Translate

Tuesday, December 14, 2010

THE ART OF PROFILING


-Birdy

Profiling is a psychological methodology that is used to collect information about known or unidentified individuals or groups to assess their psychological characteristics and how they relate to perpetuating a crime, participating in a behavior, or being victimized.

Introduction
Profiling originated in the nineteenth century, when anthropologists hypothesized that criminals’ psychological and physical traits could be correlated. Early efforts revealed that evaluating criminals’ behavioral patterns during a police investigation aided in understanding their motivations and predicting future crimes they might commit and victims they might choose. Such techniques encouraged law-enforcement personnel reliant on traditional criminology methods to comprehend and pursue elusive, anonymous perpetrators.

Edgar Allan Poe’s fictional detective C. August Dupin foreshadowed behavioral profiling in the 1841 short story “The Murders in the Rue Morgue.” Factual profiling received public attention in the late 1880’s in London, when police surgeon Thomas Bond profiled the serial killer Jack the Ripper by reconstructing crime scenes to study behaviors during the murders, such as covering victims’ faces with a sheet and the repetition of wound patterns. Although Bond speculated about the age, demeanor, and appearance of Jack the Ripper, no suspects were ever convicted.

During World War II, the Office of Strategic Services (OSS), the predecessor of the Central Intelligence Agency (CIA), profiled Adolf Hitler’s personality characteristics. Psychiatrist Walter Langer evaluated Hitler’s behavior to help military authorities develop a strategy to interrogate Hitler if he were captured. Langer accurately speculated that Hitler would commit suicide instead of surrendering. In later conflicts, the U.S. military utilized expert profiling of other enemy leaders such as Saddam Hussein and Osama bin Laden in an attempt to develop military plans to capture them and prevent terrorist actions they sponsored.

In the mid-twentieth century, psychiatrist James Brussels successfully profiled a serial bomber who terrorized New York City. Police were startled that profile details such as the bomber wearing a buttoned, double-breasted suit proved accurate when the criminal was apprehended.

Modern Profiling
The foundation of modern profiling is the realization that behavior reflects personality and that criminal actions satisfy the perpetrators’ psychological or physical needs. Profilers attempt to think like both criminals and victims to comprehend why and how a crime occurred, and the role played in the crime by both perpetrators and victims. Behavioral scientists recognize that although every crime is unique, human behavior matches patterns.

Affiliated with law-enforcement officers who share evidence, profilers use scientific methods supplemented with their instincts about aberrant behavior to create a psychological profile for each murderer. The serial nature of crimes such as kidnapping, rape, molestation, and arson provide profilers with patterns to examine for behavioral consistencies and deviations. Isolated incidents, such as theft, carjacking, and vandalism, are not as successfully profiled.

Computer databases have proven less reliable than profilers’ intuition about specific individuals because of the variability of factors among criminals. Profiling is constantly developing to meet law-enforcement needs. Cyber-profiling seeks to identify people who commit electronic crimes, such as hacking, based on behavior associated with that activity. Profilers choose techniques from several methods that they consider most useful.

The Federal Bureau of Investigation
In the 1960’s, Howard Teten, a California police officer, became a U.S. Federal Bureau of Investigation (FBI) special agent and collaborated with Pat Mullany, a specialist in abnormal psychology, to teach how crime-scene evidence revealed behavioral clues. Teten initiated a course on applied criminology at the FBI Academy in 1970. In the late twentieth century, the FBI’s Behavioral Science Unit (BSU) professionalized profiling as a form of forensic psychology. After Teten retired in 1978, director John Douglas and his colleague Robert Ressler emphasized organized (premeditated)/disorganized (impulsive) methodology to evaluate how criminals behaved at crime scenes.

From 1979 to 1983, BSU personnel interviewed prisoners concerning biographical information, their criminal actions, and choice of victims and sites. The BSU agents also collected court, police, and psychiatric records to compile a database useful for future profiling. The FBI’s National Center for the Analysis of Violent Crime (NCAVC), established in 1984, helped law-enforcement efforts to detect similar criminal activity in various jurisdictions.

Profiling “Anonymous”
The FBI’s Crime Classification Manual outlines how psychological profiles should be compiled and evaluated. Offender profiling focuses on the behavior of criminals and how they commit crimes, comparing these profiles with established personality types and mental disorders. Investigative profiling studies evidence from crime scenes.

Profiling is a powerful forensic tool to solve seemingly unsolvable cases. When suspects are unknown, profilers can find psychological clues in the choices the culprit made, such as selection and number of victims, crime site, weapons, and alteration of the crime scene by destroying items, displaying bodies, or taking souvenirs.

The first investigation stage involves profiling the victim and noting any associations with the assailant or what the victim might have symbolized to the attacker. Profilers hypothesize how the criminal behaved with the victim and the motivation for the crime, specifically whether it was a planned or an impulsive act and if it was based on anger and the need for power or because of a mental disorder or stimulant abuse. The assailant’s behavior before and after the crime is also explored.

The use of weapons and restraints is evaluated and offers insight into the assailant’s social skills, intellectual abilities, demographic description of race and age, and socioeconomic, marital, and employment status. Profilers speculate about the relationship the criminal has with family members and neighbors and any possible military service. Specific traits such as cowardice and feelings of inadequacy are identified in profiles.

In addition, profilers assess any messages left by the criminal for law-enforcement officers, media, or victims’ family members. They integrate police and autopsy reports and interview survivors and witnesses to consider their perspectives about the assailant’s personality. Profiles provide a psychological identity to guide law-enforcement personnel to find suspects who match specific behavioral patterns.

If they are aware of profiling, some criminals may purposefully alter their behavior to avoid apprehension, although some psychological traits are difficult to hide. Profilers look for any efforts at deception and focus on how offenders’ signatures, which are behaviors not essential to the crime but which satisfy the offender, are present at crime scenes. If a suspect is captured, the profile is essential to the interrogation process.

Investigative Psychology
In 1985, Scotland Yard requested that David Canter help incorporate psychological concepts into investigation methods. Although dubious, Canter successfully utilized environmental psychology methods to identify John Duffy as the so-called Railway Rapist. Canter’s work established investigative psychology (IP) in the United Kingdom. Like the FBI, Canter used statistical information concerning criminal offenders and offenses. His five-factor IP model focuses on how criminals and victims interact.

First, interpersonal coherence examines how criminals act with victims and is based on the assumption that they treat people similarly in both criminal and noncriminal interactions. This factor suggests that victims represent significant people to assailants, such as former spouses or parents, toward whom the criminal is expressing symbolic rage. Second, Canter states that the time and place of crimes is significant to determine facts about the criminal’s lifestyle. Third, criminal characteristics are assessed, although Canter disagrees with the FBI, saying that organized and disorganized classifications of criminals are misleading because a criminal might display both behaviors.

Fourth, Canter says profilers should consider whether assailants have previously been criminally active, and, if so, what crimes they have committed and for what duration they have engaged in a criminal career. Such experiences might have resulted in skills or behaviors demonstrated during the crime that would reduce the number of possible suspects. The final factor is forensic awareness, which assesses whether culprits are knowledgeable enough of investigation procedures for gathering evidence to wear gloves or remove incriminating items from scenes. In addition, Canter’s offender behavior model, the circle theory, describes a marauder model, in which criminals operate from a base, and a commuter model, in which assailants travel to commit crimes.

Behavioral Evidence Analysis
Brent Turvey, a California forensic scientist, developed behavioral evidence analysis (BEA). Unlike other profiling methods, BEA reconstructs criminal events rather than psychologically interpreting an offender’s behavior. By examining police, autopsy, and court records, Turvey recognizes how criminals can appear charming and gregarious but lie. His BEA profiling technique stresses that criminals frequently distort descriptions of their actions, which can influence reconstruction of their criminal behavior.

Four investigative steps occur in two phases. First, equivocal forensic analysis studies evidence to determine its most probable meaning. Second is victimology, in which the role of the victim is analyzed. The third step begins with crime scene characteristics, investigating why that location was chosen and its possible meanings to the criminal. Profilers decide if the site is a primary or secondary crime scene and if victims were moved. The final step focuses on offender characteristics, to assess the criminal’s personality based on the previous three steps.

The investigative phase of BEA occurs when profilers develop a description of an unknown criminal type who is likely to have committed a known crime to provide investigators with leads. The trial phase evaluates evidence when a suspected culprit for a specific crime is known to assist investigators in conducting interrogations.

Public Reaction
Profiling success rates range from 50 to 85 percent. Profilers must objectively examine criminals’ perceptions and how their behavior reveals their motivations without interjecting their moral values. Misrepresentations of profilers, often romanticizing them as being psychic, abound in films, television, fiction, and true-crime books. As a result, many law-enforcement officers ignore or dismiss profiling. Others rely on imprecise profiles. A 1993 profile of the Unabomber based on his victims, which suggested he was highly educated in science and held antitechnology views, was discarded in favor of a profile which said the Unabomber was a blue-collar aviation worker. As a result, the apprehension of mathematician Theodore Kaczynski was delayed because of the focus on invalid suspects.

Critics express concern that innocent people might be falsely arrested, convicted, and imprisoned based on profiles that they consider to be hunches rather than evidence. Such profiling opponents cite errors by leading profilers, including Douglas, who stresses that profiling can be fallible and should not replace a comprehensive investigation. Some people believe local investigators rather than FBI agents should profile suspects. Legal authorities note that, occasionally, organized offenders can leave a disorganized crime scene if they are committing crimes spurred by retaliation, drugs, or domestic violence. Such crime scenes might mislead profilers to describe incorrectly a perpetrator’s behavior.

Many legal courts do not permit profiles to be submitted as evidence during trials because they do not prove an individual committed a specific crime, only that the person fits the profile of someone who could have been the perpetrator.

Non-forensic Psychological Profiles
Noncriminal psychological profiling applications gauge personality characteristics compatible with professional, leisure, and consumer interests. Profiles can alert potential employers about possibly hazardous workers. They can also highlight employees who have the potential to be successful at various tasks. Psychological profiling can be incorporated into therapies to help patients understand their career and entertainment interests and modify their behavior.

Because of increased school violence, some schools are using psychological profiling to identify students who might pose safety risks. This intervention process is considered controversial because it relies on speculation and can unjustly accuse students, because no standard profile for violent students exists and children displaying identified behaviors exhibit them in varying degrees of intensity.

Some psychological profiling is unable to pinpoint assailants because of the diversity of people who exhibit shared psychological characteristics such as road rage. Racial profiling, often heightened after violent acts committed by members of a specific ethnic group, has been disputed as an ineffective way to identify possible culprits.


Sources for Further Study:

Canter, David V. Criminal Shadows: Inside the Mind of the Serial Killer. New York: HarperCollins, 1995. Discussion by a leading British authority concerning the use of environmental psychology for behavioral profiling.

Douglas, John E., with Mark Olshaker. Mindhunter: Inside the FBI’s Elite Serial Crime Unit. London: Arrow, 2006. Autobiography by a pioneer FBI profiler explaining the development and application of investigative profiling methodology.

Holmes, Ronald M., and Stephen T. Holmes. Profiling Violent Crimes: An Investigative Tool. 4th ed. Los Angeles, Calif.: Sage, 2009. Provides case studies as examples of successful psychological profiling.

Ressler, Robert K., and Tom Shachtman. I Have Lived in the Monster. New York: St. Martin’s Press, 1998. Interviews, by a leading FBI profiler, with serial killers and commentary on how such profiles aid criminal investigations.

Towl, Graham J., and David A. Crighton. The Handbook of Psychology for Forensic Practitioners. New York: Routledge, 1997. Guide for law-enforcement personnel using psychological methods.
Turvey, Brent E. Criminal Profiling: An Introduction to Behavioral Evidence Analysis. 3d ed. Boston: Academic Press/Elsevier, 2008. Comprehensive account of how psychological profiles developed by reconstructing offenders’ behavior based on crime scene evidence can help criminal investigators identify and capture culprits.

Wrightsman, Lawrence S. Forensic Psychology. 3d ed. Belmont, Calif.: Wadsworth, 2009. Describes how profiling can supplement traditional investigative techniques.

Zonderman, Jon. Beyond the Crime Lab: The New Science of Investigation. Rev. ed. New York: John Wiley & Sons, 1999. Includes information about electronic psychological profiling.

-Birdy

No comments:

Post a Comment

Please be considerate of others, and please do not post any comment that has profane language. Please Do Not post Spam. Thank you.

Powered By Blogger

Labels

Abduction (2) Abuse (3) Advertisement (1) Agency By City (1) Agency Service Provided Beyond Survival Sexual Assault (1) Aggressive Driving (1) Alcohol (1) ALZHEIMER'S DISEASE (2) Anti-Fraud (2) Aspartame (1) Assault (1) Auto Theft Prevention (9) Better Life (1) Books (1) Bribery (1) Bullying (1) Burglary (30) Car Theft (8) Carjackng (2) Child Molestation (5) Child Sexual Abuse (1) Child Abuse (2) Child Kidnapping (3) Child Porn (1) Child Rape (3) Child Safety (18) Child Sexual Abuse (9) Child Violence (1) Classification of Crime (1) Club Drugs (1) College (1) Computer (4) Computer Criime (4) Computer Crime (8) Confessions (2) CONFESSIONS (7) Cons (2) Credit Card Scams (2) Crime (11) Crime Index (3) Crime Prevention Tips (14) Crime Tips (31) Criminal Activity (1) Criminal Behavior (3) Crimm (1) Cyber-Stalking (2) Dating Violence (1) Deviant Behavior (6) Domestic Violence (7) E-Scams And Warnings (1) Elder Abuse (9) Elder Scams (1) Empathy (1) Extortion (1) Eyeballing a Shopping Center (1) Facebook (9) Fakes (1) Family Security (1) Fat People (1) FBI (1) Federal Law (1) Financial (2) Fire (1) Fraud (9) FREE (4) Fun and Games (1) Global Crime on World Wide Net (1) Golden Rules (1) Government (1) Guilt (2) Hackers (1) Harassment (1) Help (2) Help Needed (1) Home Invasion (2) How to Prevent Rape (1) ID Theft (96) Info. (1) Intent (1) Internet Crime (6) Internet Fraud (1) Internet Fraud and Scams (7) Internet Predators (1) Internet Security (30) Jobs (1) Kidnapping (1) Larceny (2) Laughs (3) Law (1) Medician and Law (1) Megans Law (1) Mental Health (1) Mental Health Sexual (1) Misc. (11) Missing Cash (5) Missing Money (1) Moner Matters (1) Money Matters (1) Money Saving Tips (11) Motive (1) Murder (1) Note from Birdy (1) Older Adults (1) Opinion (1) Opinions about this article are Welcome. (1) Personal Note (2) Personal Security and Safety (12) Porn (1) Prevention (2) Price of Crime (1) Private Life (1) Protect Our Kids (1) Protect Yourself (1) Protection Order (1) Psychopath (1) Psychopathy (1) Psychosis (1) PTSD (2) Punishment (1) Quoted Text (1) Rape (66) Ravishment (4) Read Me (1) Recovery (1) Regret (1) Religious Rape (1) Remorse (1) Road Rage (1) Robbery (5) Safety (2) SCAM (19) Scams (62) Schemes (1) Secrets (2) Security Threats (1) Serial Killer (2) Serial Killer/Rapist (4) Serial Killers (2) Sexual Assault (16) Sexual Assault - Spanish Version (3) Sexual Assault against Females (5) Sexual Education (1) Sexual Harassment (1) Sexual Trauma. (4) Shame (1) Sociopath (2) Sociopathy (1) Spam (6) Spyware (1) SSN's (4) Stalking (1) State Law (1) Stress (1) Survival (2) Sympathy (1) Tax Evasion (1) Theft (13) this Eve (1) Tips (13) Tips on Prevention (14) Travel (5) Tricks (1) Twitter (1) Unemployment (1) Victim (1) Victim Rights (9) Victimization (1) Violence against Women (1) Violence. (3) vs. (1) Vulnerable Victims (1) What Not To Buy (2)