M. D. Thomas, G. A. Morriss, D. R. Morgan and C. T. Eason. 2000.
Investigation of sodium monofluoroacetate (1080) bait shyness in wild brushtail
possum (Trichosurus vulpecula) populations. International Journal of Pest
Management 46:77-80.
Ogilvie, S. C., A. M. Paterson, J. G. Ross and M. D. Thomas. 2006a. Improving techniques
for the Waxtag® possum (Trichosurus vulpecula) monitoring index. New Zealand
Plant Protection 59:28-33.
Ogilvie, S. C., K. Sakata, M. D. Thomas and F. Maddigan. 2006b. Novel visual lures for the
management of brushtail possums. In: R. M. Timm and J. M. O'Brien (eds.)
Proceedings of the Twenty-Second Vertebrate Pest Conference, (VPC-2006). March
6-9, 2006. Berkeley CA, arranged by the Vertebrate Pest Conference. 479-482.
University of California, Davis, Davis.
Oltramari-Navarro, P. V. P., G. Janson, R. B. S. de Oliveira, C. L. Quaglio, J. F. Castanha
Henriques, S. H. de Carvalho Sales-Peres and J. A. McNamara, Jr. 2010. Tooth-wear
patterns in adolescents with normal occlusion and Class II Division 2 malocclusion.
American Journal of Orthodontics and Dentofacial Orthopedics 137:730.e731730.e735.
Otis, D. L., K. P. Burnham, G. C. White and D. R. Anderson. 1978. Statistical inference from
capture data on closed animal populations. Wildlife Monographs No. 62, The Wildlife
Society, Washington, D.C. 135 p.
Page, M., J. Taylor and M. R. B. Blenkin. 2011. Uniqueness in the forensic identification
sciences — Fact or fiction? Forensic Science International 206:12-18.
187
Palma, A. R. T. and R. Gurgel-Gonçalves. 2007. Morphometric identification of small
mammal footprints from ink tracking tunnels in the Brazilian Cerrado. Revista
Brasileira De Zoologia 24:333-343.
Payton, I. 2000. Damage to native forests. In: T. L. Montague (ed.) The brushtail possum:
biology, impact and management of an introduced marsupial. 111-125. Manaaki
Whenua Press, Lincoln, N.Z.
Perry, J. N., A. M. Liebhold, M. S. Rosenberg, J. Dungan, M. Miriti, A. Jakomulska and S.
Citron-Pousty. 2002. Illustrations and guidelines for selecting statistical methods for
quantifying spatial pattern in ecological data. Ecography 25:578-600.
Peterson, T. and E. F. Loftus. 2009. Memory: reconstructive. In: A. Jamieson and A. A.
Moenssens (eds.) Wiley encyclopedia of forensic science. John Wiley & Sons, Ltd,
New York.
Preatoni, D. G., M. Nodari, R. Chirichella, G. Tosi, L. A. Wauters and A. Martinoli. 2005.
Identifying bats from time-expanded recordings of search calls: comparing
classification methods. Journal of Wildlife Management 69:1601-1614.
Pretty, I. A. and D. Sweet. 2001a. The scientific basis for human bitemark analyses - a critical
review. Science & Justice 41:85-92.
Pretty, I. A. and D. Sweet. 2001b. Digital bite mark overlays - an analysis of effectiveness.
Journal of Forensic Sciences 46:1385-1391.
Pretty, I. A. and M. D. Turnbull. 2001. Lack of dental uniqueness between two bite mark
suspects. Journal of Forensic Sciences 46:1487-1491.
Pretty, I. A., R. J. Pretty, B. R. Rothwell and D. Sweet. 2003. The reliability of digitized
radiographs for dental identification: a web-based study. Journal of Forensic Sciences
48:1325-1330.
Pretty, I. A. 2005a. Unresolved issues in bitemark analysis. In: R. B. J. Dorion (ed.) Bitemark
evidence. 547-563. Marcel Dekker, New York.
Pretty, I. A. 2005b. Reliability of bitemark evidence. In: R. B. J. Dorion (ed.) Bitemark
evidence. 531-545. Marcel Dekker, New York.
Pretty, I. A. and D. Sweet. 2010. A paradigm shift in the analysis of bitemarks. Forensic
Science International 201:38-44.
Rahimi, M., N. C. K. Heng, J. A. Kieser and G. R. Tompkins. 2005. Genotypic comparison of
bacteria recovered from human bite marks and teeth using arbitrarily primed PCR.
Journal of Applied Microbiology 99:1265-1270.
Rangel, T. F., J. A. F. Diniz-Filho and L. M. Bini. 2010. SAM: a comprehensive application
for spatial analysis in macroecology. Ecography 33:46-50.
Rangel, T. F. L. V. B., J. A. F. Diniz-Filho and L. M. Bini. 2006. Towards an integrated
computational tool for spatial analysis in macroecology and biogeography. Global
Ecology and Biogeography 15:321-327.
Ratz, H. 1997. Identification of footprints of some small mammals. Mammalia 61:431-441.
Ratz, H., H. Moller and D. Fletcher. 1999. Predator identification from bite marks on penguin
and albatross chicks. Marine Ornithology 27:149-156.
188
Rawson, R. D., R. K. Ommen, G. Kinard, J. Johnson and A. Yfantis. 1984. Statistical
evidence for the individuality of the human dentition. Journal of Forensic Sciences
29:245-253.
Rawson, R. D., G. L. Vale, E. E. Herschaft, N. D. Sperber and S. Dowell. 1986. Analysis of
photographic distortion in bite marks: a report of the Bite Mark Guidelines
Committee. Journal of Forensic Sciences 31:1261-1268.
Reed, J. E., R. J. Baker, W. B. Ballard and B. T. Kelly. 2004. Differentiating Mexican gray
wolf and coyote seats using DNA analysis. Wildlife Society Bulletin 32:685-692.
Reid, B. 1983. Kiwis and possums, traps and baits. Fur Facts 4:17-26.
Reisser, J., M. Proietti, P. Kinas and I. Sazima. 2008. Photographic identification of sea
turtles: method description and validation, with an estimation of tag loss. Endangered
Species Research 5:73-82.
van Rijsbergen, C. J. 1979. Information retrieval, 2nd edition. Butterworths, London. 208 p.
Roberge, D. and A. Beauchamp. 2006. The use of BulletTRAX-3DTM in a a study of
consecutively manufactured barrels. Association of Firearm and Tool Mark Examiners
Journal 38:166-172.
Robertson, H. A. and B. D. Heather. 1999. The hand guide to the birds of New Zealalnd.
Penguin Books, Auckland.
Rollins, C. E. and D. E. Spencer. 1995. A fatality and the American mountain lion: bite mark
analysis and profile of the offending lion. Journal of Forensic Sciences 40:486-489.
Rosenberg, M. S. and C. D. Anderson. 2011. PASSaGE: Pattern Analysis, Spatial Statistics
and Geographic Exegesis. Version 2. Methods in Ecology and Evolution 2:229-232.
Roughton, R. D. and M. W. Sweeny. 1982. Refinements in scent-station methodology for
assessing trends in carnivore populations. Journal of Wildlife Management 46:217229.
Ruifrok, A. C. C. 2009. Facial comparison. In: A. Jamieson and A. A. Moenssens (eds.)
Wiley encyclopedia of forensic science. John Wiley & Sons, Ltd, New York.
Saks, M. J. 1994. Implications of the Daubert test for forensic identification science.
Shepard's Expert and Scientific Evidence Quarterly 1:427-434.
Saks, M. J., D. M. Risinger, R. Rosenthal and W. C. Thompson. 2003. Context effects in
forensic science: a review and application of the science of science to crime laboratory
practice in the United States. Science & Justice 43:77-90.
Saks, M. J. and J. J. Koehler. 2005. The coming paradigm shift in forensic identification
science. Science 309:892-895.
Saks, M. J. and J. J. Koehler. 2008. The individualization fallacy in forensic science evidence.
Vanderblit Law Review 61:199-219.
Salmon, J. T. 1968. Field guide to the alpine plants of New Zealand. Reed, Wellington. 326 p.
Santoro, V., G. Smaldone, P. Lozito, M. Smaldone and F. Introna. 2011. A forensic approach
to fatal dog attacks. A case study and review of the literature. Forensic Science
International 206:e37-e42.
189
Sargeant, G. A., D. H. Johnson and W. E. Berg. 1998. Interpreting carnivore scent-station
surveys. Journal of Wildlife Management 62:1235-1245.
Sargeant, G. A., D. H. Johnson and W. E. Berg. 2003. Sampling designs for carnivore scentstation surveys. Journal of Wildlife Management 67:289-298.
Schroeder, M. A. and L. A. Robb. 2005. Criteria for gender and age. In: C. E. Braun (ed.)
Techniques for wildlife investigations and management. 303-338. The Wildlife
Society, Bethesda.
Seber, G. A. F. 1982. The estimation of animal abundance and related parameters, 2nd
edition. Charles Griffin, London. 654 p.
Senin, N., R. Groppetti, L. Garofano, P. Fratini and M. Pierni. 2006. Three-dimensional
surface topography acquisition and analysis for firearm identification. Journal of
Forensic Sciences 51:282-295.
Sharma, S., Y. Jhala and V. B. Sawarkar. 2005. Identification of individual tigers (Panthera
tigris) from their pugmarks. Journal of Zoology 267:9-18.
Siemers, B. M. and G. Kerth. 2006. Do echolocation calls of wild colony-living Bechstein's
bats (Myotis bechsteinii) provide individual-specific signatures? Behavioral Ecology
and Sociobiology 59:443-454.
da Silva, R. H. A., J. de Oliveira Musse, R. F. H. Melani and R. N. Oliveira. 2006. Human
bite mark identification and DNA technology in forensic dentistry. Brazilian Journal
of Oral Sciences 5:1193-1197.
Silvy, N. J., R. R. Lopez and M. J. Peterson. 2005. Wildlife marking techniques. In: C. E.
Braun (ed.) Techniques for wildlife investigations and management. 339-376. The
Wildlife Society, Bethesda.
Simon, A., H. Jordan and K. Pforte. 1974. Successful identification of a bitemark in a
sandwich. International Journal of Forensic Dentistry 2:17-21.
Simsik, D., V. Porada, A. Galajdova and Z. Dolna. 2010. Experimental gait parameters
analysis for identification purposes in criminalistics. Science & Justice 50:37-37.
Singh, R. P. and H. R. Aggarwal. 1984. Identification of wires and the cutting tool by
scanning electron microscope. Forensic Science International 26:115-121.
Skolrood, R. W. 1975. Comparison of bullets fired from consecutively rifled Cooey .22
calibre barrels. Journal of the Canadian Society of Forensic Science 8:49-52.
Smallwood, K. S. and E. L. Fitzhugh. 1993. A rigorous technique for identifying individual
mountain lions Felis concolor by their tracks. Biological Conservation 65:51-59.
Sognnaes, R. F., R. D. Rawson, B. M. Gratt and N. B. Nguyen. 1982. Computer comparison
of bitemark patterns in identical twins. Journal of the American Dental Association
105:449-451.
Solheim, T. and T. I. Leidal. 1975. Scanning electron microscopy in the investigation of bite
marks in foodstuffs. Forensic Science 6:205-215.
Solheim, T. 1993. A new method for dental age estimation in adults. Forensic Science
International 59:137-147.
190
Souviron, R. R. 2005. Animal bites. In: R. B. J. Dorion (ed.) Bitemark evidence. 275-291.
Marcel Dekker, New York.
Speed, C. W., M. G. Meekan and C. J. A. Bradshaw. 2007. Spot the match - wildlife photoidentification using information theory. Frontiers in Zoology 4:(11).
Speed, C. W., M. G. Meekan, D. Rowat, S. J. Pierce, A. D. Marshall and C. J. A. Bradshaw.
2008. Scarring patterns and relative mortality rates of Indian Ocean whale sharks.
Journal of Fish Biology 72:1488-1503.
Spurr, E. B. 1994. Bait interference for measuring relative possum abundance. Landcare
Research Contract Report LC9495/018, (unpubl.), Lincoln, N.Z. 16 p.
Spurr, E. B. 1995. Evaluation of non-toxic bait interference for indexing brushtail possum
density. New Zealand Journal of Ecology 19:123-130.
Steadman, D. W., B. J. Adams and L. W. Konigsberg. 2006. Statistical basis for positive
identification in forensic anthropology. American Journal of Physical Anthropology
131:15-26.
Steinmetz, R. and D. L. Garshelis. 2008. Distinguishing Asiatic black bears and sun bears by
claw marks on climbed trees. Journal of Wildlife Management 72:814-821.
Stoddart, T. J. 1973. Bite marks in perishable substances. A method of producing accurate
permanent models. British Dental Journal 135:285-287.
Stols, G. and H. Bernitz. 2010. Reconstruction of deformed bite marks using affine
transformations. Journal of Forensic Sciences 55:784-787.
Stoney, D. A. 2001. Measurement of fingerprint individuality. In: H. C. Lee and R. E.
Gaensslen (eds.) Advances in fingerprint technology. 327-387. CRC Press.
Ström, F. 1963. Investigation of bite-marks. Journal of Dental Research 42:312-316.
Stroud, R. K. and W. J. Adrian. 1996. Forensic investigational techniques for wildlife law
enforcement investigations. In: A. Fairbrother, L. N. Locke and G. L. Hoff (eds.)
Noninfectious diseases of wildlife. 3-18. Iowa State University Press, Ames.
Stroud, R. K. 1998. Wildlife forensics and the veterinary practitioner. Seminars in Avian and
Exotic Pet Medicine 7:182-192.
Su, C. and S. N. Srihari. 2009. Probability of random correspondence for fingerprints. In: Z. J.
M. H. Geradts, K. Y. Franke and C. J. Veenman (eds.) Computational forensics. 5566. Springer Berlin
Sweet, D. and D. Hildebrand. 1999. Saliva from cheese bite yields DNA profile of burglar: a
case report. International Journal of Legal Medicine 112:201-203.
Sweet, D. J. 1997. Human bitemarks: examination, recovery and analysis. In: C. M. Bowers
and G. L. Bell (eds.) Manual of forensic odontology. 148-169. American Society of
Forensic Odontology, Saratoga Springs, N.Y.
Sweet, D. J. and C. M. Bowers. 1998. Accuracy of bite mark overlays: a comparison of five
common methods to produce exemplars from a suspect's dentition. Journal of
Forensic Sciences 43:362-367.
Sweet, D. J. and G. G. Shutler. 1999. Analysis of salivary DNA evidence from a bite mark on
a body submerged in water. Journal of Forensic Sciences 44:1069-1072.
191
Sweetapple, P. J. and G. Nugent. 2011. Chew-track-cards: a multiple-species small mammal
detection device. New Zealand Journal of Ecology 35:153-162.
Taylor, D. V. 1963. The law and the dentist. British Dental Journal 114:389-389.
Thali, M. J., M. Braun, T. H. Markwalder, W. Brueschweiler, U. Zollinger, N. J. Malik, K.
Yen and R. Dirnhofer. 2003. Bite mark documentation and analysis: the forensic
3D/CAD supported photogrammetry approach. Forensic Science International
135:115-121.
Thomas, M. D. and G. J. Hickling. 1990. A trial to determine an efficient method of
controlling possums around bait feeder stations. Forest Research Institute Contract
Report FWE 90/62, (unpubl.), Christchurch, N.Z. 7 p.
Thomas, M. D. and D. Meenken. 1995. Comparison of ground-laid 1080 paste baits and 1080
cereal baits in bait stations for possum control on farmland (40/90). Landcare
Research Contract Report LC9596/36, (unpubl.), Lincoln, N.Z. 12 p.
Thomas, M. D. 1998. Feasibility of using wax-blocks to measure rodent and possum
abundance and changes in population size. Landcare Research Contract Report
LC9798/109, (unpubl.), Lincoln, N.Z. 10 p.
Thomas, M. D., D. A. Wright, J. Mason and K. W. Briden. 1998. Use of bait stations for
possum and feral cat control. Science for Conservation 86, Department of
Conservation, Wellington, N.Z. 24 p.
Thomas, M. D., J. A. Brown and R. J. Henderson. 1999. Feasibility of using wax blocks to
measure rat and possum abundance in native forest. Proceedings of the New Zealand
Plant Protection Conference 52:125-129.
Thomas, M. D. and J. A. Brown. 2001. Calibration of possum density estimates from raised
leg-hold traps. New Zealand Plant Protection 54:71-75.
Thomas, M. D., J. A. Brown, F. W. Maddigan and L. A. Sessions. 2002. Comparison of trapcatch, orange and WaxTag methods for estimating possum densities in Northland.
Pest Control Research Contract Report 2002/7, (unpubl.), Christchurch, N.Z.
Thomas, M. D., J. A. Brown, F. W. Maddigan and L. A. Sessions. 2003. Comparison of trapcatch and bait interference for estimating possum densities. New Zealand Plant
Protection 56:81-85.
Thomas, M. D., J. A. Brown and F. W. Maddigan. 2004. Possum monitoring in the presence
of ground birds: (objective 1) calibrating TSI with RTCI. Pest Control Research
Contract Report 2004/6, (unpubl.), Christchurch, N.Z. 16 p.
Thomas, M. D. and F. W. Maddigan. 2004. Visual lures for possums. Pest Control Research
Contract Report 2004/5, (unpubl.), Christchurch, N.Z. 15 p.
Thomas, M. D., D. R. Morgan and F. W. Maddigan. 2007. Accuracy of possum monitoring
using WaxTags. Pest Control Research Contract Report 2006/7, (unpubl.),
Christchurch, N.Z. 50 p.
Tompkins, G. R. 2005. Genotypic comparison of oral bacteria isolated from bitemarks and
teeth. In: R. B. J. Dorion (ed.) Bitemark evidence. 593-599. Marcel Dekker, New
York.
192
Tonn, E. M., D. J. Long and D. Dechant. 2004. A comparison of intercanine widths among
various animals and humans. In: Proceedings of the 56th Annual Scientific Meeting of
the American Academy of Forensic Sciences; Feb 16–21, 2004. Dallas, TX. 206-206.
Tonn, E. M., J. P. Dumbacher and D. Dechant. 2005. Methods to identify various mammalian
bite marks. In: Proceedings of the 57th Annual Scientific Meeting of the American
Academy of Forensic Sciences; Feb 21–26, 2005; New Orleans, LA. 224-224.
Travaini, A., R. Laffitte and M. Delibes. 1996. Determining the relative abundance of
European red foxes by scent-station methodology. Wildlife Society Bulletin 24:500504.
Tsujita, C. J. and G. E. G. Westermann. 2001. Were limpets or mosasaurs responsible for the
perforations in the ammonite Placenticeras? Palaeogeography, Palaeoclimatology,
Palaeoecology 169:245-270.
Uchiyama, T. 1986. Similarity among breech face marks fired from guns with close serial
numbers. Association of Firearm and Tool Mark Examiners Journal 18:15-52.
Uchiyama, T. 1988. A criterion for land mark identification. Association of Firearm and Tool
Mark Examiners Journal 20:236-251.
Uchiyama, T. 1992. The probability of corresponding striae in toolmarks. Association of
Firearm and Tool Mark Examiners Journal 24:273-290.
Vale, G. L. 2005. History of bitemark evidence. In: R. B. J. Dorion (ed.) Bitemark evidence.
1-29. Marcel Dekker, New York.
Van Dyke, F. G., R. H. Brocke and H. G. Shaw. 1986. Use of road track counts as indices of
mountain lion presence. Journal of Wildlife Management 50:102-109.
Vanderkolk, J. R. 1995. Identifying consecutively made garbage bags through manufactured
characteristics. Journal of Forensic Identification 45:38-50.
Verma, S. K., K. Prasad, N. Nagesh, M. Sultana and L. Singh. 2003. Was elusive carnivore a
panther? DNA typing of faeces reveals the mystery. Forensic Science International
137:16-20.
Verma, S. K. and L. Singh. 2003. Novel universal primers establish identity of an enormous
number of animal species for forensic application. Molecular Ecology Notes 3:28-31.
Verner, J. 1985. Assessment of counting techniques. Current Ornithology 2:247-302.
Waits, L. P. and D. Paetkau. 2005. Noninvasive genetic sampling tools for wildlife biologists:
A review of applications and recommendations for accurate data collection. Journal of
Wildlife Management 69:1419-1433.
Wan, Q.-H., S.-G. Fang, G.-F. Chen, Z.-M. Wang, P. Ding, M.-Y. Zhu, K.-S. Chen, J.-H. Yu
and Y.-P. Zhao. 2003. Use of oligonucleotide fingerprinting and faecal DNA in
identifying the distribution of the Chinese tiger (Panthera tigris amoyensis
Hilzheimer). Biodiversity and Conservation 12:1641-1648.
Warburton, B. 2000. Monitoring possum populations. In: T. L. Montague (ed.) The brushtail
possum: biology, impact and management of an introduced marsupial. 132-138.
Manaaki Whenua Press, Lincoln, N.Z.
193
Warburton, B. and I. Yockney. 2000. Comparison of two luring methods for traps use to
monitor possum population in tussock country. Landcare Research Contract Report
LC9900/126, (unpubl.), Lincoln, N.Z. 9 p.
Warburton, B., R. Barker and M. Coleman. 2004. Evaluation of two relative-abundance
indices to monitor brushtail possums in New Zealand. Wildlife Research 31:397-401.
Warrick, G. D. and C. E. Harris. 2001. Evaluation of spotlight and scent-station surveys to
monitor kit fox abundance. Wildlife Society Bulletin 29:827-832.
Webster, G. and D. G. MacDonald. 1979. Forensic dental analysis of experimental bite marks
in food. Journal of Dental Research 58:1273-1273.
Webster, G. 1982. A suggested classification of bite marks in foodstuffs in forensic dental
analysis. Forensic Science International 20:45-52.
Western, D., C. J. Moss and N. Georgiadis. 1983. Age estimation and population age structure
of elephants from footprint dimensions. Journal of Wildlife Management 47:11921197.
Wetton, J. H., C. S. F. Tsang, C. A. Roney and A. C. Spriggs. 2004. An extremely sensitive
species-specific ARMs PCR test for the presence of tiger bone DNA. Forensic Science
International 140:139-145.
Whittaker, D. K., K. Watkins and J. Wiltshire. 1975. An experimental assessment of the
reliability of bite mark analysis. International Journal of Forensic Dentistry 3:3-7.
Whittaker, D. K. 1995. Forensic dentistry in the identification of victims and assailants.
Journal of Clinical Forensic Medicine 2:145-151.
Whittaker, D. K., L. Evans and M. R. Brickley. 1997. ROC analysis of the ability to
distinguish bite marks made by adults and children. Journal of Dental Research
76:1064-1064.
Williams, C. L., K. Blejwas, J. J. Johnston and M. M. Jaeger. 2003. A coyote in sheep's
clothing: predator identification from saliva. Wildlife Society Bulletin 31:926-932.
Wilson, G. J. and R. J. Delahay. 2001. A review of methods to estimate the abundance of
terrestrial carnivores using field signs and observation. Wildlife Research 28:151-164.
Wolff, D., R. Kennedy, E. Lounsbury, G. MacMaster, K. Olthuis, D. Sweet, A. Tutt and B.
Yamashita. 1998. Dental casting materials for the recovery of toolmark impressions.
Forensic Identification Research Services Bulletin No. 43, Royal Canadian Mounted
Police, Ottawa.
Wood, J. D., C. E. O'Connell-Rodwell and S. L. Klemperer. 2005. Using seismic sensors to
detect elephants and other large mammals: a potential census technique. Journal of
Applied Ecology 42:587-594.
Woolley, A. W., C. F. Chabris, A. Pentland, N. Hashmi and T. W. Malone. 2010. Evidence
for a collective intelligence factor in the performance of human groups. Science
330:686-688.
Würsig, B. and T. A. Jefferson. 1990. Methods of photo-identification for small cetaceans. In:
P. S. Hammond, S. A. Mizroch and G. P. Donovan (eds.) Reports of the International
Whaling Commission Special issue 12: Individual recognition of cetaceans: use of
photo-identification and other techniques to estimation population parameters. 43-52.
International Whaling Commission.
194
Xiaohu, X., H. P. Philipsen, N. G. Jablonski, K. M. Pang and Z. Jiazhen. 1992. Age
estimation from the structure of adult human teeth: review of the literature. Forensic
Science International 54:23-28.
Yoon, S., S.-S. Choi, S.-H. Cha, Y. Lee and C. C. Tappert. 2005. On the individuality of the
iris biometric. In: M. Kamel and A. Campilho (eds.) Image analysis and recognition.
1118-1124.
Youden, W. J. 1950. Index for rating diagnostic tests. Cancer 3:32-35.
Yuan, G., J. Russell, R. Klette, B. Rosenhahn and S. Stones-Havas. 2005. Understanding
tracks of different species of rats. Proceedings of the Image and Vision Computing
New Zealand Conference. University of Otago, Dunedin, N.Z.
Yun, J.-I., J.-Y. Lee, J.-W. Chung, H.-S. Kho and Y.-K. Kim. 2007. Age estimation of Korean
adults by occlusal tooth wear. Journal of Forensic Sciences 52:678-683.
Zheng, J., Z. R. Zhou, J. Zhang, H. Li and H. Y. Yu. 2003. On the friction and wear behaviour
of human tooth enamel and dentin. Wear 255:967-974.
Zheng, J. and Z. R. Zhou. 2006. Effect of age on the friction and wear behaviors of human
teeth. Tribology International 39:266-273.
Zielinski, W. J. and H. B. Stauffer. 1996. Monitoring Martes populations in California: survey
design and power analysis. Ecological Applications 6:1254-1267.
195
Appendix A
Wildlife abundance assessment methods
The relationship among population estimation approaches extracted from Lancia et al. (2005).
Figure A–1. The relationship among population estimation approaches: extracted from Lancia
et al. (2005).
196
Appendix B
Forensic odontology terminology (excerpts)
Selected terms relating to forensic odontology were extracted from the American Board of
Forensic Odontology bitemark methodology guidelines (ABFO 1997)
B.1 Bite mark vs. bitemark
The noun bite mark (two words) is used more frequently in the literature than bitemark (one
word) and was preferred 3: 1 in the ABFO survey. Dr. S. Miles Standish presented a cogent
rationale for the single term, bitemark, as the preferred grammatical form. A professor of
English at the University of Louisville concluded that, because language is a living thing,
either term is acceptable. Bitemark implies a type of mark whereas bite mark connotes an
entity unto itself and recognizable as such. Bitemark would be considered the more
progressive term, signifying that odontologists have a sufficient body of work and evolved in
similar fashion. Dr. Standish also adds that, when used as a compound adjective, bite mark is
hyphenated as in Bitemark analysis. After evaluating all these opinions, it is the feeling of the
ABFO that the meaning of the word in any of its forms is clear and there is no need for the
ABFO to endorse a particular form.
B.2 A characteristic (as it pertains to bitemarks)
A characteristic, as applied to a bitemark, is a distinguishing feature, trait or pattern within
the mark. Characteristics are two types, class characteristics and individual characteristics.
Class characteristic: a feature, trait or pattern preferentially seen in, or reflective of, a given
group. For example, the finding of linear or rectangular contusions at the midline of a
Bitemark arch is a class characteristic of human incisor teeth. "Incisors" represent the class in
this case. The value of identifying class characteristics is that, when seen, they enable us to
identify the group from which they originate. For instance, the class characteristics of incisors
(rectangles) differentiates them from canines (circles or triangles). If we define the class
characteristics of human bites, we can differentiate them from animal bites. Via class
characteristics, we differentiate the adult from the child bite or mandibular from maxillary
arch. The original term "class characteristic" was applied to toolmarks and its definition has
been modified to make it more applicable to bitemarks.
Individual characteristic: a feature, trait or pattern that represents an individual variation
rather than an expected finding within a defined group. An example of this is a rotated tooth.
The value of individual characteristics is that they differentiate between individuals and help
identify the perpetrator. The number, specificity and accurate reproduction of these individual
characteristics determine the confidence level that a particular suspect made the bitemark.
197
B.3 Bitemark definition
Bitemark
A physical alteration in a medium caused by the contact of teeth. A representative pattern left
in an object or tissue by the dental structures of an animal or human.
Cutaneous human bitemark
An injury in skin caused by contacting teeth (with or without the lips or tongue) which shows
the representational pattern of the oral structures.
198
Appendix C
Forensic toolmark examination glossary (excerpts)
Selected terms relating to the forensic examination of toolmarks were extracted from the
Glossary of the Association of Firearm and Tool Mark Examiners, 4th edition (AFTE
Training and Standardization Committee 2001).
C.1 Toolmark examination
Toolmark Identification
Toolmark identification is a discipline of forensic science which has as its primary concern to
determine if a toolmark was produced by a particular tool.
Tool
An object used to gain mechanical advantage. Also thought of as the harder of two objects
which when brought into contact with each other, results in the softer one being marked. See
TOOLMARK, IMPRESSED and TOOLMARK, STRIATED.
Striations
Contour variations, generally microscopic, on the surface of an object caused by a
combination of force and motion where the motion is approximately parallel to the plane
being marked. These marks can contain CLASS and/or INDIVIDUAL
CHARACTERISTICS.
Toolmark, Impressed
Marks produced when a tool is placed against another object and enough force is applied to
the tool so that it leaves an impression. The class characteristics (shape) can indicate the type
of tool used to produce the mark. These marks can contain CLASS and/or INDIVIDUAL
CHARACTERISTICS of the tool producing the marks. Also called COMPRESSION
MARKS.
Toolmark, Striated
Marks produced when a tool is placed against another object and with pressure applied, the
tool is moved across the object producing a striated mark. FRICTION MARKS, ABRASION
MARKS and SCRATCH MARKS are terms commonly used when referring to striated
marks. These marks can be either CLASS and/or INDIVIDUAL CHARACTERISTICS.
199
Class Characteristics
Measurable features of a specimen which indicate a restricted group source. They result from
design factors, and are therefore determined prior to manufacture.
Subclass Characteristics
Discernible surface features of an object which are more restrictive than CLASS
CHARACTERISTICS in that they are:
1. Produced incidental to manufacture.
2. Are significant in that they relate to a smaller group source (a subset of the class to
which they belong).
3. Can arise from a source which changes over time.
Examples would include: bunter marks, extrusion marks on pipe, etc.
Caution should be exercised in distinguishing subclass characteristics from INDIVIDUAL
CHARACTERISTICS.
Individual Characteristics
Marks produced by the random imperfections or irregularities of tool surfaces. These random
imperfections or irregularities are produced incidental to manufacture and/or caused by use,
corrosion, or damage. They are unique to that tool and distinguish it from all other tools.
Theory of Identification as it Relates to Toolmarks
The theory of identification as it pertains to the comparison of toolmarks enables opinions of
common origin to be made when the unique surface contours of two toolmarks are in
―sufficient agreement.‖
This ―sufficient agreement‖ is related to the significant duplication of random toolmarks as
evidenced by the correspondence of a pattern or combination of patterns of surface contours.
Significance is determined by the comparative examination of two or more sets of surface
contour patterns comprised of individual peaks, ridges and furrows. Specifically, the relative
height or depth, width, curvature and spatial relationship of the individual peaks, ridges and
furrows within one set of surface contours are defined and compared to the corresponding
features in the second set of surface contours. Agreement is significant when it exceeds the
best agreement demonstrated between toolmarks known to have been produced by different
tools and is consistent with agreement demonstrated by toolmarks known to have been
produced by the same tool. The statement that ―sufficient agreement‖ exists between two
toolmarks means that the agreement is of a quantity and quality that the likelihood another
tool could have made the mark is so remote as to be considered a practical impossibility.
Currently the interpretation of individualization/identification is subjective in nature, founded
on scientific principles and based on the examiner‘s training and experience.
Contour Variation
Variations in the elevations of the ridges and valleys in striated marks and of forms and
shapes or depressions in the impression mark.
200
C.2 Firearm terminology
Breech
The part of a firearm at the rear of the bore into which the cartridge or propellant is inserted.
Barrel
That part of a firearm through which a projectile or shot charge travels under the impetus of
powder gasses, compressed air, or other like means. May be rifled or smooth.
Bore
The interior of a barrel forward of the chamber.
Bore Diameter
1. Rifled barrels: the minor diameter of a barrel which is the diameter of a circle formed
by the tops of the lands.
2. Shotguns: the interior dimensions of the barrel forward of the chamber but behind the
choke.
Breech Face
That part of the breechblock or breech bolt which is against the head of the cartridge case or
shotshell during firing.
Cartridge
A single unit of ammunition consisting of the case, primer, and propellant with one or more
projectile(s). Also applies to a shotshell.
Cartridge Case
The container for all the other components which comprise a cartridge.
Chamber
The rear part of the barrel bore that has been formed to accept a specific cartridge. Revolver
cylinders are multi-chambered.
C.3 Firearm anatomy and sources of toolmarks
Core firearm components from the viewpoint of striation- and impression-type toolmarks
sources are illustrated in Figure C–1. Figure C–1(a): longitudinal section of the barrel and
breech block in a loaded firearm at battery; Figure C–1(b): numbered firing sequence as given
in detail below; close-up illustrations of (c) striation-type toolmarks, and of (d) impressiontype toolmarks: Transverse sections of (e) bullet and (d) barrel.
201
The firing sequence illustrated in Figure C–1(b) proceeds as follows: (1) force strikes the
firing pin, which (2) hits the primer transferring the physical impact into a thermal flare
causing propellant (gunpowder) to ignite (3) resulting in high pressure from a rapid expansion
of gasses, which (4) propels the bullet through the barrel and out of the muzzle, and
simultaneously forces the cartridge case onto the chamber wall and breech face. During the
bullet‘s travel through the barrel, its contact with twisted grooves and lands (rifling) forces it
to rotate longitudinally to obtain flight stabilisation.
Because the bullet diameter is larger than the bore diameter, its surface is forcibly made to
contact the microscopic rifling imperfections created during the barrel‘s production process.
The imperfections on the steel barrel are transferred on to the softer lead bullet, or in the case
of high-power cartridges, copper alloy jacket material.
Simultaneous to the firing process which drives the bullet forward, rapidly expanding gas
presses the brass cartridge case to the chamber wall and breech face (usually steel) with great
pressure. Therefore the harder material‘s imperfections that may have occurred during
manufacture process or defects that may arise from normal use of the firearm can be
transferred to the case in the form of impression toolmark. Chamber wall impressions,
however may also contain striation toolmarks due to the necessity to extract by pulling out the
empty case to make room for a fresh cartridge.
202
Rifling
(a)
Barrel
Breech (slide)
Propellant
Cartridge case
Bullet
Firing pin
2
3
1
4
(d) Impression toolmarks
(white dots)
(c) Striation toolmarks
(e)
(f)
Barrel
Breech
Primer cap
Gas pressure
Cartridge case
Bullet
(e)
(e)
Firing pin
(f)
Groove mark
Bullet diameter
(> bore diameter)
Groove
Land
(f)
Land mark
Bore
diameter
Core (lead)
Bore
diameter
Jacket
(copper alloy)
Groove width
Land width
Groove width
Land width
Figure C–1 Nomenclature of core firearm components, and sources of striation- and
impression-type toolmarks; Longitudinal sections of (a) loaded firearm at battery, (b)
numbered firing sequence, and close-up illustrations of (c) striation-type toolmarks, and
of (d) impression-type toolmarks; Transverse sections of (e) bullet and (d) barrel.
203
Appendix D
Site selection (random plots)
Compliant to the image capture scale (1000 m horizontal bar in screen) a 100 × 100 m grid
mesh was generated and overlaid to the forest image with numbered grid cells. Computer
generated random numbers defined sample grids where it fell on a suitable sample block.
Sample site selection was continued until 10 sample grids were identified in Bottle Lake
Forest. Paired sample plots of 110 × 110 m placed at 100 distance i.e. a whole sample set of
320 × 110 m were drawn into the map so as to fit in the following conditions: (1) sample set
reference point (north-west corner of first grid) is located in the abovementioned randomly
selected sample grid, (2) sample set of two plots fit within 10 m inside the suitable sample
block, and (3) sample plot orientation follows tree row orientation as seen in images. Latest
aerial photographs of the selected sample sites were obtained from Selwyn Plantation Board
Limited for final update and refinement of plot setting on the map.
204
Figure D–1. Bottle Lake Forest Reserve field sample site selection procedure, illustrating
randomly selected grid locations and sample plot designation for each candidate location.
205
Appendix E
Individuals identified on WaxTags® from each night
The following tables (Table E–1 to Table E–10) list WaxTag® identification numbers bitten
by each individual animal for each night. Each individual identification number is taken from
the smallest WaxTag® number from which the bitemark was first identified. Tag numbers in
bold represent those bitten by more than one individual on respective nights. WaxTags® in the
inconclusive category lacked sufficient observable characteristics to identify with any other
bitemark, or to classify as an independent individual, i.e., it was not possible to either
positively include in or exclude from previously identified individual.
206
207
0375
0375
1819
6815
2353
2353
3844
4661
6420
7768
8931
9133
0866
0866
1819
4167
4806
7008
7932
8865
1885
0139
2272
6990
Total
16
3
7
7
0
0
0
0
* Indiv. =Individual; ? =Inconclusive
®
WaxTag numbers in bold were bitten by multiple individuals.
Indiv.* 0077
Tag # 0077
0291
0862
1819
2353
2801
2895
3012
3443
4986
5969
6167
7877
8503
8577
8645
1
3443
3443
Table E–1. Individuals identified on tags from night one. (n=13)
0131
0131
1213
1729
1943
2333
3082
3799
4490
4564
4687
4877
5121
5133
5501
5773
6087
6266
6542
6574
6634
7046
7380
7661
7797
7835
8107
8355
8935
9015
9049
9548
31
207
12
0560
0560
2691
3658
4490
5637
6087
6584
6735
8538
9386
9761
9852
24
0719
0719
1283
2026
2177
2473
2491
2691
2957
3082
3658
3799
4564
5397
5637
5880
6017
6735
6744
7046
7244
7380
7797
7981
8349
7
2382
2382
4144
5773
6592
6634
8348
8538
2
3082
3082
8538
2
8355
8355
9983
1
4242
4242
1
8349
8349
0
1833
0
0919
0
4458
1
?*
0298
208
0375
6990
7424
2353
4320
0866
1727
1983
3245
5951
7424
7554
8840
8975
1885
0139
0139
0475
2213
8458
9206
2272
6990
6990
8476
Total
8
2
1
8
0
5
0
2
* Indiv. =Individual; ? =Inconclusive
®
WaxTag numbers in bold were bitten by multiple individuals.
Indiv.* 0077
Tag # 1956
1983
2325
5593
6118
6982
8901
9492
0
3443
Table E–2. Individuals identified on tags from night two. (n=11)
25
0131
0458
0459
0589
0936
1075
1921
2540
2550
2598
3018
4047
5039
6193
6440
6675
7923
7939
8539
8655
8711
8761
9021
9361
9508
9577
208
10
0560
0218
1741
2342
3431
3899
5011
5725
6294
7554
9946
0719
0132
0524
1164
1192
1431
1445
1660
1663
3571
3969
5076
5110
6189
6337
6982
7182
7356
7516
7738
7780
7911
8263
8363
8541
8876
8896
8901
8974
9190
9225
9656
9692
9803
33
3
2382
0105
5966
7802
0
3082
0
8355
0
4242
0
8349
1
1833
1833
0
0919
0
4458
0
?*
209
0375
3073
6117
2353
0866
0177
0533
2681
3801
5484
5679
6646
7103
7248
8810
1885
0139
1736
3412
4161
5226
2272
2272
3370
3381
6990
5732
Total
15
2
0
10
0
4
3
1
* Indiv. =Individual; ? =Inconclusive
®
WaxTag numbers in bold were bitten by multiple individuals.
Indiv.* 0077
Tag # 1162
1180
1713
6038
6092
6618
7103
7248
7323
7896
8360
8399
9197
9270
9627
0
3443
Table E–3. Individuals identified on tags from night three. (n=12)
0131
0169
0370
1416
1889
2169
2478
2771
3856
4611
5386
5480
6456
6475
6722
7703
7776
8273
8942
9103
9203
9339
9979
22
209
6
0560
2200
4656
4830
5132
8192
9198
2
0719
0919
8488
4
2382
2270
7499
7648
9744
0
3082
0
8355
0
4242
0
8349
3
1833
3776
4965
7703
2
0919
0919
3875
0
4458
0
?*
210
0375
2353
2689
5363
8139
9843
0866
1136
5318
1885
0139
2272
1673
2279
2824
6522
6990
2921
0375
2353
0866
1369
3180
4686
5539
6003
7566
9769
Total
6
0
0
7
* Indiv. =Individual; ? =Inconclusive
Indiv.* 0077
Tag # 1238
1284
4866
6931
7698
8125
0
1885
2
0139
3716
9861
0
2272
0
6990
0
3443
1
3443
5819
Table E–5. Individuals identified on tags from night five. (n=8)
Total
7
0
4
2
0
0
4
1
* Indiv. =Individual; ? =Inconclusive
®
WaxTag numbers in bold were bitten by multiple individuals.
Indiv.* 0077
Tag # 0395
1173
2824
4508
4941
5119
6863
Table E–4. Individuals identified on tags from night four. (n=13)
0131
0519
0648
1349
3267
5420
6969
8883
9223
8
5
0131
0387
1121
1951
2720
7978
210
2
0560
1571
1924
2
0560
6903
9530
5
0719
0227
0931
1482
2001
4170
0719
0026
2173
2247
2720
3002
3222
4021
4221
4266
5108
6558
6903
7900
7965
8139
15
2
2382
1099
4306
5
2382
0573
0981
1776
6188
6903
0
3082
0
3082
0
8355
1
8355
2720
1
4242
0538
4
4242
1888
2573
2679
3590
0
8349
0
8349
0
1833
1
1833
3808
0
0919
0
0919
0
4458
0
4458
1
?*
8704
0
?*
211
0139
0
1885
1885
1
3
2272
5083
6828
8899
0
6990
0
3443
0375
6514
9616
2353
7276
7793
0866
3955
4827
1885
0139
2272
4878
6623
7592
6990
0375
2353
0866
2965
4472
8276
8665
9033
9138
Total
0
0
0
6
* Indiv. =Individual; ? =Inconclusive
Indiv.* 0077
Tag #
0139
0
1885
0
0
2272
0
6990
0
3443
0
3443
Table E–8. Individuals identified on tags from night eight. (n=7)
Total
3
2
2
2
0
0
3
0
* Indiv. =Individual; ? =Inconclusive
®
WaxTag numbers in bold were bitten by multiple individuals.
Indiv.* 0077
Tag # 0655
5919
9957
Table E–7. Individuals identified on tags from night seven. (n=11)
Indiv.* 0077 0375 2353 0866
Tag # 2252 2531 0082 0082
3332
6359 2219
3822
6839 3595
5899
7073
7364
9722
7490
9618
Total
7
1
3
5
* Indiv. =Individual; ? =Inconclusive
Table E–6. Individuals identified on tags from night six. (n=11)
1
0131
8167
3
0131
1153
3349
8086
6
0131
0741
3237
4708
5097
5493
6539
211
1
0560
7387
2
0560
2627
3177
1
0560
5774
3
0719
1028
1595
3259
3
0719
1903
7401
8582
4
0719
1374
1831
2941
4695
1
2382
7282
2382
0365
3177
4871
5006
8380
5
5
2382
1587
2774
4969
5520
6885
0
3082
0
3082
0
3082
2
8355
7755
8214
0
8355
0
8355
1
4242
0868
1
4242
1046
0
4242
0
8349
0
8349
0
8349
0
1833
1
1833
1004
1
1833
9089
0
0919
0
0919
0
0919
0
4458
0
4458
0
4458
1
?*
5959
1
?*
7825
0
?*
212
2353
5
0
0375
2353
5914
6987
0866
7888
Total
0
0
2
1
* Indiv. =Individual; ? =Inconclusive
Indiv.* 0077
Tag #
0
1885
0
0139
3
2272
2179
4996
9322
0
6990
0
3443
0131
5428
5594
6953
7602
4
0131
2894
6606
6975
7774
9364
3443
Table E–10. Individuals identified on tags from night ten. (n=8)
0375
0866 1885 0139 2272 6990
0853
1140 3727
1455
5844
1691
2487
3727
4152
4304
4839
5134
9902
Total
7
0
0
10
0
2
1
0
* Indiv. =Individual; ? =Inconclusive
®
WaxTag numbers in bold were bitten by multiple individuals.
Indiv.* 0077
Tag # 0028
0425
3565
4309
6677
8326
9902
Table E–9. Individuals identified on tags from night nine. (n=8)
212
0
0560
5
0560
0159
1361
2190
4487
8718
3
0719
0930
4670
7285
0
0719
2
2382
1025
3103
3
2382
0317
1319
7905
0
3082
0
3082
0
8355
0
8355
2
4242
3779
6173
0
4242
0
8349
0
8349
2
1833
5115
7022
0
1833
0
0919
0
0919
0
4458
2
4458
4458
5522
0
?*
2
?*
6362
8730
Appendix F
Nightly activity by individual possums.
The following tables list the nightly number of WaxTags® bitten by individual possums, the
maximum distance between bitten WaxTags®, i.e., minimum distance travelled by individual
possums, and the minimum convex polygon (MCP) area of individuals‘ activity range. A
summary of these values were given in Table 4-4.
Table F–1. Nightly number of WaxTags® bitten by individual possums.
Night
Individual
0719
0131
0077
0560
0866
2382
2353
0139
2272
4242
0375
1833
3082
4458
8355
0919
6990
1885
3443
8349
1
24
31
16
12
7
7
7
1
3
2
2
1
1
2
33
25
8
10
8
3
1
5
0
2
1
0
0
2
0
0
3
2
22
15
6
10
4
0
4
3
0
2
3
0
0
2
1
0
0
4
15
5
7
2
2
5
4
0
4
4
0
1
0
1
0
1
1
0
5
5
8
6
2
7
2
0
2
0
1
0
0
0
0
0
0
0
0
6
4
6
7
1
5
5
3
0
3
0
1
1
0
0
0
0
1
0
0
7
3
3
3
2
2
5
2
0
3
1
2
1
0
0
0
0
0
0
0
8
3
1
0
1
6
1
0
0
0
1
0
0
0
2
0
0
0
0
0
9
0
5
7
5
10
3
0
2
1
0
0
0
0
2
0
0
0
0
0
0
10 Total
3
92
4 110
0
69
0
41
1
58
2
37
2
19
0
13
3
17
2
10
0
10
2
9
0
2
0
2
0
5
0
2
0
4
0
1
0
2
0
1
Active
nights
Max.
9
10
8
9
10
10
6
4
6
6
5
6
1
1
3
1
3
1
2
1
33
31
16
12
10
7
7
5
4
4
3
3
2
2
2
2
2
1
1
1
Mean (all)
9.2
11.0
6.9
4.1
5.8
3.7
1.9
1.3
1.7
1.0
1.0
0.9
0.2
0.2
0.5
0.2
0.4
0.1
0.2
0.1
Mean
(active)
10.0
11.0
8.6
4.6
5.8
3.7
3.2
3.3
2.8
1.7
2.0
1.5
2.0
2.0
1.7
2.0
1.3
1.0
1.0
1.0
NB: Individuals in pink and blue were first identified from bitemarks on WaxTags® with and
without food lure, respectively. Bold numbers are maximum nightly numbers of
WaxTags® bitten by each individual. Underlined numbers show maximum values in each
summarised category, e.g., total, active nights.
213
Table F–2. Nightly distance (m) travelled, i.e. distance between WaxTags® bitten by
individual possums.
Night
Individual
0719
0131
0077
0560
0866
2382
2353
0139
2272
4242
0375
1833
3082
4458
8355
0919
6990
1885
3443
8349
1
122
156
128
130
122
120
135
0
0
0
40
0
130
0
22
0
0
0
0
0
2
3
4
5
6
7
256 10 311 200 76 82
120 122 310 81 76 108
128 216 212 98 121 20
99 60 180 30
0 22
165 218 139 104 114 22
67 40 282 122 290 61
0
0 215
0 114 10
0 20
0
0
40 22
0 51 243
0 51 90
0
0 180
0
0
0
14 71
0
0
0 36
0 64
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0 20
0
0
0
0
0
0
0
0
0
10
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
8
9 10 Total
22
0 232 1312
0 80 67 1120
0 141
0 1065
0 36
0 558
94 114
0 1094
0 117 40 1138
0
0 98 572
0 10
0
92
0
0
0 435
0
0 10 190
0
0
0 161
0
0 32
96
0
0
0 130
0 41
0
41
10
0
0
32
0
0
0
20
0
0
0
10
0
0
0
0
0
0
0
0
0
0
0
0
Active
nights
9
10
8
9
10
10
6
4
6
6
5
6
1
1
3
1
3
1
2
1
Max.
311
310
216
180
218
290
215
40
243
180
71
64
130
41
22
20
10
0
0
0
Mean
Mean (all) (active)
131
112
106
56
109
114
57
9.2
44
19
16
9.6
13
4.1
3.2
2
1
0
0
0
146
112
133
62
109
114
95
23
73
32
32
16
130
41
11
20
3.3
0
0
0
NB: Individuals in pink and blue were first identified from bitemarks on WaxTags® with and
without food lure, respectively. Bold numbers are maximum nightly distances between
WaxTags® bitten by each individual. Underlined numbers show maximum values in each
summarised category, e.g., total, active nights.
Table F–3. Nightly MCP area (ha) covered by individual possums.
Night
Individual
0719
0131
0077
0560
0866
2382
2353
0139
2272
4242
0375
1833
3082
4458
8355
0919
6990
1885
3443
8349
1
0.8
0.8
0.6
0.3
0.3
0.2
0.5
0
0
0
0
0
0
2
2.1
0.6
0.3
0.3
0.9
0
0
0.1
0
0
0
0
0
0
0
0
3
0
0.5
1.4
0
1.3
0
0
0
0
0
0
0
0
0
0
0
0
0
4
2.8
0.6
0.8
0
0
0.8
0.5
0
0.4
0.1
0
0
0
0
0
0
0
0
5
0.5
0.2
0.3
0
0.5
0
0
0
0
0
0
0
0
0
0
0
0
0
6
0.1
0.3
0.2
0
0.3
0.9
0.1
0
0
0
0
0
0
0
0
0
0
0
0
7
0
0
0
0
0
0.2
0
0
0
0
0
0
0
0
0
0
0
0
0
8
0
0
0
0
0.2
0
0
0
0
0
0
0
0
0
0
0
0
0
0
9
0
0
0.4
0
0.6
0.1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
10 Total
0.9 7.2
0 3.1
0 3.8
0 0.6
0
4
0 2.3
0 1.2
0 0.1
0.1 0.6
0 0.1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
Active
nights
9
10
8
9
10
10
6
4
6
6
5
6
1
1
3
1
3
1
2
1
Max.
2.8
0.8
1.4
0.3
1.3
0.9
0.5
0.1
0.4
0.1
0
0
0
0
0
0
0
0
0
0
Mean
Mean (all) (active)
0.7
0.3
0.4
0.1
0.4
0.2
0.1
0.0
0.1
0.0
0
0
0
0
0
0
0
0
0
0
0.8
0.3
0.5
0.1
0.4
0.2
0.2
0.0
0.1
0.0
0
0
0
0
0
0
0
0
0
0
NB: Individuals in pink and blue were first identified from bitemarks on WaxTags® with and
without food lure, respectively. Bold numbers are maximum nightly MCP areas covered
by each individual. Underlined numbers show maximum values in each summarised
category, e.g., total, active nights.
214
Appendix G
Striation quantification trial of bitemark cast image
Attempts were made during the study to quantify and objectively match bitemark images by
wavelet transform, and correlating greyscale values. The wavelet transform approach was a
collaborate effort with Auckland University of Technology, although it was abandoned
because the image capture requirements were too stringent to provide with correctly
referenced, standardised, relatively noise-free images necessary for computer processing.
While the greyscale correlation of cast images initially appereared promising, time
requirements to acquire and process the images were prohibitively large. In addition to the
usual effort to search, locate and align a full-width bitemark containing teeth I1 or I1, extra
effort in setting and re-setting critical illumination environments for each bitemark to
standardise the greyscale values was beyond the timeframe allowed to capture all specimens.
Additionally, the analySIS® image database and analysis software used in the study captured
greyscale values in its native format which needed to be transferred to a different format for
further use. The process was likewise abandoned because the image preparation and capture
requirements were too time consuming to obtain useful quantified data at the capture stage,
and that there were extra intermediate steps for the available software to allow quantitative
analysis trials in this study. Figure G–1 shows identical images of bitemark images with (a)
single-pixel and (b) band mean greyscale intensity aqcuisition, to illustrate part of the
challenge to capture a usable image in quantified correlation.
Further research in bitemark image preparation, capture and analysis may allow development
of automated process in quantitative comparison.
215
(a)
(b)
Greyscale value
(a)
(b)
Figure G–1. Trial to quantify the grayscatle intensity in striation patterns for individual
identification: identcal images‘ grayscale intensity at (a) single-pixel transect and (b)
band mean.
216
Download