Criminal Profiling -  Brent E. Turvey

Criminal Profiling (eBook)

An Introduction to Behavioral Evidence Analysis
eBook Download: PDF | EPUB
2011 | 4. Auflage
728 Seiten
Elsevier Science (Verlag)
978-0-12-385244-1 (ISBN)
Systemvoraussetzungen
Systemvoraussetzungen
55,99 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
Focused on Behavioral Evidence Analysis (BEA), a method of criminal profiling developed and refined by the author over the past 15 years, the fourth edition of Criminal Profiling maintains the same core foundation that made previous editions best sellers in the professional and academic community worldwide. Written from practicing behavioral analysts and aspiring students alike, this work emphasizes an honest understanding of crime and criminals. Newly updated, mechanisms for the examination and classification of both victim and offender behavior have been improved. In addition to refined approaches towards victimology, crime scene analysis, motivation and case linkage, a chapter on sexual deviance has been added as well. With prior edition in wide use as a primary text in criminal justice, law, criminology, and behavioral science programs around the world, Criminal Profiling, Fourth Edition remains essential for students and professionals alike. - Outlines the scientific principles and practice standards of BEA-oriented criminal profiling, with an emphasis on applying theory to real cases - Contributing authors from law enforcement, academic, mental health and forensic science communities provide a balance perspective - Complete glossary of key termsCompanion Web site includes all appendices from previous volumes and figure collection at http://www.elsevierdirect.com/companions/9780123852434 - Manual Web site provides an instructor's manual for each chapter, powerpoint slideshows, and case reports from Brent Turvey's work

Brent Turvey, PhD is the author of Criminal Profiling: An Introduction to Behavioral Evidence Analysis, 1st, 2nd, 3rd and 4th Editions (1999, 2002, 2008, 2011); co- author of the Rape Investigation Handbook, 1st and 2nd Editions (2004, 2011), Crime Reconstruction 1st and 2nd Editions (2006, 2011), Forensic Victimology (2008) and Forensic Fraud (2013) - all with Elsevier Science. He hold an MS in Forensic Science and a PhD in Criminology. He is a full partner, Forensic Scientist, Criminal Profiler, and Instructor with Forensic Solutions, LLC, and The Forensic Criminology Institute.Dr. Turvey also maintains a caseload of femicides (e.g., sexual homicides, gender motivated homicides), pre-femicidal violence, trafficking, and human rights cases in Latin America. Many of these are related to drug trafficking and human trafficking. This involves the implementation of the UN Model Protocol for Femicide Investigation in Latin America, with The Forensic Criminology Institute's Behavioral Science Lab (BSL). In operation since 2019, the BSL collaborates with USAID, The United Nations, and The Attorney Generals Office in Bogota DC, providing international support and training to attorneys , investigators and forensic professionals.
Focused on Behavioral Evidence Analysis (BEA), a method of criminal profiling developed and refined by the author over the past 15 years, the fourth edition of Criminal Profiling maintains the same core foundation that made previous editions best sellers in the professional and academic community worldwide. Written from practicing behavioral analysts and aspiring students alike, this work emphasizes an honest understanding of crime and criminals. Newly updated, mechanisms for the examination and classification of both victim and offender behavior have been improved. In addition to refined approaches towards victimology, crime scene analysis, motivation and case linkage, a chapter on sexual deviance has been added as well. With prior edition in wide use as a primary text in criminal justice, law, criminology, and behavioral science programs around the world, Criminal Profiling, Fourth Edition remains essential for students and professionals alike. - Outlines the scientific principles and practice standards of BEA-oriented criminal profiling, with an emphasis on applying theory to real cases- Contributing authors from law enforcement, academic, mental health and forensic science communities provide a balance perspective- Complete glossary of key termsCompanion Web site includes all appendices from previous volumes and figure collection at http://www.elsevierdirect.com/companions/9780123852434- Manual Web site provides an instructor's manual for each chapter, powerpoint slideshows, and case reports from Brent Turvey's work

Front Cover 1
Criminal Profiling An Introduction to Behavioral Evidence Analysis 4
Copyright 5
Contents 8
Foreword to the Third Edition 12
Preface to the Fourth Edition Criminal Profiling: The Imperatives of Scientific Methodology and a Behavioral Science Educatio 16
Methodology 16
Skill Identification and Development 17
Education 18
Experience 18
Bea 19
References 20
Preface to the Third Edition The Persistence of Faith-Based Profiling 22
Working for God 23
A World of Magical Thinking 28
The Power of Media 29
Belief in Psychic Phenomena 33
Profilers and Psychics: Special Powers? 37
The Problem 41
The Solution 42
References 43
Acknowledgments 44
About the Authors 46
Jansen Ang 46
Eoghan Casey, M.A. 46
Jeffery Chin 46
W. Jerry Chisum, B.S. 46
Craig M. Cooley, J.D. 47
Jodi Freeman, M.Crim. 47
Majeed Khader 47
Michael McGrath, M.D. 47
Eunice Tan 47
Angela N. Torres, Ph.D. 48
Brent E. Turvey, M.S. 48
Section 1: An Introduction to Criminal Profiling 50
Chapter 1: A History of Criminal Profiling 52
Blood Libel 55
Witches and the Medieval Inquisitions 57
Witches and Puritans (1688–1692): Goodwife Ann Glover and the Salem Witch Trials 63
Modern Profilers: A Multidisciplinary Historical Perspective 67
Summary 87
Questions 88
References 88
Chapter 2: Criminal Profiling: Science, Logic, and Cognition 90
Bias 91
Science and the Scientific Method 93
Science as Falsification 95
Critical Thinking 95
The Science of Logic 98
Induction 98
Deduction 101
Fallacies of Logic12 102
Suppressed Evidence or Card Stacking 102
Example 102
Appeal to Authority 103
Example 104
Appeal to Tradition 104
Example 105
Argumentum ad Hominem, or “Argument to the Man” 105
Example 105
Emotional Appeal 106
Example 106
Post Hoc, Ergo Propter Hoc, or “After This, Therefore Because of This” 106
Example 106
Hasty Generalizations 107
Sweeping Generalization 107
Example 107
False Precision 108
Example 108
Metacognition 111
Summary 112
Questions 112
References 113
Chapter 3: Alternative Methods of Criminal Profiling 116
Idiographic versus Nomothetic Study 117
Nomothetic Profiling and Nomothetic Profilers 120
Criminal Investigative Analysis and Criminal Profiling: What’s the Difference? 121
Organized versus Disorganized 124
The Stages of Criminal Investigative Analysis (CIA) 128
Criminal Investigative Analysis: Efficacy in Casework 129
Diagnostic Evaluations (DE) 130
Investigative Psychology (IP) 133
The Five-Factor Model 134
Geographic Profiling 136
Lazy Criminals: The Least Effort Principle 136
Distance Decay 137
The Circle Theory 137
Limitations of Geographic Profiling 139
Geoprofiling Unit Closed 139
Geoprofiling the D.C. Sniper(s) 140
Conclusion 143
Summary 144
Questions 145
References 145
Chapter 4: Forensic Psychology, Forensic Psychiatry, and Criminal Profiling 150
Psychology and Psychiatry 151
Insanity and Competency to Stand Trial 152
Case Example: Andrea Yates 152
Case Example: Jeffrey Dahmer 155
Case Example: O. C. Smith 156
Psychics 161
Forensic Psychologists and Psychiatrists as Profilers 162
Practice Is an Art 163
Need for Critical Thinking 163
Independent Analysis 164
Review of All Available Data 164
Reliance on the Facts of a Particular Case or Cases 164
Need to Avoid Advocacy 164
Contextual Differences 164
Ethical Practice 165
What Would a Forensic Psychiatrist or PsychologistNeed to Competently Profile? 165
Role of the Forensic Psychologist or Psychiatrist as Profiler 165
Psychological Pitfalls and the Profiler 166
Bias 166
Transference 166
Projection 166
Summary 167
Questions 167
References 168
Chapter 5: An Introduction to BehavioralEvidence Analysis 170
The Inference of Traits 171
Behavioral Evidence Analysis (BEA) Defined 172
Forensic Analysis (A.K.A. Equivocal Forensic Analysis) 173
Forensic Victimology 174
Crime Scene Analysis 174
Behavioral Evidence Analysis: Goals and Purpose 174
Behavioral Evidence Analysis: Contexts 175
Investigative Phase 176
Primary Goals 176
Trial Phase 176
Primary Goals 176
Behavioral Evidence Analysis Thinking Strategies 177
Life Experience 177
Intuition 178
Avoid Moral Judgments 178
Common Sense 178
The Principles of Behavioral Evidence Analysis 178
Behavioral Evidence Analysis Standards of Practice 181
Summary 188
Questions 188
References 188
Chapter 6: An Introduction to Crime Scene Analysis 190
Forensic Assessment/Equivocal Forensic Analysis 193
Purpose 193
Inputs 198
Crime Scene Video 198
Crime Scene Photos 199
Investigators’ Reports 199
Crime Scene Sketches 200
Crime Scene Evidence Logs and Evidence Submission Forms 200
Results of Forensic Analysis 200
Medical Examiner’s and Coroner’s Reports 200
Autopsy Photos 201
Sexual Assault Protocol 201
Written and Taped Statements from Witnesses and Victims 201
Results 202
Corpus Delicti 202
Modus Operandi 202
Signature Behavior 203
Linking the Suspect to the Victim 204
Linking a Person to a Crime Scene 204
Disproving or Supporting a Witness’s Testimony 204
Identification of a Suspect 204
Providing Investigative Leads 205
The Threshold Assessment 205
Why a Threshold Assessment? 206
Summary 207
Questions 207
References 207
Section 2: Forensic Victimology 210
Chapter 7: Forensic Victimology 212
Challenges 213
Forensic Victimology and the Scientific Method 214
Victim Background/History 214
Avoiding Logical Fallacy 216
Goals of Forensic Victimology 217
Victim Exposure Analysis 219
Categorizing Victim Exposure 219
Lifestyle Exposure 221
Careers 222
Afflictions 222
Personal Traits 223
Assessing Lifestyle Exposure 223
Situational/Incident Exposure 224
Assessing Situational Exposure 226
Case Example: Paige Birgfeld 226
Victimology Guidelines 231
Personal Package 231
Digital Package 232
Residence Package 232
Relationship Package 232
Employment Package 232
Financial Package 233
Medical Package 233
Court Package 233
Creating a Timeline: The Last 24 Hours 234
Summary 234
Questions 235
References 235
Chapter 8: Sexual Deviance 236
Everybody Lies 237
Defining Deviant Sexual Behavior 238
Modern Sexual Development 238
Sexual Arousal 243
Sexual Fantasy 243
Pornography 245
Historical Access to Porn 246
Porn as Harmful 246
Porn as Mainstream 250
Deviant Sexual Behavior 251
Exhibitionism 251
Fetishism 252
Sexual Coercion 253
“Open” Relationships 253
Infidelity 255
Sadomasochism 257
Sexual Asphyxia and Autoerotic Asphyxia 258
Summary 258
Questions 259
References 259
Chapter 9: Sexual Asphyxia 262
Problem with Sexual Asphyxia 263
Nature of Sexual Asphyxia 265
Demographics 269
Findings at the Death Scene 272
Findings at Autopsy 274
Findings of Psychological Autopsy 275
Female Sexual Asphyxia 275
Differentiating between Accidental Death from Sexual Asphyxia and Other Causes 276
Sexual Homicide with Asphyxia: A Lethal Hookup 277
Summary 280
Questions 280
References 280
Chapter 10: False Reports 284
Historical Context 286
High-Profile Cases 287
Frequency of Cases 288
Motivations 290
Profit 290
Anger and Revenge 290
Crime Concealment 291
Concealment of Illicit Activities 291
Mitigation of Responsibility 291
Mental Defect—A Contributing Motivational Factor 291
Types of False Reports 292
False Report of Murder 292
False Report of Kidnapping 292
False Report of Rape and Sexual Assault 293
False Report of Child Abuse and Neglect 293
False Report of Hate Crimes 293
False Report of Robb 294
False Reports for Insurance Fraud 294
False 911 Calls 295
Conclusion 296
Summary 296
Questions 296
References 296
Section 3: Crime Scene Analysis 300
Chapter 11: An Introduction to Crime Reconstruction 302
Approaching the Reconstruction 304
Crime Reconstruction and Experience 305
Reason, methods, and confidence 307
Event Analysis 308
The Role of Evidence: Reconstruction Classifications 309
Evidence dynamics 315
Dynamic Influences: Pre-Discovery 316
The Other Side of the Tape 316
The Crime Scene 317
Example 317
Offender Actions 317
Staging 318
Victim Actions 320
Secondary Transfer 320
Witnesses 320
Weather/Climate 321
Hurricane Katrina 321
Decomposition 322
Insect Activity 322
Animal Activity/Predation 322
Fire 323
Fire Suppression Efforts 323
The First Responder/Police Personnel 323
The Emergency Medical Team 323
Security 324
Dynamic Influences: Post-Discovery 325
Failure to Search or Recover 326
Evidence Technicians 326
Coroner/Medical Examiner 326
Premature Scene Cleanup 326
Packaging/Transportation 326
Storage 327
Examination by Forensic Personnel 327
Premature Disposal/Destruction 328
Chain of Custody/Chain of Evidence 328
The Case of Jamie Penich 329
Questioning the Evidence Dynamics 332
Evidence Dynamics: The Influence of Future Technologies 333
Conclusion 334
Summary 334
Questions 334
References 335
Chapter 12: Crime Scene Characteristics 336
Limitations 338
Utility 338
Location Type 339
Location of the Scene 339
Crime Scene Type 339
Primary Crime Scene 340
Secondary Crime Scene 340
Intermediate Crime Scene 340
Victim Location 342
Victim Selection 342
Targeted Victim 343
Opportunistic Victim 343
Point of Contact 343
Method of Approach 344
Surprise 344
Con 344
Pre-Existing Trust 344
Method of Attack 345
Blitz 345
Use of Force 345
Lethal Force 346
Administrative Force 346
Brutal Force 346
Overkill 347
Control-Oriented Force 347
Corrective Force 347
Defensive Force 347
Precautionary Force 347
Experimental Force 348
Physical Torture 348
Sexual Force 348
Methods of Control 348
Control-Oriented Force 348
Verbal Threat of Controlling, Punishing, Sexual, or Lethal Force 349
Unarticulated Presence of the Physical Threat of Controlling,Punishing, Sexual, or Lethal Force 349
Weapon and Wounds 349
Blunt-Force Trauma 350
Burns 350
Sharp-Force Injury 350
Gunshot Wounds 350
Therapeutic and Diagnostic Wounds 351
Postmortem versus Antemortem Wounds 351
Victim Response 351
Victim Compliance 351
Victim Resistance 351
Nature and Sequence of Sexual Acts 352
Time 353
Multiple Offenders 353
Planning/Preparation 353
Precautionary Acts 353
Missing Items 354
Evidentiary Items 355
Valuables 355
Personal Items 355
Opportunistic Elements 356
The Body 357
Staging 357
“Appears Staged” 357
Verbal Behavior/Scripting 358
Summary 358
Questions 359
References 359
Chapter 13: Interpreting Motive 360
Rationale 362
Motive: Crime Scene State or Offender Trait? 363
Crime Scene Motives 363
Offender Motivation 363
Theories of Motive 364
Motive vs. Intent 365
The Behavioral-Motivational Typology 366
Power Reassurance Behavior (Compensatory) 367
Verbal Behavior 367
Sexual Behavior 367
Physical Behavior 367
MO Behavior 368
Signature Behavior 368
Power Assertive Behavior (Entitlement) 368
Verbal Behavior 368
Sexual Behavior 369
Physical Behavior 369
MO Behavior 369
Signature Behavior 369
Anger Retaliatory Behavior (Anger or Displaced Anger) 370
Verbal Behavior 370
Sexual Behavior 370
Physical Behavior 370
MO Behavior 370
Signature Behavior 371
Sadistic Behavior (Anger Excitation) 371
Verbal Behavior 371
Sexual Behavior 372
Physical Behavior 372
MO Behavior 372
Signature Behavi 373
Administrative Behavior (Instrumental) 373
Profit-Oriented Behavior 373
Verbal Behavior 373
Sexual Behavior 373
Psychological Crime Scene Tape 375
Contributing Motivational Factors 376
Summary 377
Questions 378
References 378
Chapter 14: Case Linkage 380
Evidentiary Thresholds 381
Modus Operandi 382
Elements of Modus Operandi 384
Influences on Modus Operandi 385
Fortifying Factors 385
Destabilizing Factors 387
X-Factors 388
MO in Court: Case Example 388
Offender Signature 392
Offender Psychodynamics 392
Signature Behavior 393
Repetition 393
Active and Passive Signature Behaviors 394
Limitations 394
Signature Patterns 394
Recognizing Offender Signature 395
Case Linkage: Offender Signature in Court 395
Distinguishing MO and Signature Behavior 396
Interpreting Behavioral Linkage 397
Behavioral Dissimilarity 398
An Investigative Linkage 398
Behavioral Commonality 398
Probative Link 398
New Jersey v. Steven Fortin 399
Case Example: Commonwealth of Massachusetts v. Timothy Imbriglio 405
Summary 408
Questions 408
References 408
Chapter 15: Cyberpatterns: Criminal Behavior on the Internet 410
Crime and Computers 411
Cybertrails 413
Profiling Computer Criminals 416
Psycholinguistic Analysis of Digital Communications 418
Digital Behavior of Unknown Offenders 418
Managing Offender Behavior 421
Victimology 421
Deductive Profiling of Computer Intruders 423
Summary 425
Questions 426
Acknowledgments 426
References 426
Chapter 16: Fire and Explosives: Behavioral Aspects 428
Definitions 429
Limitations 430
Fire and Explosives use as Force 432
Victimology 432
Individuals 433
Groups 433
Property: Objects and Symbols 433
Crime Scene Characteristics 434
Accelerants and/or Explosive Material 434
Point of Origin 434
Method of Initiation 435
Nature and Intent 435
Offender Skill 436
Motivation 436
Applying the Behavior-Motivational Typology 437
Precautionary-Oriented Fire Setting and/or Explosives Use 438
The Profile of a Serial Arsonist? The Case of Allen Wayne Penson 439
Background 439
Behavioral Issue 439
Court Ruling 440
Discussion 440
The Murder of Melanie Richey: Pipe Bomb 440
Background 440
Use of Explosives 442
Rape-Homicide: Arson for Crime Concealment 443
Insurance Fraud: Arson for Profit 444
Crack, Domestic Violence, and Arson 444
Background 445
Admissibility Issues 446
Use of Fire 447
Summary 447
Questions 448
References 448
Section 4:Offender Characteristics 450
Chapter 17: Inferring Offender Characteristics 452
The Homology Debacle 454
Purpose 454
Criminal Profiling and Criminal Identity 456
Deducing Offender Characteristics 458
Evidence of Criminal Skill 461
Example 461
Knowledge of the Victim 462
Knowledge of the Crime Scene 462
Example: Intimate Fetish Burglary 463
Knowledge of Methods and Materials 463
Problem Characteristics 464
Age 464
Example (from Sugawara, 1997) 464
Sex 465
Intelligence 465
The Written Profile 466
Criminal Profiling and Daubert 466
Testing and Falsifiability 467
Peer Review and Publication 467
Error Rates 469
General Acceptance 470
Recommendations 470
Criminal Profiling in Court 471
Criminal Profilers in Court 472
The Problems 472
Misperceptions 473
Lack of Restraint 473
Virginia v. Shermaine Ali Johnson (1998) 473
Background 474
Expert and Opinion 474
Issue 474
Court Ruling 474
Discussion 474
Tennessee v. William R. Stevens (2001) 475
Background 475
Expert and Opinion 475
Issue 477
Court Ruling 477
Discussion 478
United States v. Gordon E. Thomas ii (2006) 479
Background 479
Expert and Opinion 479
Court Ruling 483
Discussion 489
The Future of Criminal Profiling in Court 489
Wisconsin v. Peter Kupaza (2000) 489
Summary 494
Questions 494
References 494
Chapter 18: Psychopathy and Sadism: Interpreting Psychopathic and Sadistic Behavior in the Crime Scene 496
Psychopathy 498
Psychopathic Characteristics 499
Lack of Empathy 500
Conning/Manipulative 501
Criminal Versatility 501
Failure to Accept Responsibility for Actions 501
Glib and Superficial 501
Grandiose Sense of Self-Worth 501
Impulsivity 502
Lack of Remorse or Guilt 502
Poor Behavioral Controls 502
Motivations 502
Case Examples 503
Profile of a Psychopath: United States v. Aquilia Barnette (2000) 503
Background 504
Behavioral Determination 505
Discussion 506
Crawford Wilson: Psychopathic Rapist 507
Behavioral Determination 508
Discussion 508
Leon James Preston: Juvenile Sex Offender 508
Behavioral Determination 509
Discussion 509
Sadistic Behavior 509
Background 510
Sadism: An Applied Standard 511
Confusion of Sadism and Lustmurder 512
Definitions in the Literature 513
Case Examples 515
Non-Sadistic Cases 515
Jerome Brudos 515
Nathaniel Code 517
Ted Bundy 518
Jack the Ripper 519
Sadistic Cases 520
Neville G. C. Heath 520
Paul 521
Generalized Behavioral Assumptions 521
Rape 521
Anal Assault 522
Strangulation 523
Biting 523
Killing the Victim 523
Killing a Victim in Front of Another Victim 524
Postmortem Mutilation 524
Expressing “Sadistic” Tendencies in a Post-Offense Interview 524
Conclusion 525
Summary 526
Questions 526
References 527
Chapter 19:Sex Crimes 530
The Historical View 532
Consent 533
Age 533
Drugs and Alcohol 534
Physical or Mental Disability 535
Types of Sex Crimes 535
Rape/Sexual Assault 536
Child Molestation 536
Bestiality 539
Voyeurism 540
Fetish Burglary 541
Necrophilia 542
Prostitution/Soliciting/Sex Trafficking 544
Developmental issues 546
Female Sex Offenders 546
Sex Crimes and Communications Technology 548
Virtual Worlds and Exploitation 549
“Sexting” as a Crime 551
Summary 552
Questions 552
References 553
Chapter 20: Domestic Homicide 556
Risk and Exposure 557
Pregnancy as a Risk Factor 559
The Dynamics of Abusive Relationships 561
Intent 563
Intimate Homicide 564
Domestic Child Homicide 564
Honor Killings 565
Domestic elder homicide 565
Discussion 566
Summary 567
Questions 567
References 567
Chapter 21:Mass Murder 570
Mass Murder Versus Genocide 571
Mass Murder and the Media 572
Myths 573
Nomothetic Profiles of Mass Murder 575
Nomothetic Data: Numbers and Averages 576
Types of Mass Killers 577
Mass Murder Protocols 579
Summary 580
Questions 580
References 580
Chapter 22:Serial Cases: Investigating Pattern Crimes 582
Case Example: Brent J. Brents 584
Terms and Definitions 590
Serial in Nature 591
Serial Homicide 591
Media and the Serial Murderer Archetype 592
Serial Killer Myths 594
Gary L. Ridgway: The Green River Killer 596
Serial Rape 601
Rapist Motivation 602
Sex and Lovemaking 603
Sex and Shoplifting 603
Uniting 604
Dividing 604
Power 604
Anger 605
Sadism 605
Case Examples 605
Terrance Bolds: Serial Rape and Burglary 605
Steven Sera: Serial Rape and Rohypnol 607
Evaluating Serial Behavior 608
Victim/Target Selection 608
Offender Departure Strategy 609
Disposal Site Aspects 610
Convenience Aspect 610
Remorse Aspect 610
Preselected Aspect 610
Precautionary Aspect 610
Staged Aspect 610
Arranged Aspect 610
Solving Cases 611
Using the Media 612
Task Force Pra 612
Problems 612
Solutions 613
Conclusion 615
Summary 615
Questions 616
References 616
Chapter 23:Introduction to Terrorism: Understanding and Interviewing Terrorists 618
Nomothetic Terrorist Profiles: Oversimplified, Uninformed, and Unadaptive 620
Interviewing Terrorists: Suggestions for Investigative Interviews 623
Terrorism Research: A Brief Background 623
Profiling Terrorists: An Impossible Task? 624
Suggested Strategies for Rapport-Based Interviews 625
Adopt Good Standards for Investigative Interviewing before Commencing 625
Torture Does Not Make for a Good Investigation 625
A Terrorist May Have Different Needs than a Criminal 627
Respect Begets Respect 628
Interviewer–Interviewee Matching 628
Attempt to Understand the Cultural Background of the Interviewee 628
Understand Some of the Jargon or Language Used by Your Interviewee 629
Talk to the Individual, but Don’t Forget the Group That’s Behind Him 629
Attempt to Understand the Interviewee’s Idiological Beliefs 630
Expect Deception and Learn to Be a Better Lie Detector 630
Conclusion 630
Summary 631
Questions 631
References 631
Appendix: Threshold Assessment Homicide of Armida Wiltsey 634
Purpose 634
Case Materials 635
Background 635
Timeline 636
Tuesday, November 14, 1978 636
Wednesday, November 15, 1978 636
Victimology 636
Victim Exposure 638
Crime Reconstruction 638
Findings 639
Discussion 639
Crime Scene Characteristics 641
Motivation 644
Offender Characteristics 645
Knowledge of Crime Scene 645
Knowledge of Victim 645
Knowledge of Methods and Materials 645
Evidence of Criminal Skill 646
Physical Characteristics 646
Investigative Suggestions 646
References 647
Section 5: Professional Issues 648
Chapter 24: Ethics and the Criminal Profiler 650
When Profiling Harms 652
Colin Stagg 652
Richard Jewell 653
Ethical Guidelines for the Criminal Profiler 655
The Media and Entertainment Industry: Conflicts of Interest 656
Books, Films, and TV 656
True Crime 657
News Agencies 657
Case Example: Murdertainment 658
High Station: Abusing Positions of Power 658
Ethics in Publishing 659
Example: Assuming or Inferring Legal Guilt for Research Purposes 659
Criminal Profiling and Forensic Fraud 661
Simulators 661
Case Example: JonBenet Ramsey 661
Dissemblers 662
Case Example: Waco 663
Case Example: Fabrication of Credentials and Experience 665
Case Example: Misrepresentation of Multiple Professional Credentialsand Affiliations 671
Solutions 673
Summary 673
Questions 674
References 674
Chapter 25:Criminal Profiling on Trial 676
Introduction 677
Criminal Profiling: From Categorizing to Individualizing Offenders 678
Traditional or UNSUB Profiling 678
Modern-Day Profiling: Motivational Analysis and Linkage Analysis 679
Motivational Analysis 680
Linkage Analysis 681
Admissibility Standards: From General Acceptance to Gatekeeping Judges 683
Criminal Profiling’s Empirical Proof, Relevance, and Predictability 685
Motivational Analysis 686
UNSUB Profiling 687
Linkage Analysis 688
Profiling in the Courts 690
Traditional UNSUB Profiling 690
Excluding Courts 690
Motivational Analysis 691
Admitting Courts 691
Excluding Courts 693
Linkage Analysis 695
Admitting Courts 695
Excluding Courts 696
Harmless Error Courts 697
Conclusion 698
Summary 699
Acknowledgments 701
Questions 701
Glossary 702
Index 712

Foreword to the Third Edition


—W. Jerry Chisum

Men of genius do not excel in any profession because they labor in it, but they labor in it because they excel.

—William Hazlitt (1778–1830)

In the 1970s, I was introduced to profiling at the FBI Academy when several classes were taught to the American Society of Crime Lab Directors. I saw this field as an adjunct to crime scene investigation and I had a great deal of enthusiasm for its merits. Later in my career, I worked with the FBI-trained profiler for the California Department of Justice (CA DOJ) and even considered transferring out of the crime lab business to follow a similar path. The successor to the original DOJ profiler caused me to rethink my position.

In the early years of profiling’s development at the FBI, the public knew little about the actual methods used by profilers, or that there were such things as profilers at all. They perhaps knew, for example, that a profiler had helped with the Atlanta Child Murders, but little else. It was the later films based on the works of author Thomas Harris that caught the public eye and caused profiling to become a profession of interest; in particular, Mindhunter (1986) and Silence of the Lambs (1991). As a direct result of these and other similar films, and of the TV shows that came after, ike UNSUB (Unknown Subject), Millennium, Profiler, and more recently Criminal Minds, more than a few criminal justice students have been inspired to become profilers.

However, many of the television programs became more supernatural in their orientation, with the profiler having “flashes” of the crime as it had occurred. This did not provide a real sense of what profilers actually can and cannot do. Profiles do not come in a flash or vision; they take long hard work examining physical and behavioral evidence. This was something that I wanted my own students to understand.

During the 1990s, when I worked for CA DOJ, I often invited our DOJ profilers to lecture in my crime reconstruction class. They had been trained by the FBI and could explain some of the methods and services that were available. On one such occasion, one of my students asked, “What happens if there are different opinions or interpretations about a profile?” The profiler responded, in essence, “That could never happen. We get together before a report is finalized and all come to an agreement.” The “we” referred to the DOJ profiler and the FBI profiling unit back in Quantico. Bear in mind, this statement was made to a class of forensic scientists; all of them were criminalists with at least 10 years in crime labs, and who actively responded to crime scenes. We were shocked that there could not be different opinions about the same evidence. That everyone must reach a consensus before an FBI-style profile could be drawn up was unbelievable.

Criminalists frequently disagree about the interpretation of physical evidence and do not always reach consensus. You can’t compromise a physical fact, just the interpretation. And interpretations can vary.

For someone interpreting the characteristics of a person committing a crime to say that all profilers (in the field and back at Quantico) must reach agreement before a report could be written just blew our minds. While this tradition builds consensus and squashes dissent (and lets it appear as though the final report has passed a form of peer review), it’s fairly bad practice. At that moment, my class realized that FBI-style profiling was not an infallible discipline, despite what we were previously led to believe. Good science dictates that we cannot always agree; there must be room for differing opinions and interpretations. As Samuel Butler wrote,1

Then he saw also that it matters little what profession, whether of religion or irreligion, a man may make, provided only he follows it out with charitable inconsistency, and without insisting on it to the bitter end. It is in the uncompromisingness with which dogma is held and not in the dogma or want of dogma that the danger lies.

The pioneering work done by the FBI in forming their profiling group was certainly groundbreaking and commendable. However, as is too often believed within closed law enforcement circles, they considered themselves somehow unique, considerable, and exceptional. FBI profilers continue to believe that criminal profiling can only be performed by those trained in a very specific program by the FBI or by those who have “apprenticed” under an FBI-trained profiler. The exclusivity of the group has rendered it just that—a closed society of narrow-thinking law-enforcement investigators. Ironically, they were and are actually treading in the realms and research of other established professionals: forensic scientists, forensic psychologists, forensic psychiatrists, and criminologists. And being a closed circle working outside of their actual profession (the formal education and actual experience of FBI profilers varies greatly), they don’t always know what they are doing or when they are wrong. With a propensity for quashing dissent and everyone having to agree all the time, I guess it’s not a surprise that their methods haven’t changed substantially in three decades.

Film, television, and good public relations by the FBI have continued to inspire students toward criminal profiling as a career choice. However, even in the mid 1990s, there were no organized programs of study, no specific practice standards or principles, and the only publicized route was through law enforcement—specifically the FBI. For those students unfamiliar with the players and the field, there was no visible profession to enter. This remains a problem for students interested in FBI profiling, because the FBI has fewer than 20 “profilers” working for them at any given time—and they often don’t even call themselves profilers anymore.

What does it take for a vocation to become a profession? Is forensic science a profession? This basic question has caused many heated discussions at forensic science meetings. According to one definition, which is as good as anything I’ve seen,2

A profession is an occupation that requires extensive training and the study and mastery of specialized knowledge, and usually has a professional association, ethical code and process of certification or licensing.

In many legal regimes that have “regulated professions” the issues of “public safety” or “client welfare”, harm, ethics, accreditation or credentialing, licensing, peer discipline, special knowledge, judgment, training, practical experience and oaths of conduct are common to the regulated professions. One or more of these factors may suffice to distinguish the profession from a related trade. The professional is obligated and sworn to exercise expert judgment on behalf of the client’s interest. The client is not usually assumed to understand the complexities of the professional’s special knowledge domain.

In the Preface to the First Edition of this textbook (1999), Brent Turvey wrote that criminal profiling “has not yet achieved the status of a profession.” He then gave several reasons why. However, in the past few years there have been developments that may have overcome his reasoning, not the least of which is that Dr. Saferstein correctly refers to the field as the “profiling profession” at the end of the first paragraph of the Foreword to the First Edition.

When Brent Turvey first moved to California, criminalist Keith Inman told him “his first onus was to his profession.”3 That made an impression on him. The public face of criminal profiling was at that time almost exclusively law enforcement. The only entry, it was often stated, was through law enforcement, and within that construct only a few were allowed to become profilers. Brent did his homework and realized that there was a community of professionals already practicing criminal profiling beyond this narrow scope, and he saw the need to bring them together.

In 1998, after he finished the manuscript for the first edition of this book, Brent reached out to a group of forensic scientists, mental health professionals, and investigators. He wanted them to meet with him under one roof. The group included NYPD Detective John Baeza, ex-FBI profiler Mike Chamberlin, Dr. Michael McGrath, and myself. The subject of discussion was the formation of a professional association for profilers. The result of that meeting was the formation of the Academy of Behavioral Profiling (ABP). The ABP was the first independent professional organization for criminal profilers, with firm educational requirements and a published code of ethics. Brent took the additional measure of inviting several people from various parts of the world to participate in the formation of the association. The first step was taken to establish profiling as a profession: an association.

The ABP has various levels of membership, from students to affiliates, to full members in the investigative, forensic, behavioral, criminological, or general sections. The membership, currently almost 200 strong, is able to participate in an on-line forum for discussion of events in the field, to attend the ABP’s annual meeting, and to publish their work in the Journal of Behavioral Profiling.

Full membership requires, among other things, an examination—the Profiling General Knowledge Exam (PGKE). The exam was designed by an international committee of...

PDFPDF (Adobe DRM)
Größe: 26,1 MB

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

EPUBEPUB (Adobe DRM)
Größe: 4,8 MB

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: EPUB (Electronic Publication)
EPUB ist ein offener Standard für eBooks und eignet sich besonders zur Darstellung von Belle­tristik und Sach­büchern. Der Fließ­text wird dynamisch an die Display- und Schrift­größe ange­passt. Auch für mobile Lese­geräte ist EPUB daher gut geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich

von Frank Neubacher

eBook Download (2023)
Nomos Verlagsgesellschaft mbH & Co. KG
26,90