Reader Ad Slot
Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
Criminal Profiling — Part 2
Page 14
14 / 20
have nothing to lose, since all
ar appeals have been exhausted
4 no realistic hope for parole of
n exists. Finally, others may par-
te in the study because it pro-
s an opportunity to dwell on and
recapture the fantasies, memories, and
accompanying feelings of the original
offense. Whatever their reasons, noble
selfish, healthy or pathological, each
in his own way contributes something
toward understanding the variety and
complexity of this category of crime.
Statistical Procedure
The reliability and the validity of
the data retrieved from the study of
these offenders will ultimately be test-
ad by the accuracy with which predoc-
trines (offender profiles) derived from
this data pool are fulfilled. It is from
these data that various types of offend-
er profiles are beginning to emerge.
Although no two offenders are exactly
alike, and there is a wide range of
individual differences found among of-
fenders who commit similar offenses,
they also share some similarities or
common traits. It will be both these
important differences and the impor-
tant similarities that serve to differenti-
ate and_ identify different kinds or
specific types of offenders within the
same offense category.
Goals and Purposes of Program
This criminal! personality research
program is designed to contribute to
advances in the study of sexual homi-
cide—a subject about which little de-
pendable information is currently
available—by establishing a national
data bank from which reliable informa-
tion can be retrieved. From the data
derived from this research, offender
profiles will be developed based on
identifiable behaviors, traits, and char-
acteristics. The profiles, in turn, will aid
local law enforcement agencies in the
investigation of the crime and the iden-
tification and apprehension of offend-
ers. In addition, such profiles and
related information will serve to im-
prove interrogation techniques and in-
terviewing skills and to identify those
techniques which will be most produc-
tive with each type of offender.
Knowledge gleaned from this re-
search will have important implications
« an extended,
ongoing systematic
study of convicted
offenders [was
initiated] in order to
better understand the
patterns and dynamics
of criminal behavior”
for crime prevention by identifying im-
portant biopsychosocial factors of an
offender. It wilt assist by attempting to
provide answers to such questions as:
1) What leads a person to become
a sexual offender and what are the
early warning signals?
2) What serves to encourage oF to
inhibit the commission of his offense?
3) What types of response or cop-
ing strategies by an intended victim are
successtul with what type of sexual
offender in avoiding victimization?
4) What are the implications for his
dangerousness, prognosis, disposition,
and mode of treatment?
Current emphasis is on the rape-
murderer, since the Training Division
receives annually close to 100 un-
solved, sex-related homicides for re-
view and analysis. This research
program is envisioned as ultimately ex-
panding to encompass a broader vari-
ety of felony crimes to include
hostagetaking and techniques to im-
prove hostage negotiation. A further
benefit will be the improvement of
techniques of interviewing, interroga-
tion, and informant targeting in criminal
and espionage matters. The present
33
study, which addresses sexual assault,
is unique in that it represents the com-
bined approaches of law enforce-
ment/criminal justice and behavioral
science/mental health professionals,
as well as active participation and di-
rect contribution from convicted felons,
to combat this major type of serious
crime. FBI
Footnote
‘Alichard L. Ault, Jr. and James T. Reese. “A
Psychological Assessment of Crime: Profiling.” F@/ Law
Enforcement Bulletin, vol. 49, No. 3, March 1980, pp.
22-25.
Community corrections
No user corrections yet.
Comments
No comments on this document yet.
Bottom Reader Ad Slot
Bottom Reader Ad Slot placeholder
If you would like to support SpookStack without paying out of pocket, please consider allowing advertising cookies. It helps cover hosting costs and keeps the archive free to browse. You can change this choice at any time.
Continue Exploring
Agency Collection
Explore This Archive Cluster
Broad Topic Hub
Topic Hub
letter
bureau
Related subtopics
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic
Subtopic