Since the 1970s, investigative profilers at the FBI's Behavioral Science Unit (now part of the National Center for the Analysis of Violent Crime) have been assisting local, state, and federal agencies in narrowing investigations by providing criminal personality profiles.An attempt is now being made to describe this criminal-profile-generating process. A series of five overlapping stages lead to the sixth stage, or the goal of apprehension of the offender: (1) profiling inputs, (2) decision-process models, (3) crime assessment, (4) the criminal profile, (5) investigation, and (6) apprehension. Two key feedback filters in the process are (a) achieving congruence with the evidence, with decision models, and with investigation recommendations and (b) the addition of new evidence.
You wanted to mock yourself at me!You did not know your Hercule Poirot. He thrust out his chest and twirled his moustache.
I looked at him and grinnedAll right then, I said. Give us the answer to the problemsif you know it.
But of course I know it.
Hardcastle stared at him incredulously. Excuse me. Monsieur Poirot, you claim that you know who killed three people. And why?All you mean is that you have a hunch.
I will not quarrel with you over a wordCome now, Inspector. I knowreally knowI perceive you are still sceptic. But first let me say this. To be sure means that when the right solution is reached, everything falls into place. You perceive that in no other way could things have happened.
(Christie 1963, pp. 22728)
The ability of Hercule Poirot to solve a crime by describing the perpetrator is a skill shared by the expert investigative profiler. Evidence speaks its own language of patterns and sequences that can reveal the offender's behavioral characteristics. Like Poirot, the profiler can say, I know who he must be.
This chapter focuses on the developing technique of criminal profiling. Special agents at the FBI Academy have demonstrated expertise in crime scene analysis of various violent crimes, particularly those involving sexual homicide. This section discusses the history of profiling and the criminal-profile-generating process and provides a case example to illustrate the technique.
INTRODUCTION: HISTORY OF CRIMINAL PROFILING
Criminal profiling has been used successfully by law enforcement in several areas and is a valued means by which to narrow the field of investigation. Profiling does not provide the specific identity of the offender. Rather, it indicates the kind of person most likely to have committed a crime by focusing on certain behavioral and personality characteristics.
Profiling techniques have been used in various settings, such as hostage taking (Reiser 1982). Law enforcement officers need to learn as much as possible about the hostage taker in order to protect the lives of the hostages. In such cases, police are aided by verbal contact (although often limited) with the offender and possibly by access to his family and friends. They must be able to assess the subject in terms of what course of action he is likely to take and what his reactions to various stimuli might be.
Profiling has been used also in identifying anonymous letter writers (CaseyOwens 1984) and persons who make written or spoken threats of violence (Miron and Douglas 1979). In cases of the latter, psycholinguistic techniques have been used to compose a threat dictionary, whereby every word in a message is assigned, by computer, to a specific category. Words as they are used in the threat message are then compared with those words as they are used in ordinary speech or writings. The vocabulary usage in the message may yield signature words unique to the offender. In this way, police may be able not only to determine that several letters were written by the same individual but also to learn about the background and psychology of the offender.
Rapists and arsonists also lend themselves to profiling techniques. Through careful interview of the rape victim about the rapist's behavior, law enforcement personnel begin to build a profile of the offender (Hazelwood 1983). The rationale behind this approach is that behavior reflects personality, and by examining behavior the investigator may be able to determine what type of person is responsible for the offense. For example, common characteristics of arsonists have been derived from an analysis of the data from the FBI's Crime in the United States (Rider 1980). Knowledge of these characteristics can aid the investigator in identifying possible suspects and in developing techniques and strategies for interviewing them. However, studies in this area have focused on specific categories of offenders and are not yet generalizable to all offenders.
Criminal profiling has been found to be of particular usefulness in crimes such as serial sexual homicides. These crimes create a great deal of fear because of their apparently random and motiveless nature, and they are also given high publicity. Consequently, law enforcement personnel are under great public pressure to apprehend the perpetrator as quickly as possible. At the same time, these crimes may be the most difficult to solve, precisely because of their apparent randomness.
While it is not completely accurate to say that these crimes are motiveless, the motive may all too often be one understood only by the perpetrator. D. T. Lunde (1976) demonstrates this issue in terms of the victims chosen by a particular offender. As Lunde points out, although the serial murderer may not know his victims, their selection is not random. Rather, it is based on the murderer's perception of certain characteristics of his victims that are of symbolic significance to him. An analysis of the similarities and differences among victims of a particular serial murderer provides important information concerning the motive in an apparently motiveless crime. This, in turn, may yield information about the perpetrator himself. For example, the murder may be the result of a sadistic fantasy in the mind of the murderer, and a particular victim may be targeted because of a symbolic aspect of the fantasy (Ressler et al. 1985).
In such cases, the investigating officer faces a completely different situation from the one in which a murder occurs as the result of jealousy or a family quarrel, or during the commission of another felony. In those cases, a readily identifiable motive may provide vital clues about the identity of the perpetrator. In the case of the apparently motiveless crime, law enforcement may need to look to other methods in addition to conventional investigative techniques in its efforts to identify the perpetrator. In this context, criminal profiling has been productive, particularly in those crimes where the offender has demonstrated repeated patterns at the crime scene.
THE PROFILING OF MURDERERS
Traditionally, two very different disciplines have used the technique of profiling murderers: mental health clinicians, who seek to explain the personality and actions of a criminal through psychiatric concepts, and law enforcement agents, whose task is to determine the behavioral patterns of a suspect through investigative concepts.
PSYCHOLOGICAL PROFILING
In 1957, the identification of George Metesky, the arsonist in New York City's Mad Bomber case (which spanned sixteen years), was aided by psychiatrist-criminologist James A. Brussel's staccato-style profile: Look for a heavy man. Middle-aged. Foreign born. Roman Catholic. Single. Lives with a brother or sister. When you find him, chances are he'll be wearing a double-breasted suit. Buttoned.
Indeed, the portrait was extraordinary in that the only variation was that Metesky lived with two single sisters. Brussel, in a discussion about the psychiatrist acting as Sherlock Holmes, explains that a psychiatrist usually studies a person and makes some reasonable predictions about how that person may react to a specific situation and about what he or she may do in the future. What is done in profiling, according to Brussel, is to reverse this process. Instead, by studying an individual's deeds one deduces what kind of a person the individual might be (Brussel 1968).
Next page