UNIVERSITY COLLEGE LONDON STUDIES OF EVIDENCE SCIENCE A WIGMOREAN INTERPRETATION OF THE EVALUATION OF A COMPLICATED PATTERN OF EVIDENCE David A. Schum* School of Information Technology & Engineering School of Law George Mason University Honorary Professor of Evidence Science University College London 4 February, 2005 [Revised] * The author is most grateful to the Leverhulme Foundation and the Economic and Social Research Council for their support of the research described in this paper. 1.0 INTRODUCTORY COMMENTS An important part of our studies of the science of evidence involves examining alternative methods for analyzing complex probabilistic situations in which we often have a large mass of evidence to evaluate. The structuring of complex arguments based on a mass of evidence can be done in different ways to suit the interests of persons having different standpoints, as I noted in a recent paper1. The present paper concerns a complex pattern of evidence that can be analyzed in different ways. The example I am using in this paper comes from a hypothetical criminal law case employed in a recent paper Professors Dawid and Evett have written to illustrate graphical Bayesian methods for evaluating complicated patterns of evidence2. The methods described in this paper are also called Probabilistic Expert Systems [PES]. The PES described by Dawid and Evett is based on first constructing a directed acyclic graph [DAG] whose structure represents what is believed to be a plausible pattern of linkages among probabilistic variables, each representing an element of concern in the analysis at hand. The DAG constructed by Dawid and Evett in their analysis of the hypothetical case is what I have called a "process model" 3, since it is intended to capture a complex process by which some series of events could have been generated in the case being analyzed. The DAG contrived by Dawid and Evett, and that I will examine in my analysis, is several orders of magnitude more interesting and complex than the toy problems so often used to illustrate Bayesian networks. Actual probabilistic analyses of this DAG could have made use of any one of the existing software systems such as HUGIN, NETICA, or ERGO to perform Bayesian analyses of this inference network or process model. In my present analysis I have taken the very same evidence upon which the Dawid/Evett example is based. But the inference network I have constructed is based on a different standpoint than the one they adopted. I have tarted up the criminal law case example by including some fictitious names, places, and times. I have done this because it will make my analysis more easy to follow. But I have not changed any of the evidence used by Dawid and Evett. To make this paper informal, and also to save space, Professor Dawid is "Phil" and Professor Schum is "Dave" in the following discussion.. 2.0 STANDPOINT MATTERS William Twining is quite correct in urging all of us to declare our standpoints, up front, in any kind of analysis. So, here comes my attempt to declare a standpoint for Phil's analysis of the example case at hand and for me in my different analysis of this same example. I hope Phil agrees with the standpoint I have declared for him. 2.1 Phil's Standpoint In answer to the first standpoint question, Who am I? [i.e. What Hat am I wearing?], I declare Phil to be a world renowned probabilist/statistician with an interest in developing methods for analyzing complex masses of evidence. The second standpoint question is: At what stage of what process am I?. The process in which Phil is involved seems to be research and instruction involving Bayesian methods for the analysis of inference networks based on masses of evidence whose items have a variety of subtle and interesting properties. I am not too sure how to declare what stage of this process Phil is in. As far as research is concerned, I can't say that Phil is in the beginning stages of this process since work on Bayes's nets has been going on for quite some time now. So I'll just say that Phil is in the process of advancing research on Bayesian inference networks. As far as instruction is concerned, I guess I can say that Phil is in the fairly early stages of the process of trying to educate persons in the forensic sciences about the virtues of graphical 1 Schum, D. Alternative Views of Argument Construction from a Mass of Evidence. Cardozo Law Review, Vol. 22, Nos. 5-6, July, 2002, pp 1461 - 1502. 2 Dawid, P., Evett, I. Using a Graphical Method to Assist the Evaluation of Complicated Patterns of Evidence. Journal of Forensic Sciences, March 1997, pp 226 - 231. 3 See note 1 at pages 1466 - 1468. 2 Bayesian analyses. The final standpoint question is: What are my objectives? In the abstract of the Dawid/Evett paper the authors declare the objective of their analysis is to show persons in the forensic sciences how probabilistic expert systems can assist in the interpretation of evidence in situations in which there are complex dependency relations between different aspects of the evidence being considered. 2.2 Dave's Standpoint Who am I? [i.e. What Hat am I wearing?}. In my analysis I am adopting the role of a prosecuting attorney who is trained in Wigmorean analysis of complex masses of evidence. This attorney has studied under Professor William Twining and he has read Twining's book with Professor Terry Anderson from cover to cover4. At what stage of what process am I? Fact investigation in the case at hand is not yet complete but I am in the act of preparing a case against the defendant, later named. I believe I know what crime this defendant should be charged with although I might have to change my mind pending other evidence that might be gathered. I am in the early stages of constructing defensible and persuasive arguments in defense of the relevance of the evidence we have so far on an ultimate probandum [matter to be proved] that is given below. Third, my objective is to prepare a case for presentation in a criminal court that will show, beyond reasonable doubt, that the defendant committed the crime with which he is charged. 3.0 SOME PRELIMINARIES A standard Wigmorean analysis in criminal affairs, such as the one in Phil's example, always assumes the existence of an ultimate probandum [a matter to be proved] and a collection of penultimate probanda, each of which must be shown true beyond reasonable doubt in order to prove the ultimate probandum beyond reasonable doubt. The penultimate probanda for any specific charge specified in an ultimate probandum are given by substantive law. In most cases the penultimate probanda result from a parsing of an ultimate probandum into specific elements that form a necessary and sufficient basis for proving the ultimate probandum. As Anderson and Twining tell us, these penultimate probanda provide the touchstones for determining the relevance of any item of evidence to be admitted at trial. In other words, these penultimate probanda provide the necessary relevance "hooks" on which all of the trial evidence must be hung. In describing what are the ultimate and penultimate probanda in the example being analyzed, I now give some fictitious names, places and dates in the criminal law example. The commercial premises in which the alleged intruders entered belong to the Blackbread Brewery, located at 27 Orchardson St. London N.W. 8. The defendant in this case is Harold S., an unemployed hotel porter whose stated address is: 12 Widley Rd., London, W. 9. The security guard victim in this case is Willard R., whose stated address is: 34 Samford St., London N. W. 8. To simplify the police testimony in this case, I will assume that it is to be given by just one person, none other than Detective Inspector Richard Leary [I hope Richard will not mind being demoted in this example. I could not see him, as Detective Chief Inspector, riding around in a patrol car]. 3.1 Ultimate and Penultimate Probanda in My Analysis I first had to generate an ultimate probandum that seems appropriate in Phil's example that I am about to analyze in Wigmorean terms. On the evidence we have, it seems that the defendant Harold S. was involved in two felonies: a break-in and an assault leading to an injury. In former times, what we now call a break-in used to be described as breaking and entering. There are two elements of the charge of break-in. It must have been illegal or unauthorized, and it must have been forced. The four intruders may have had objectives other than just a break-in, such as burglary or some form of malicious destruction. But, as prosecutor I don't have any 4 Anderson, T., Twining, W. The Analysis of Evidence: How to Do Things with Facts Based on Wigmore's Science of Judicial Proof. Northwestern University Press, 1998. 3 evidence regarding their intentions. So, I will entertain a charge specified in the following ultimate probandum: U = Harold S. unlawfully and intentionally assaulted and injured a security guard Willard R. during a break-in at the Blackbread Brewery premises, 27 Orchardson St., London N. W. 8 in the early morning hours of 1 May, 2003. Here's my collection of penultimate probanda associated with U above. I am assuming that these penultimate probanda would correspond to what is required by English law. [William Twining can correct me if I am wrong]. P1: In the early morning hours of 1 May, 2003, four men unlawfully broke into the premises of the Blackbread Brewery, located at 27 Orchardson St., London N. W. 8. P2: Harold S. was one of the four men who broke into the premises of the Blackbread Brewery in the early morning hours of 1 May, 2003. P3: A security guard at the Blackbread Brewery, Willard R., was assaulted and injured during the break-in at the Blackbread Brewery on 1 May, 2003. P4: It was Harold S. who intentionally assaulted and injured Willard R. during the break-in at Blackbread Brewery on 1 May, 2003. With this given U and the four penultimate probanda now specified, I can provide the topmost part of my Wigmorean argument structure for the example being considered. U P1 P2 P3 P4 To be relevant in this fictitious case, all of the evidence items must be linked, by argument, to one of the four penultimate probanda shown above. An exception concerns any evidence items that are taken as being ancillary evidence. We will have a few items of ancillary evidence. 3.2 Parsing Evidence into Details or "Trifles" At several points in their investigative work, Sherlock Holmes tells Dr. Watson: "You know my method. It is based on the observance of trifles". Trifles refer to any individual details obtained from tangible or testimonial evidence obtained during an investigation of any kind. A tangible object may reveal any number of trifles or details. Similarly, testimony of a witness may, when parsed, reveal any number of trifles. Some trifles turn out to be inferentially important in various ways while other trifles are unimportant. It should be noted here that there's an element of subjectivity in the parsing of any item of potential evidence. Different persons might identify different trifles in any item of incoming information. What gets charted as evidence in any Wigmorean analysis are individual trifles or details. To be relevant and become evidence a trifle must be linked, directly or indirectly, to one of the four penultimate probanda listed above. There are several reasons for the necessity of parsing or decomposing our observations of any kind into individual trifles. First, consider an item of testimony in which a witness asserts trifles A, B, and C. This witness's credibility in asserting A we might believe to be less than it is in his/her assertion of trifles B and C. Second, trifles A and B might be relevant on one penultimate probandum, while 4 trifle C might be relevant on a different penultimate probandum. Third, in ordinary Wigmorean analyses in legal applications we commonly concern ourselves with binary propositions that can in principle be shown to be true or false. Suppose a witness asserts trifle E*, that event E occurred. Just because we have testimony E* does not entail that event E did occur. So our inference from E* concerns events in the binary class {E, E c}. Did E occur or not [Ec]? Sources of doubt, interposed between our evidential trifles and penultimate probanda, are also usually stated as binary propositions that can be shown true or false. These propositions, along with the ultimate and penultimate probanda in a Wigmorean analysis, correspond to the probabilistic variables in conventional Bayesian network analyses. I mentioned earlier that Phil's example we are now considering is considerably more complex than others usually constructed to illustrate the workings and virtues of Bayesian analyses. In my parsing of Phil's example, I have identified 30 trifles which I list below. But, as you will see, the following listing contains more than 30 items that might become relevant evidence if you buy my arguments linking them to one of the four penultimate probanda listed above. The reason is that we might obtain more than one kind of evidence regarding certain trifles. For example, DI Leary will testify to the existence of the hole cut in the metal grille at the Blackbread premises [this will justify my claim that the break-in was forced]. To corroborate this testimony, Leary would then offer a photograph showing the hole in this metal grille. There will be several instances of my including this kind of corroboration. I am not making up any new evidence here; I am just showing how the same evidence might be presented in more than one way. As the prosecutor in this case, I must try to corroborate testimonial assertions whenever I can. 3.3 Trifles in Phil's Example Here are the thirty trifles that I have identified in Phil's example. Along with each trifle, I mention the source from which it comes. Again, note that we may have corroborations of items of testimonial evidence, so the number of potential evidence items to be charted will be greater than thirty. 1. An unknown number of persons entered the commercial premises of the Blackbread Brewery in the early morning hours of 1 May, 2003. DI Leary testimony. 2. The persons entered the premises of the Blackbread Brewery by means of a hole that they cut in a metal grille. DI Leary testimony plus a photo showing the hole. 3. After entering the Blackbread premises the intruders were confronted by a security guard named Willard R. Willard R testimony. 4. Upon seeing the intruders, the security guard set off an alarm. Willard R. testimony. 5. After he set off the alarm, the security guard Willard R. was punched in the face by one of the intruders. Willard R. testimony. 6. The punch Willard R. received from one of the intruders caused Willard R's nose to bleed. Willard R. testimony plus a photo of his injury taken shortly after the incident. 7. The intruders left the Blackbread premises just as a police patrol car arrived. Willard R. testimony. 8. The intruders' getaway car left immediately at the first sound of the alarm leaving the intruders stranded. Willard R. testimony. 9. The intruders dispersed from the Blackbread premises on foot. Willard R. testimony. 10. There were four intruders. Willard R. testimony. 11. The security guard could not describe the intruders. Willard R. testimony. 12. The light was poor at the time of the intrusion. Willard R. testimony. 13. The security guard was confused because of the blow he had received. Willard R. testimony. 14. The police in the patrol car that had arrived at the Blackbread premises saw the intruders from a considerable distance away. DI Leary testimony. 15. In a search of the area surrounding the Blackbread premises, police apprehended Harold S. trying to "hot wire" a car in an ally about 1/4 mile from the Blackbread 5 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. premises. DI Leary testimony plus a photo of Harold S. taken just after he was apprehended. During a police investigation a short time after the intrusion, a tuft of red fibres was found on a jagged end of one of the cut edges of the metal grille on the Blackbread premises. DI Leary testimony plus the actual tuft of fibres to be shown at trial. A blood sample was taken from Willard R. on 1 May, 2003. DI Leary testimony. A blood sample was taken from Harold S. on 1 May, 2003. DI Leary testimony. Harold S. denial that he was one of the intruders. Harold S. testimony. Harold S denial that he punched the security guard Willard R. Harold S. testimony. Harold S. was wearing a jumper and jeans at the time of his arrest. DI Leary testimony plus the jumper and jeans to be shown at trial. A spray pattern of blood was found on the front and right sleeve of the jumper belonging to Harold S. DI Leary testimony plus the jumper to be shown at trial. The blood type of the blood on the Harold S's jumper matches the blood type of the security guard Willard R. DI Leary testimony plus tangible records of the blood match to be shown at trial. The tuft of red fibres found on the metal grille on the Blackbread premises was red acrylic. DI Leary testimony plus the tuft of fibres to be shown at trial. Harold S's jumper is made of red acrylic fibres. DI Leary testimony plus the jumper to be shown at trial. The tuft of red fibres found on the metal grille on the Blackbread premises is visually indistinguishable from the fibres on Harold S's jumper. DI Leary testimony plus the tuft of fibres and Harold S's jumper to be shown at trial. The tuft of red fibres found on the metal grille on the Blackbread premises is indistinguishable from the fibres on Harold S's jumper as shown in a microspectroflourimetry analysis. DI Leary testimony plus tangible results of this analysis to be shown at trial. The tuft of red fibres found on the metal grille on the Blackbread premises is indistinguishable from the fibres on Harold S's jumper as shown in a thin layer chromatography analysis. DI Leary testimony plus tangible results of this analysis to be shown at trial. The jumper belonging to Harold S. is well worn and has several holes in it. DI Leary testimony plus the jumper to be shown at trial. None of the holes in Harold S's jumper can be clearly identified as a possible source of the tuft found on the metal grille on the Blackbread premises. DI Leary testimony. By my count, taking into consideration the corroborating evidence to be shown at trial such as photos, jumpers, jeans, test results, and so on, there are 39 items of information that I must chart in Wigmorean terms. This is another reason why I have said that Phil's example is not a toy problem. 3.4 Marshaling Trifles Under the Given Penultimate Probanda Here is a vital stage in Wigmorean analysis that is so commonly overlooked. Even Anderson and Twining do not dwell on its importance. Given a collection of evidence such as we have in Phil's example, the first task we must perform is to marshal or organize the trifles we have under the penultimate probanda on which we believe the trifles will bear. In fact, such marshaling may be necessary in order to see what ultimate probandum and penultimate probanda we will generate in the first place. In fact, this is how I generated the ultimate and penultimate probanda in this example. So, here is how I have sorted out the trifles in this example under each one of the four penultimate probanda I have generated under the penultimate probandum U, as given above. 6 Trifles bearing On: P1: In the early morning hours of 1 May, 2003, four men unlawfully broke into the premises of the Blackbread Brewery, located at 27 Orchardson St., London N. W. 8. 1). An unknown number of persons entered the premises of the Blackbread Brewery in the early morning hours of 1 May, 2003. DI Leary testimony. 2) The persons entered the premises of the Blackbread Brewery by means of a hole that they cut in a metal grille. DI Leary testimony plus a photo showing the hole. 3) After entering the Blackbread premises the intruders were confronted by a security guard named Willard R. Willard R testimony. 4) Upon seeing the intruders, the security guard set off an alarm. Willard R. testimony. 7) The intruders left the Blackbread premises just as a police patrol car arrived. Willard R. testimony. 10) There were four intruders. Willard R. testimony. 11) The security guard could not describe the intruders. Willard R. testimony. 12) The light was poor at the time of the intrusion. Willard R. testimony. 13) The security guard was confused because of the blow he had received. Willard R. testimony. 14) The police in the patrol car that had arrived at the Blackbread premises saw the intruders from a considerable distance away. DI Leary testimony. Trifles Bearing On: P2: Harold S. was one of the four men who broke into the premises of the Blackbread Brewery in the early morning hours of 1 May, 2003. 8) The intruders' getaway car left immediately at the first sound of the alarm leaving the intruders stranded. Willard R. testimony. 9) The intruders dispersed from the Blackbread premises on foot. Willard R. testimony. 15) In a search of the area surrounding the Blackbread premises, police apprehended Harold S. trying to "hot wire" a car in an ally about 1/4 mile from the Blackbread premises. DI Leary testimony plus a photo of Harold S. taken just after he was apprehended. 16) During a police investigation a short time after the intrusion, a tuft of red fibres was found on a jagged end of one of the cut edges of the metal grille on the Blackbread premises. DI Leary testimony plus the actual tuft of fibres to be shown at trial 19) Harold S. denial that he was one of the intruders. Harold S. testimony. 21) Harold S. was wearing a jumper and jeans at the time of his arrest. DI Leary testimony plus the jumper and jeans to be shown at trial. 24) The tuft of red fibres found on the metal grille on the Blackbread premises was red acrylic. DI Leary testimony plus the tuft of fibres to be shown at trial. 25) Harold S's jumper is made of red acrylic fibres. DI Leary testimony plus the jumper to be shown at trial. 26) The tuft of red fibres found on the metal grille on the Blackbread premises is visually indistinguishable from the fibres on Harold S's jumper. DI Leary testimony plus the tuft of fibres and Harold S's jumper to be shown at trial. 27) The tuft of red fibres found on the metal grille on the Blackbread premises is indistinguishable from the fibres on Harold S's jumper as shown in a microspectroflourimetry analysis. DI Leary testimony plus tangible results of this analysis to be shown at trial. 28) The tuft of red fibres found on the metal grille on the Blackbread premises is indistinguishable from the fibres on Harold S's jumper as shown in a thin layer chromatography analysis. DI Leary testimony plus tangible results of this analysis to be shown at trial. 7 29) The jumper belonging to Harold S. is well worn and has several holes in it. DI Leary testimony plus the jumper to be shown at trial. 30) None of the holes in Harold S's jumper can be clearly identified as a possible source of the tuft found on the metal grille on the Blackbread premises. DI Leary testimony. Trifles Bearing On: P3: A security guard at the Blackbread Breweries, Willard R., was assaulted and injured during the break-in at the Blackbread Breweries on 1 May, 2003. 5) After he set off the alarm, the security guard Willard R. was punched in the face by one of the intruders. Willard R. testimony. 6)The punch Willard R. received from one of the intruders caused Willard R's nose to bleed. Willard R. testimony plus a photo of his injury taken shortly after the incident. Trifles Bearing On: P4: It was Harold S. who intentionally assaulted and injured Willard R. during the break-in at Blackbread Breweries on 1 May, 2003. 17) A blood sample was taken from Willard R. on 1 May, 2003. DI Leary testimony. 18) A blood sample was taken from Harold S. on 1 May, 2003. DI Leary testimony. 20) Harold S denial that he punched the security guard Willard R. Harold S. testimony. 22) A spray pattern of blood was found on the front and right sleeve of the jumper belonging to Harold S. DI Leary testimony plus the jumper to be shown at trial. 23) The blood type of the blood on the Harold S's jumper matches the blood type of the security guard Willard R. DI Leary testimony plus tangible records of the blood match to be shown at trial. Now, the fun begins as I attempt to construct Wigmorean arguments that will establish the relevance of each of these trifles on one or more of the four penultimate probanda in this example. 4.0 WIGMORE CHARTS AND KEY LISTS Wigmore's method for making sense out of a mass of evidence has two essential elements: analysis and synthesis. The analytic element consists of identifying all evidence items [directly relevant and ancillary evidence], an ultimate probandum, a collection of penultimate probanda, interim probanda [sources of doubt lurking between evidence and penultimate probanda], and generalizations that license links in chains of reasoning set up by directly relevant evidence. The listing and identification of these propositions is called a Key List. The synthetic element consists of constructing a chart [an inference network we would say] that shows what the person constructing the network believes are the inferential linkages among elements on a key List. So, all the nodes on the network being constructed are identified by a number that appears on the Key List. At the close of my analysis I will have some comments to make about how process models compares with the following Wigmorean analysis. For now, however, I will just mention my standpoint again. As the attorney who may eventually bring this case to trial, it is my basic job to establish the relevance, credibility and probative force credentials of the evidence we have so far on the four penultimate probanda I have identified for this example. I do this by constructing arguments from the evidence to these penultimate probanda, since what I am given is an emerging collection of evidence whose probative or credentials I am trying to establish. This is why the arrows [inferential linkages] go from the evidence to the penultimate probanda.. In the following analysis I have constructed a chart for each one of the four penultimate probanda in this 8 example. There are some problems here that I will address later on; they involve the capturing of possible conditional nonindependencies. 4.1 Chart and Key List for Penultimate Probandum P1. NOTE: on this chart, and on those that follow the numbering of nodes on a chart corresponds with the numbering of these items on its associated key list. P1 23 0 28 16 24 0 22 0 1 15 3 5 2 21 25 9 7 11 12 13 14 27 17 19 26 4 6 8 18 20 10 CHART 1 KEY LIST FOR CHART 1 P1: In the early morning hours of 1 May, 2003, four men unlawfully broke into the premises of the Blackbread Brewery, located at 27 Orchardson St., London N. W. 8. 1) An unknown number of persons entered the premises of the Blackbread Brewery in the early morning hours of 1 May, 2003. 2) DI Leary testimony to 1). 3) There were four intruders who entered the Blackbread Brewery premises. 4) Security Guard Willard R. testimony to 3) 5) Upon seeing the intruders, I set off an alarm. 6) Willard R. testimony to 5) 7) The intruders were confronted by the security guard. 8) Willard R testimony to 7). 9) I could not describe the intruders. 10) Willard R. testimony to 9) 11) The light was poor at the time of the intrusion. 12) Willard R. testimony to 11). [This is ancillary evidence] 13) I was confused because of the blow I received from one of the intruders. 14) Willard R. testimony to 13). [This is ancillary evidence]. 15) The security guard Willard R. believed the four men to be intruders on the Blackbread Brewery premises. 9 16) The four men who entered the Blackbread Brewery premises on 1 May, 2003 had no authorization to do so. 17) The four intruders left the Blackbread premises just as a police patrol car arrived. 18) Willard R. testimony to 17. 19) The police in the patrol car saw the four men from a considerable distance away. 20) DI Leary testimony to 19) 21) The four men were trying to avoid apprehension by the police. 22) The four men knew that they were not authorized to enter the Blackbread Brewery premises. 23) The entry of the four men on the premises of Blackbread Brewery was illegal. 24) The four men entered the Blackbread Brewery premises by means of a hole they cut in a metal grille on these premises. 25) DI Leary testimony to 24). 26) A photograph of the hole in the metal grille on the Blackbread Brewery premises to be shown at trial. 27) The photograph shown at trial is the same one taken by the police shortly after the break-in at the Blackbread Brewery on 1 May, 2003. [This is a necessary authentication probandum]. 28) The entry of the four men onto the Blackbread Brewery premises on 1 May, 2003 was forced. --------------------------------------------------------------------------------------------------------------------------------In Phil's example, we have enough evidence to infer the two major lines of argument concerning the break-in charge; they are given by my 23 and 28 in the above key list. On my understanding, as prosecutor I have to show that the entry of the four men onto the premises of the Blackbread Brewery was illegal and that it was forced. 4.2 Chart and Key List for Penultimate Probandum P2. P2 39 73 74 38 33 72 54 47 52 29 31 48 46 55 44 37 67 59 58 51 34 71 63 66 62 40 30 32 69 49 43 35 45 36 53 50 64 56 57 60 61 65 68 41 42 70 CHART 2 _____________________________________________________________________________ 10 KEY LIST FOR CHART 2 P2: Harold S. was one of the four men who broke into the premises of the Blackbread Brewery in the early morning hours of 1 May, 2003. 29) The intruders' car left immediately at the first sound of the alarm leaving the intruders stranded. 30) Willard R. testimony to 29). 31) The intruders dispersed from the Blackbread Brewery premises on foot. 32) Willard R. testimony to 31). 33) The four intruders went their separate ways. 34) In a search of the area surrounding the Blackbread Brewery premises, police apprehended Harold S. trying to "hot wire" a car in an alley about 1/4 mile from the Blackbread Brewery premises. 35) DI Leary testimony to 34). 36) A photo of Harold S. taken shortly after his apprehension to be shown at trial. 37) The photo shown at trial is the same one police took of Harold R. shortly after his arrest. 38) The car Harold S. was trying to "hot wire" did not belong to him. 39) Harold S. was one of the four intruders fleeing the Blackbread Brewery premises. 40) During the police investigation a short time after the intrusion, the police found a tuft of red fibres on a jagged end of one of the cut edges of the metal grille on the Blackbread premises. 41) DI Leary testimony to 40). 42) The tuft of fibres to be shown at trial. 43). The tuft of fibres shown at trial is the same one that police found on a jagged end of one of the cut edges of the metal grille on the Blackbread premises. 44) The tuft of the fibres found on the metal grille on the Blackbread Brewery premises is red acrylic. 45) DI Leary testimony to 44). 46) The tuft of red acrylic fibres found on the metal grille came from an article of clothing. 47) The article of clothing the fibres came from was being worn at the time of the break-in at the Blackbread Brewery. 48) Harold S. was wearing a jumper and jeans at the time of his apprehension. 49) DI Leary testimony to 48). 50) The jumper and jeans to be shown at trial. 51) The jumper and jeans to be shown at trial are the same ones the police took from Harold S. after his apprehension. 52) Harold S's jumper is made of red acrylic. 53) DI Leary testimony to 52). 54) Harold S. was wearing this red acrylic jumper at the time of the break-in at Blackbread Brewery. 55) The tuft of red fibres found on the metal grille on the Blackbread Brewery premises is visually indistinguishable from the fibres on Harold S's jumper. 56) DI Leary testimony to 55) 57) The tuft of fibres and the jumper to be shown together at trial. 58) The tuft of fibres and the jumper are the same ones police obtained during their investigation of the break-in at the Blackbread Brewery. 59) The tuft of red fibres found on the metal grille on the Blackbread Brewery premises is indistinguishable from the fibres on Harold S's jumper as shown by a microspectroflourimetry analysis. 60) DI Leary testimony. 61) Microspectroflourimetry analysis result to be shown at trial. 62) The microspectroflourimetry results shown at trial are the same ones police obtained from the forensic scientist ["boffin"] who performed the analysis. 63) The tuft of red fibres found on the metal grille on the Blackbread Brewery premises is indistinguishable from the fibres on Harold S's jumper as shown by a thin layer chromatography analysis. 11 64) DI Leary testimony to 63). 65) The results of the thin layer chromatography analysis.to be shown at trial. 66) The thin layer chromatography results shown at trial are the same ones police obtained from the forensic scientist who performed the analysis. 67) The jumper belonging to Harold S. is well worn and has several holes in it. 68) DI Leary testimony to 67. 69) None of holes in Harold S's jumper can be clearly identfied as a possible source of the tuft found on the metal grille on the Blackbread Premises. 70) DI Leary testimony to 69). 71) Matches of tufts to holes in fabrics is very difficult. 72) The jumper worn by Harold S. on 1 May, 2003 was torn on a hole in the metal grille at the Blackbread premises. 73) Harold S. was wearing the article of clothing that produced the tuft of red acrylic found on a jagged end of the hole cut into the metal grille at the Blackbread Brewery premises on 1 May, 2003. 74) Testimonial denial by Harold S. of P2, that he was one of four men who broke into the premises of the Blackbread Brewery in the early morning hours of 1 May, 2003. ___________________________________________________________________________ 4.3 Chart and Key List for Penultimate Probandum P3. We don't have much evidence for P3, so it will be quite simple. P3 82 75 81 77 76 80 78 79 CHART 3 _____________________________________________________________________________ KEY LIST FOR CHART 3 P3: A security guard at the Blackbread Breweries, Willard R., was assaulted and injured during the break-in at the Blackbread Breweries on 1 May, 2003. 75) After Willard R. set off the alarm he was punched in the face by one of the intruders. 76) Willard R testimony to 75). 77) The punch Willard R received from one of the intruders caused Willard R's nose to bleed. 78) Willard R. testimony to 77). 79) A photo of Willard R's injury to be shown at trial. 80) The photo shown at trial is the same one taken by the police a short time after the break-in on 1 May, 2003. 12 81) The punch Willard R. received was strong enough to cause him injury. 82) The punch Willard R. received was intended to disable him. _____________________________________________________________________________ 4.4 Chart and Key List for Penultimate Probandum P4. P4 97 96 - 83 85 95 - 87 90 - 84 86 91 - 88 89 94 92 93 - CHART 4 _____________________________________________________________________________ KEY LIST FOR CHART 4 P4: It was Harold S. who intentionally assaulted and injured Willard R. during the break-in at Blackbread Breweries on 1 May, 2003. 83) A blood sample was taken from Willard R. on 1 May,2003. 84) DI Leary testimony to 83). 85) A blood sample was taken from Harold S. on 1 May, 2003. 86) DI Leary testimony to 85). 87) A spray pattern of blood was found on the front and right sleeve of the jumper belonging to Harold R. 88) DI Leary testimony to 87). 89) The jumper showing the blood stains to be shown at trial. 90) The jumper shown at trial is the same one taken from Harold S. after his apprehension on 1 May, 2003. 91) The blood type of the blood on Harold S's jumper matches the blood type of the security guard Willard R. 92) DI Leary testimony to 91). 93) A tangible record of the blood match analysis to be shown at trial. 94) The analysis shown at trial is the same one reported by the forensic scientist who performed the analysis. 95) The blood on Harold S's jumper was not already there before the break-in on 1 May, 2003 96) The blood on Harold S's jumper came from Willard R.s nose on 1 May, 2003. 97) Harold S's testimonial denial of P4, that he was the one who punched the security guard Willard R. on 1 May, 2003. _____________________________________________________________________________ 13 5.0 PROBABILISTIC EXPERT SYSTEMS AND WIGMORE CHARTS: A COMPARISON Here is a collection of thoughts I have had as I worked through Phil's example using a Wigmorean interpretation. The different graphical approaches Phil and I have used in the example both make sense and are each useful for various purposes. By inspection, you can see that my Wigmore charts are DAGs as is Phil's process model. So, both of our structural models satisfy the basic requirement of eventual probabilistic analyses using Bayes's nets. 5.1 Decomposition Level Asked to say what the major difference is between Phil's and my analysis, I will say that it is the level of task decomposition imposed by my adopting the standpoint of a prosecuting attorney. Phil's model has 12 nodes 5, but my Wigmore charts have 102. My four Wigmore charts have one ultimate probandum, four penultimate probanda, 57 interim probanda, and 40 evidence nodes. What accounts for this difference? First, to use William Twining's description, evidential analyses in law cases have the advantage of having materiality criteria. What this means is that, once I decided upon an ultimate probandum, substantive law tells me exactly what specific elements I must prove [the penultimate probanda] in order to prove the ultimate probandum at some specified forensic standard of proof. In my present example this standard is beyond reasonable doubt since it involves a criminal case. The field of law is the only one known to me that provides such materiality criteria. The ultimate and penultimate probanda [matters to be proved] are the major sources of doubt in any case. But there are many others as well. These other sources of doubt are identified by interim probanda that are believed to lurk between our evidence and the penultimate probanda. Chains of interim probanda form the arguments from evidence to penultimate probanda. In my analysis I identified 57 interim probanda or interim sources of doubt. To use current inference network terminology, each probandum or source of doubt is a probabilistic variable. So, I have a total of 63 probabilistic variables in my analysis. Another decomposition matter concerns the parsing of evidence, which I mentioned above in Section 3.2 [page 4] As a prosecuting attorney, I do have to pay great attention to the individual "trifles" or details that items of information reveal. Some of these trifles may seem relevant [directly or indirectly] but others not relevant. To use a currently popular metaphor, attorneys [as well as intelligence analysts] have lots of "dots" to try to connect. We first have to identify what dots are available and then decide what dots we will connect. But then we must also decide which connections to make and then decide what these connections mean. In inference network terms, I must try to establish what I believe to be the probabilistic linkage patterns among the nodes on my networks. Evidential trifles are one form of "dot"; other dots come in the form of the three classes of probanda I mentioned above: ultimate, penultimate, and interim. So, one way of looking at Wigmore's analytic and synthetic methods is that they form a strategy for "connecting the dots". Our intelligence services are just now beginning to appreciate how useful these methods can be. As we found out to our great distress on 9/11/01, trifles [dots] and their connections do matter, in some cases very much. There are some troubles here for any form of inference network analysis. First, there are no uniquely correct networks possible in any kind of analysis known to me. Someone can always come along and identify a node you left out. Or, this person might quibble about how you have defined the probandum or probabilistic variable in any part of your network structure. The worst case, of course, is when a critic finds a non sequitur or disconnect in your probabilistic argument. In law, there are often choices to be made about which probandum a given item of evidence seems most relevant. And, there may even be arguments about what penultimate probanda are required in an analysis. On page 4 above, I identified what seemed to be the major charge that could be leveled at the suspect in Phil's example case. What I then did was simply to parse this ultimate probandum into the four penultimate probanda that form the basis for my four charts. I 5 See Figure 1 in reference cited in footnote 2 above. 14 did this without any knowledge of what English law might require as penultimate probanda in such a case. William Twining can advise me where I went wrong, if I did. Finally, Wigmorean methods seem to be the epitome of compulsive behavior. How much time should anyone spend in trying to identify sources of doubt that may be interposed between our evidence and what we are trying to prove from it? Wigmore would perhaps argue that such compulsive behavior is justified in trials at law when individual lives, freedom and fortunes are at stake. In the intelligence world, thousands of lives and very much fortune may be at stake. In such instances we should do our best to identify as many sources of doubt as we can. In my work with Jay Kadane on the Sacco and Vanzetti evidence I came to believe that two innocent men were convicted and executed because hundreds of sources of reasonable doubt, stemming from admitted evidence, were never exposed during their trial or during their appeals process 6. 5.2 Structural Details The most obvious feature of the four charts I have constructed for Phil's example is that they are hierarchical or tree-like structures, the single root [or trunk] being the ultimate probandum. Phil's PES structure is not hierarchical, in part because there are several roots. In examining finished Wigmore charts of any kind it seems advisable to start at the top of the chart and work downward. Thus, in my charts, the four penultimate probanda represent what are my four major lines of argument on ultimate probandum U. Now take penultimate probandum P1 as an example and ask the question: What are Dave's major lines of argument on P1? There are two, as given by my 23 and 28 in Chart 1 [page 9]. Then, take 23 and ask: What were Dave's major lines of argument on 23? Chart 1 shows that my 16 and 22 are my major lines of argument on node 23. This is how we usually grade the Wigmorean assignments we give to our law students. If there are inadequacies or non sequiturs at the top of a chart, everything else below it falls off the tree. But now comes the issue: How does one begin to construct a Wigmore chart: from the top, from the bottom, or somewhere in between? When we are given a mass of evidence and asked to make sense out of it, the obvious answer is: start at the bottom, with the evidence. This is where the virtue of careful evidence marshaling comes in, as I noted in section 3.4 [pages 6 8]. The reasoning Wigmore advocated, and which I have employed in my analysis, is from evidence to penultimate probanda. This is why the arrows or arcs on my Wigmorean networks go upward and not downward. In order to do a Bayesian analysis of one of my charts I could simply reverse the direction of the arcs in order to meet the requirements of the Bayes's nets software system I have [ERGO]. This is what Jay Kadane and I did in some of our analyses of the Sacco and Vanzetti evidence. One class of ingredients I did leave off my charts contains the generalizations that license or warrant each specific link in my chains of reasoning. Chronic sloth on my part is the only reason. Here are some examples of generalizations I could have inserted. What happens in many analyses is that generalizations are left implicit or in the background, unless a part of the argument may be especially controversial. 1) Link 2 -> 1 on Chart 1. Here DI Leary testifies that an unknown number of persons entered the premises of the Blackbread Brewery in the early morning hours of 1 May, 2003. As prosecutor, I ask the jury to believe that this event did occur. In other words, how do I justify the link between nodes 2 and 1? I assert the following generalization: "When a police officer, testifying under oath, says that an event has occurred, then this event has probably, often, usually, commonly occurred". [I would have to choose one of these hedges here]. 6 Kadane, J., Schum, D. A Rrobabilistic Analysis of the Sacco and Vanzetti EVidence. John WIley & Sons, NY, 1996. 15 2) Link 77 -> 81 on Chart 3. Node 77 says that the punch Willard R received from one of the intruders caused Willard's nose to bleed. From this I ask the jury to infer 81, that the punch Willard received was strong enough to cause him injury. As a generalization licensing this inference, I might say: "If a blow to the body causes blood to flow, then almost certainly, very often, very probably this blow resulted in an injury". It is customary in Wigmorean charting to identify nodes in ways that are consistent with the arguments the constructor is trying to establish. In my analysis, having adopted the standpoint of prosecutor, I will identify nodes by propositions I wish to prove. For example, consider node 16 in Chart 1. Here is how I identify this node on the key list for Chart 1: "The four men who entered the Blackbread Brewery premises on 1 May, 2003 had no authorization to do so". It is understood completely that there is another proposition associated with node 16 and it reads: "The four men who entered the Blackbread Brewery premises on 1 May 2003 did have authorization to do so". Recall my earlier comment about how in law we try always to describe binary event/proposition classes at each node. But only one state of each binary class is usually listed. What is given at each node would not be an appropriate probabilistic variable unless it contained two or more events/propositions. To keep key lists as simple as possible, only those events/propositions consistent with the constructor's argument are actually listed. Finally, I did notice one or two instances in which someone could argue that Phil and I have drawn different conclusions from the evidence. As an example, I will first cite the evidence of the spray pattern of blood on Harold S's jumper [my 88 and 89 on chart 4]. Phil argues that this pattern of blood sheds light on whether or not it might be a self stain 7. I agree here completely except that I state this conclusion a bit differently and base it on a different item of evidence. In my 91 -> 95 link I have the following inferential step: Because the blood type on Harold S's jumper matches the blood type of the security guard Willard R., we can infer that this blood on Harold S's jumper was not already there before the break-in on 1 May, 2003. Phil could easily argue that my 95 more appropriately belongs above my 87 rather than above my 91. I would not disagree, in part because my 83, 85, 95 and 91 would then still converge to allow the inference of 96, that the blood on Harold S's jumper came from Willard R's nose on 1 May, 2003. 5.3. Evidential Subtleties and Conditional Dependence. Wigmore was no probabilist; this would be asking too much of a person having so many other skills relating to evidence, inference and discovery. Thus, there are none of his example charts that reveal linkages that today we would say involve conditional dependence. But this does not mean at all that Wigmore charting precludes the capturing of what in conventional probability are called conditional dependence relations. This concept, in my view, is the major mechanism in ordinary probability theory [based Kolmogorov's axioms and his definition of a conditional probability] that allows us to capture for study and analysis a remarkable array of evidential and inferential subtleties. I devoted the better part of a book to the capturing of these subtleties in Bayesian terms8. It would be a major difficulty if we could not incorporate conditional dependencies in Wigmorean evidence charting. But, of course we can do so; following is an example involving the capture of an important evidential subtlety called synergism. Two or more items of evidence, taken jointly, might mean something quite different than they would do if taken separately or independently. My example comes from Chart 3. In this chart it seems that my 75 and 81 are separate or independent lines of reasoning on my 82. But, someone can easily argue: "If event 75 did occur, this would make event 81 more strongly favor event 82". Substantively, if we knew that, after Willard R. set off the alarm he was punched in the face by one of the intruders [75], this would add to the inferential force, on the intruders' intent to disable Willard [82], of knowing that the punch that Willard received was strong 7 See ref. #2 at page 227. Schum, D. Evidential Foundations of Probabilistic Reasoning. Wiley, NY, 1994; Northwestern University press, 2001 [paperback]. 8 16 enough to injure him [81]. To capture this synergistic subtlety, all I have to do is to insert a link from node 75 to node 81. Earlier I mentioned that there is a difficulty associated with breaking a Wigmore chart up into pieces or sectors. In many cases this is necessary because of the level of detail captured in the analysis. William Twining is the record-holder in such matters; he once had a student who turned in a Wigmore chart that was 37 feet in length. How to break a Wigmore chart into sectors calls for some ingenuity. Every case is different and involves careful judgment. In my present analysis I have a separate chart for each of the four penultimate probanda in the case at hand. I came close to the necessity of breaking my Chart 2 into sub-sectors in order to get it on one page. It could happen, of course, that an interim probandum in one chart could be linked to one in a different chart in order to capture some inferential subtlety. Jay Kadane and I faced this problem since we ended up with 28 sectors in our overall Wigmore chart for the Sacco and Vanzetti evidence. The conditional dependencies we did capture were confined within individual chart sectors. Thus, we may have missed some that involved interim probanda in different chart sectors. 5.4 PES and Wigmore: Common Virtues I'll close by listing some common virtues of Phil's PES methods and Wigmore charting. I believe some of these virtues to be frequently overlooked. The charting that is involved in PES and in Wigmore's methods is, I believe, a device for enhancing the process of discovery. In Wigmore evidence charting, each source of doubt identified in argument construction opens up a new line of inquiry and potential evidence. For example, consider interim probandum 38 in Chart 2. The prosecutor would be alerted by this interim probandum to verify the identity of the actual owner of the car Harold S. was trying to "hot wire". Harold might claim that the car was his and that he had simply lost his keys. The prosecutor would be quite embarrassed if, at trial, the defense produced an authentic document showing that Harold S. did own the car he was trying to "hot wire". I believe the same discovery virtues accompany Phil's PES methods. In trying to capture some complex process, a stage of this process might be generated that opens up an entirely new line of investigation that no one had previously identified. Here's another discovery-related matter about which both a PES and a Wigmore analysis can offer assistance; it concerns the sufficiency of evidence or, in Baconian terms, the completeness of coverage of available evidence on matters to be proved at trial. As a prosecutor in the case of Harold S., I would need to come up with additional lines of argument, backed by evidence, on some of the penultimate probanda in this case. My present argument on P3 seems rather skimpy. Perhaps someone looking at Phil's model, or Phil himself, might observe the necessity for adding more probabilistic variables and considering new lines of evidence. Graphical methods can certainly assist in determining the sufficiency of the ingredients some model involves. Both PES and Wigmorean methods have appeal for persons having particular standpoints. As Phil's example illustrates, the forensic scientist has different objectives than does a prosecuting attorney. For example, in the forensic sciences efforts are made to understand various physical processes that can cause the emergence of various forms of trace evidence such as blood samples, glass fragments, shell casings and so on. Having models of these processes is of great assistance in interpreting the significance of the way in which these forms of trace evidence emerged. Such information is of course vital to attorneys who will subsequently make use of this information at trial. But attorneys, such as the prosecutor in my analysis, operate under proof-related constraints that do not encumber the forensic scientist. There are evidential admissibility constraints as we all recognize. In addition, our Anglo-American trial system is adversarial and so, as a prosecuting attorney, I had to try to anticipate all the sources of doubt that the defense might raise concerning the evidence I intended to offer at trial. This is essentially what Wigmore had in the back of his mind as he devised his analytic and synthetic methods. 17 I believe that both the PES and Wigmorean methods assist attorneys in the narratives they will use in opening and closing arguments. Both methods allow attorneys [and others, such as intelligence analysts, using these models] to tell coherent and persuasive stories that are more appropriately anchored on the evidence available. But there are other stories to be told that both methods allow. In either a PES or in a Wigmorean analysis one can tell a variety of different probabilistic stories by inserting different combinations of numerical ingredients into these inferential models. Bayesian inference engines applied in either approach simple allow us to observe how each one of these stories ends. Jay Kadane and I told a wide variety of different stories about the probative force of items and collections of the Sacco and Vanzetti evidence. Some stories we told on behalf of the prosecution; others we told on behalf of the defense. Given more time, I could easily have told such probabilistic stores regarding the present case of Harold S. I would simply have applied my ERGO system to any of my four Wigmore charts. Finally, both the PES and Wigmorean analyses are devices for allowing us to make sense out of situations having great complexity. There are certain attributes of any complex process and both PES and Wigmorean methods provide ways for incorporating most of these complexity attributes in our attempts to make sense out of masses of evidence. 18