Open Access. Powered by Scholars. Published by Universities.®

Criminology Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Criminology

Criminal Profiling Methods, Wayne Petherick Sep 2010

Criminal Profiling Methods, Wayne Petherick

Wayne Petherick

Extract:As an investigative aid, criminal profiling has received a great deal of attention from academic audiences and popular culture (Petherick, 2003), and significant advances have been made in both practical and theoretical terms. Even though our collective knowledge about this area has grown, there is still much about the process that remains a mystery. For example, there is little acknowledgment or understanding of the logic or reasoning employed within the profiling process (see Chapter 2), or that there are indeed different methods employed within the profiling community. Of more concern is the fact that many practitioners continue to confuse these …


Criminal Profiling As Expert Evidence, Wayne Petherick, David Field, Andrew Lowe, Elizabeth Fry Sep 2010

Criminal Profiling As Expert Evidence, Wayne Petherick, David Field, Andrew Lowe, Elizabeth Fry

Wayne Petherick

Extract:
Profiling evidence has been accepted in courts in the United States in both trial and sentencing phases, but other jurisdictions have been more cautious in their acceptance. For example, courts in the United Kingdom and Australia have been reluctant to introduce profilers as experts, even though profiling has been given some exposure in courts operating at the lower end of the justice system. The reasons for this reluctance are varied but include a lack of uniformity processes and outcomes, fragmentation of methods, and conflict between profiling organizations and practitioners. In short, there are many methods of profiling, and not …


The Fallacy Of Accuracy In Criminal Profiling, Wayne Petherick Aug 2010

The Fallacy Of Accuracy In Criminal Profiling, Wayne Petherick

Wayne Petherick

Extract:
The defining criterion by which the utility of a particular tool is often judged is its accuracy or sensitivity of detection. We place little faith in that which is inaccurate or in those things that do not detect what they are meant to detect. Things are no different in the profiling community, and the most common measure by which a profiler claims utility is how close his or her approximations are to an offender, if one is caught. As will be shown in this chapter, with the craft being the way it is, this is probably the worst possible …


Metacognition In Criminal Profiling, Barry Woodhouse, Wayne Petherick Aug 2010

Metacognition In Criminal Profiling, Barry Woodhouse, Wayne Petherick

Wayne Petherick

Extract:
As with many professions, one of the more serious problems that confronts the profiling community is that of the inept examiner. Deliberately unethical behavior is one thing, but ongoing incompetence because of profiler ignorance is something else entirely. In some instances, ignorance is the result of a metacognitive deficit caused by a lack of study, a lack of training, or a general lack of mental dexterity. In such instances, the profiler will continually do the wrong thing, such as using flawed methods and erroneous logic, because he lacks the ability to recognize his own ineptitude; the profiler cannot perceive …


Against The State Governance, Governance From Below & Governing Through Terrorism: Analytically Investigating The Technologies Of Power Within The Terrorist Arsenal., Allen Gnanam Jan 2010

Against The State Governance, Governance From Below & Governing Through Terrorism: Analytically Investigating The Technologies Of Power Within The Terrorist Arsenal., Allen Gnanam

Allen Gnanam

Terrorism as a violent and destabilizing act performed by terrorists, meaning loyal followers of political or religious agendas who hold resent and animosity toward a certain authority/ government (Lin, Liou, & Wu, 2007, pg. 149), will be explored and analyzed through the utilization of the governmentality perspective. For the purposes of this paper terrorism governance will refer to the governance/ control/ influence exerted by terrorists and terrorism. The focus of this explorative and analysis paper will be to identify diverse terrorism oriented technologies of governance, and analyze the ways in which these technologies enable terrorist to exert governance both indirectly …


Ban Opitc Private Security Goverance: Exceptionalism, Spatial Sorting And Risk Assessments, Allen Gnanam Jan 2009

Ban Opitc Private Security Goverance: Exceptionalism, Spatial Sorting And Risk Assessments, Allen Gnanam

Allen Gnanam

This paper is theoretically grounded on the Ban opticon framework that is characterized by the use of exceptionalism, the normalization of imperative movement, and profiling for insecurity management purposes (Bigo, 2005). This framework will be utilized in order to expose and analyze the Ban optic governmentality of the private security industry. Secondly, the overall discussion and analysis of the private security industry- Ban opticon nexus will be discussed with specific reference to the private security operations of The New Commons. Thirdly, three private security intelligence networks identified by Lippert & O’Connor (2006) namely Disciplinary Networks, Private Justice Networks, and Multilateral …


Crime And Precaution, Allen Gnanam Jan 2009

Crime And Precaution, Allen Gnanam

Allen Gnanam

Precautionary logic and risk assessments can be associated with counter terrorism, criminal profiling, and the management of high risk individuals/ groups. Overall, risk precautionary logic and risk assessments can be framed using the Ban-opticon concept identified by Bigo, though panopitic elements do exist when discussing concepts of surveillance. The Ban opticon framework has 3 major concepts: (a) Criminal profiling, (b) the management of movement and (c) exceptionalism.

Both precautionary logic and risk assessments are associated with the profiling of harms and threats, the management of individual or group movement, and both are used to provide qualitative and quantitative rationale for …


Induction And Deduction In Criminal Profiling, Wayne Petherick Dec 2008

Induction And Deduction In Criminal Profiling, Wayne Petherick

Wayne Petherick

Extract:

Literature on criminal profiling has reached a considerable volume, including not only a quantity of true crime works but also numerous scholarly texts and articles. The casual reader will be familiar with some aspects of profiling, with the more discerning reader being familiar with the steps involved in the profiling process (Holmes & Holmes, 2002; Ressler, Burgess, & Douglas, 1988; Turvey, 2008), the so-called "inputs" and "outputs" of a criminal profile (Davis, 1999, Egger, 1999; Geberth, 1996; Ressler & Burgess, 1985; Ressler et al., 1988), and the personality and grandiosity of profilers (see a variety of memoirs, such as …