Free Essay

Forensic Psychology Profiling Paper

In:

Submitted By MJBrad15
Words 1448
Pages 6
Profiling Paper

The law defines rape as sexual contact with a non-consenting person. Being convicted of rape yields charges ranging from a misdemeanor to felony. There are four classifications of rapist: power reassurance, anger retaliation, power assertive, and sadistic. Each type of rapist has different goals and influences that make them carry out the attack. Power reassurance rapists, as most rapist profiles do, have a pretty specific profile. Very often, they are single, passive, non-athletic people who live with their parents, do not have sex partners and few if any friends, and work menial jobs. Power reassurance rapists seek validation. This validation elevates their “status.” Power reassurance rapists also seek to validate a fantasy of being sexually adequate and may demand the victim act out a sexual fantasy. They tend to frequent adult bookstores and have voyeur, exhibitionist, transvestite, and or fetishist tendencies. There is a strong sexual component to their attacks…they view the rape as a sexual relationship and thus rarely if ever use force. Anger retaliation rapists are exactly that…rapists who retaliate out of anger. These people tend have faced family hardships, such as divorce or foster care, early in life. They are poorly educated, often high school drop-outs, misogynists who have backgrounds in contact sports, frequent bars, and have action oriented jobs. These physically abusive people are usually in relationships, socially competent, and have a history of violence. Anger retaliation rapists choose their victims, usually the same age or older, locally with little preparation and the intent to harm. These attacks occur infrequently and with the attacker cursing, using weapons, and ripping the victims clothes off. The attack is non-sexual…the goal is simply to humiliate and control the victim. They are trying to get even with the victim. Power assertive rapists attack more frequently than other profiles. Usually 12-15 times over a 20-25 day period, this number can be even higher. These attackers are arrogant…they do not attempt to conceal their identity. With a compulsive need to rape, their desire is to afflict power on the victim through brutal anal then oral attacks. Attacks often occur at night on victims of the same age and race. The rapists don’t ware a mask and con the victim. Violence is often educated when the attacker has difficulty ejaculating…which happens frequently. A histrionic and flirtatious character, power assertive rapists are usually poorly educated/high school dropouts who were physically abused and come from general family dysfunction. Typically athletic with “macho” jobs, they may have a history of property crime, domestic problems and even dishonorable military discharge. The most violent and dangerous rapists are sadistic rapists. The must completely dominate the victim, inflicting maximum physical and emotional pain. This aggressiveness often is eroticized and results in murder. While sadistic rapists share several personal qualities with other types of rapists such as family dysfunction and physical, the rest of the profile is quite different. They tend to be intelligent, highly educated people between 30 and 39 years of age with white-collar occupations with no arrests. These attackers, from sexually deviant homes, stalk their victims and devise strong plans. Age, race, and cycles vary. They degrade and humiliate their victims and use a variety of sexual paraphernalia but have retarded ejaculation. The victims clothes are cut, the attacker is ritualistic, and murder is frequently a result. The rapist in this case exhibits characteristics of a several different types of rapists. His characteristics most frequently compare to the elements of an anger retaliation rapist. For example, this rapist attacks women either in their apartments or moves them to locations near by. Also, he often threatens to hurt or kill women yet now women has been injured beyond the assault…anger retaliation rapists assault their victims during the attack but not after. They minimize future contact but use profanity and look to control their victims, which the rapists in this case is doing by threatening to kill the victims. The rapist in the case also shows characteristics similar to those of a sadistic rapist. The victim in the case stalks his victims and knows their movement patterns. The rapist also moves the victims and has a variance in the age and a slight variance in the race of its victims. One victim stated that her attacker “covered her face with a shirt” which is a characteristic of a power reassurance rapist. This rapist almost definitely endured a difficult living situation growing up. He likely either grew up in foster care or had divorced parents. Either way, the rapist was most likely physically abused. Overall, the rapists living situation was likely very dysfunctional. A major clarifying characteristic, that is to say, a major reason why the rapist generally falls under the anger retaliation classification of rapists, is because its attacks are more geared toward power and aggression and create a sexual disconnect from him, although victims often state that the rapist complimented them as being “fine” and that “it was too good to stop.” This is typically associated with a power reassurance rapist, although they tend to attach a strong sexual element to their attacks. In the case of this rapist, there are no reports of him ejaculating and he has a strong desire to dominate his victims, which detaches the sexual element. The characteristics that made this rapist fall slightly under the sadistic rapist category were the fact that its victims varied widely in age (11-46) and somewhat in race (mostly black with several white and one mixed race). That being said, other characteristics fall mostly under the anger retaliation category. My best guess would be to say that the rapist is likely an African-American male that stands about six feet tall, is around two hundred pounds, and about 35 years of age. It is probable the rapist is in a relationship or even married but does not attack his significant other and may even elevate her. A high school graduate at best, and possibly a drop out, the rapist is probably physically abusive and misogynous with an action-oriented job who frequents bars and partakes in contact sports. A key element to this rapist is likely his relationship with women, particularly women in powerful positions or with powerful dispositions. He attacks are geared toward “getting back at women” and may often be precipitated by an altercation with these types of women. The rapist’s next victims are likely to be in the Virginia area. With most of the rapists attacks taking place in Virginia and Maryland, which are next to each other, it is likely that the rapist lives in that are. The rapist also tends to attack several times in a given area, particularly Virginia and Maryland, before he changes location. These Virginia victims will likely be teenage African-Americans. As a precaution, these potential victims should change and alter habits such as walking routes and times and yard work times. They should also avoid being in public by themselves and during dark parts of the day. One possible explanation for the lack of reported rapes between 2001 and 2006 is that less than twelve percent of women actually report rapes to the police. Another potential explanation is that this rapist could potentially have potentially changed his Motes Operandi. His elusion of the police over thirteen years certainly attests to his ability to adapt and deceive. Finally, what I think is the most likely case, is that the rapist was forced to move slowly and quietly in the wake of his attacks between 1997 and 2001. he was being heavily pursued, so he needed to get away and temporarily put a halt to the rapes. He moved north up the Eastern seaboard, away from area where he had committed so many attacks. By the time he settled in New England, he needed time to adapt to his surrounds and scout his next victims. There are a number of reasons why this rapist has been able to elude police after seventeen reported rapes over thirteen years. While I attempted to predict the rapist’s next potential victim(s), the reality is that his methods are unpredictable. He changes weapons and how he approaches victims. The rapist must also be skilled at avoiding detection, likely using masks and using the dark to hide his face. What very interesting is that he has left DNA at twelve of seventeen attacks yet it does not match any database. Also, victims have stated that he has a deep voice they would be able to recognize. That being said, the attacker benefits from not knowing or having any association at all with the victims.

Similar Documents

Premium Essay

Health and Clinical Psychology

...A2 Psychology: G543 Options Paper Exam Technique and Tips General Exam Information You will be assessed for this unit in a 1.5 hour examination. You will need to answer four questions; two questions from the topic of Forensic Psychology and two questions from the topic of Health and Clinical Psychology. This means you will have about 20 minutes of writing time per question, plus a little bit of thinking time. This is not a long time to maximise your marks, so there are some simple exam techniques to follow below. Each question will be worth 25 marks and be divided into two parts; part (a) and part (b). Part (a) asks you to demonstrate descriptive skills and is worth 10 marks, whilst part (b) asks you to display evaluative skills and is worth 15 marks. General Exam Technique/Advice * Choose the right questions A mistake made by some students is answering questions on a topic they haven’t studied! So ensure you firstly locate the two sections of the paper that you can answer questions on; Forensic and Health/Clinical. In each of these two sections, there will be a choice of four questions. You will only choose two questions per section, so pick which questions you are going to answer and cross out the others. Choosing which questions to answer may be difficult than it first appears because some questions may sound similar. You need to become familiar with the layout and wording of questions prior to your exam. * Know your timings For each question you...

Words: 1979 - Pages: 8

Premium Essay

G543 Mark Scheme Exam Tips

...A2 Psychology: G543 Options Paper Exam Technique and Tips General Exam Information You will be assessed for this unit in a 1.5 hour examination. You will need to answer four questions; two questions from the topic of Forensic Psychology and two questions from the topic of Health and Clinical Psychology. This means you will have about 20 minutes of writing time per question, plus a little bit of thinking time. This is not a long time to maximise your marks, so there are some simple exam techniques to follow below. Each question will be worth 25 marks and be divided into two parts; part (a) and part (b). Part (a) asks you to demonstrate descriptive skills and is worth 10 marks, whilst part (b) asks you to display evaluative skills and is worth 15 marks. General Exam Information You will be assessed for this unit in a 1.5 hour examination. You will need to answer four questions; two questions from the topic of Forensic Psychology and two questions from the topic of Health and Clinical Psychology. This means you will have about 20 minutes of writing time per question, plus a little bit of thinking time. This is not a long time to maximise your marks, so there are some simple exam techniques to follow below. Each question will be worth 25 marks and be divided into two parts; part (a) and part (b). Part (a) asks you to demonstrate descriptive skills and is worth 10 marks, whilst part (b) asks you to display evaluative skills and is worth 15 marks. General Exam Technique/Advice ...

Words: 2401 - Pages: 10

Premium Essay

Cr Js 105 Unit 1

...Unit 1 IP CRJS 105 Abstract   After reading this paper you will be able to explain the differences between Criminologists, Criminalists, and Forensic psychologists and the differences in their discipline of expertise. Additionally, this paper will briefly discuss blue collar crimes vs. white collar crimes, the way in which the FBI reports and measures these crimes in their Uniformed Crime Reporting (UCR) system. The author further elucidates blue collar crimes and how their culture is more populated by the media. This paper also includes the variations of Index I and Index II crimes and the manner in which they are reported either as violent or property crimes under the UCR system, as well as, the sentence that accompany such crimes. The author concludes this paper with a basic understanding of these three fields and the importance of their role within our criminal justice system that together create a unified force to battle crime. Introduction To get a better understanding of how our criminal justice system operates, society needs to know the involvement and the many specialists that are needed to keep our communities safe as well as, get the criminals off the streets to prevent them from committing future crime. One should look at it like baking a cake and each ingredient is an important part of the recipe. 1st ingredient is the investigation, 2nd ingredient is solving the crime...

Words: 1246 - Pages: 5

Premium Essay

Theories of Crime Causation

...American Intercontinental University Unit 1 Individual Project CRJS 105 – Theories of Crime Causation November 11th, 2010 Abstract The following will examine the differences between criminalists, criminologists and forensic psychologists. It will then transition into how what exactly is a white collar crime and a blue collar crime. Lastly the paper will discuss the differences between index-one and index-two crimes as defined by the UCR. Media Portrayal of Crime Introduction With the prevalence of crime being portrayed in the media world, it can be difficult for the modern American to decipher all the aspects of crime. Criminology, the study of crime and its causes, is a excellent way to find out just what makes a criminals mind tick. Although it may be hard to know just what makes a person commit a crime, having a better understanding of the base of criminal justice aspects may be of assistance. Criminologists, Criminalists, and Forensic Psychologists With a plethora of jobs out there relating to the field of criminal justice, it may become overwhelming to try and decide who does what and how they do it. To have a better understanding of such fields one must know exactly what each field does separately from the other. A criminologist uses sociological theories and methods to study criminal behavior and how societies respond to crime (Hall, 2010). This means the criminologist seeks to find out the mentality behind a crime and how that thinking affects the...

Words: 1634 - Pages: 7

Premium Essay

Investigative Psychology In The Courtroom: Beyond The Offender Profile

...activities, we can get a universal idea of what was going on in these criminals minds based off of criminal psychology. Criminal psychology helps all of us primarily detectives and police units get as best of an understanding as we can to try and out ourselves in the criminals shoe’s, and therefore attempt to find that escaped criminal. So with this research paper there...

Words: 1586 - Pages: 7

Free Essay

Simoson Report

...Profiling Approach This is a case study on the triple murder/suicide on the gold coast in 2011, It will outline what caused such tragic events, give you insight into the victims and the offenders characteristics and what events can trigger people in similar situation to commit filicide-murder-suicide. The evidence relied on in this paper were the coroners report, understanding homicide and other familicide related papers based on prevention, causes and reasoning. Offender Paul Rogers Caucasian 40-year-old male, Born on the 4th of January 1971, New Zealand He had an 8-year relationship with Tania Simpson 2002-2010 and had two children, Kyla Rogers, girl born on the 19th of April 2006 and Bronnson a boy born in July 2009 (Barnes, 2012) Together Tania Simpson and Paul Rogers part-managed a caravan park owned by Tania Simpsons parents and had been engaged before Tania Simpson called off the engagement in 2010. After Tania Simpson left with the Kyla and Bronnson Rogers, Paul Rogers became very distraught he threatened committing suicide to Tania Simpson in order to upset her, lied, stalked both Tania Simpson and Julie Simpson (Tania Simpsons mother) to monitor where they were going and lashed out against the entire family (Barnes, 2012) The reaction that Paul Rogers had to the breakup in reference to stalking, lies and threatening Tania Simpson are all significant characteristics for why he murdered his family and friend (Brookman, 2005) There...

Words: 2117 - Pages: 9

Free Essay

Methods of Lie Detection

...Methods of Lie Detection Samuel Medina Housatonic Community College Abstract This research paper will cover a few different aspects of Lie Detection. Through the knowledge gathered from 5 journal articles the reader will learn of different methods of lie detection as well as some real life applications and the possibilities of lie detection in the near future. The areas that the 5 journal articles touch upon are the Cognitive load approach, the use of the polygraph and its controversies, the behavioral differences when using a person’s first or second language, the use of fMRI and the potential future of fMRI technology and last but not least some of the application of lie detection in our world today and potential for even more efficient and less intrusive methods of lie detection. Methods of Lie Detection In today’s society technology is at the fore-front of almost every aspect of life. In one particular area technology has created a new path of discovery for society to explore. Lie detection is a subject widely used in different ways throughout law enforcement and is becoming implemented in many different ways in our society today. Lie detection is being used in court rooms all over the world to solidify verdicts proved in the court rooms. There are a few methods of lie detection used in and outside of the court rooms but not all are allowed in the court rooms because of certain controversies. Of course with every...

Words: 1960 - Pages: 8

Premium Essay

Damsel

...2014-2015 Undergraduate Academic Calendar and Course Catalogue Published June 2014 The information contained within this document was accurate at the time of publication indicated above and is subject to change. Please consult your faculty or the Registrar’s office if you require clarification regarding the contents of this document. Note: Program map information located in the faculty sections of this document are relevant to students beginning their studies in 2014-2015, students commencing their UOIT studies during a different academic year should consult their faculty to ensure they are following the correct program map. i Message from President Tim McTiernan I am delighted to welcome you to the University of Ontario Institute of Technology (UOIT), one of Canada’s most modern and dynamic university communities. We are a university that lives by three words: challenge, innovate and connect. You have chosen a university known for how it helps students meet the challenges of the future. We have created a leading-edge, technology-enriched learning environment. We have invested in state-of-the-art research and teaching facilities. We have developed industry-ready programs that align with the university’s visionary research portfolio. UOIT is known for its innovative approaches to learning. In many cases, our undergraduate and graduate students are working alongside their professors on research projects and gaining valuable hands-on learning, which we believe is integral...

Words: 195394 - Pages: 782

Free Essay

Business

...CPS 603 Sample Exam 1 (Chapters 1 – 7) The exam will consist of 10 short-answer questions. These questions will be taken from, or motivated by the following problems. Sample solutions appear below. 1) Identify four problems endemic to the traditional file environment. 2) Define total cost of ownership. Identify nine important cost components. 3) Discuss the various types of personnel required by a technology infrastructure and its attendant information technology services. 4) Identify and briefly describe the five moral dimensions raised by information systems. 5) List three ways in which all organizations are alike. 6) What is a supply chain? What is a supply chain management system? 7) Identify the three main categories of information systems in relation to the groups they serve and the functional areas in which they operate. Which do you believe is most difficult to implement? Why? 8) Describe and discuss the four stages of decision making as outlined by Simon. How does each relate to the use of information systems? 9) "With the Internet, the traditional business model is no longer valid." Describe the traditional business model and how the new business models differ. Do you agree, or disagree with the statement given here? Support your argument. 10) List the four technology trends given by the authors of your text that raise ethical issues. Give an example of an ethical or moral impact connected to each one. 11) Briefly describe Mintzberg's classification...

Words: 9092 - Pages: 37

Premium Essay

Myths

...Contents Preface Acknowledgments Introduction 1 BRAIN POWER Myth #1 Most People Use Only 10% of Their Brain Power Myth #2 Some People Are Left-Brained, Others Are Right-Brained Myth #3 Extrasensory Perception (ESP) Is a Well-Established Scientific Phenomenon Myth #4 Visual Perceptions Are Accompanied by Tiny Emissions from the Eyes Myth #5 Subliminal Messages Can Persuade People to Purchase Products 2 FROM WOMB TO TOMB Myth #6 Playing Mozart’s Music to Infants Boosts Their Intelligence Myth #7 Adolescence Is Inevitably a Time of Psychological Turmoil Myth #8 Most People Experience a Midlife Crisis in | 8 Their 40s or Early 50s Myth #9 Old Age Is Typically Associated with Increased Dissatisfaction and Senility Myth #10 When Dying, People Pass through a Universal Series of Psychological Stages 3 A REMEMBRANCE OF THINGS PAST Myth #11 Human Memory Works like a Tape Recorder or Video Camera, and Accurate Events We’ve Experienced Myth #12 Hypnosis Is Useful for Retrieving Memories of Forgotten Events Myth #13 Individuals Commonly Repress the Memories of Traumatic Experiences Myth #14 Most People with Amnesia Forget All Details of Their Earlier Lives 4 TEACHING OLD DOGS NEW TRICKS Myth #15 Intelligence (IQ) Tests Are Biased against Certain Groups of People My th #16 If You’re Unsure of Your Answer When Taking a Test, It’s Best to Stick with Your Initial Hunch Myth #17 The Defining Feature of Dyslexia Is Reversing Letters Myth #18 Students Learn Best When Teaching Styles Are Matched to...

Words: 130018 - Pages: 521

Premium Essay

Tpote

...field of personality • Explain the purpose and utility of studying personality to mental health professionals • Review the various definitions of human personality • Offer insights into the history of personality theories • Introduce some of the methods used to measure or evaluate personality • Present some of the major personality theorists who have developed the concepts we will be studying S ubdisciplines of psychology such as social psychology, cognitive psychology, and indus- trial psychology endeavor to find common principles that will explain everyone’s behavior. These subfields have achieved considerable success in doing so, since we are all similar in many ways. Despite our similarities, however, there is little doubt that each human being is unique—different from every other individual on the planet. Seeking to understand human commonalities and seeking to account for individual differences are complementary, insofar as we cannot fully apprehend differences if we cannot identify our common characteristics. Personality psychology looks for answers to numerous questions. In what ways do human beings differ? In what situations and along what dimensions do they differ? Why do they differ? How much do they differ? How consistent are human differences? Can they be measured? These are the issues that this text will explore. An important aspect of this exploration will be a critical examination of the numerous theories that have been proposed to explain...

Words: 11226 - Pages: 45

Premium Essay

The Threat Within

...privacy best practices & standards and encourage the Indian industries to implement the same. DSCI is engaged with the Indian IT/BPO industry, their clients worldwide, Banking and Telecom sectors, industry associations, Data Protection Authorities and other Government agencies in different countries. It conducts industry wide surveys and publishes reports, organizes data protection awareness seminars, workshops, projects, interactions and other necessary initiatives for outreach and public advocacy. DSCI is focused on capacity building of Law Enforcement Agencies for combating cyber crimes in the country and towards this, it operates several Cyber labs across India to train police officers, prosecutors and judicial officers in cyber forensics. Public Advocacy, Thought Leadership, Awareness and Outreach and Capacity Building are the key words to continue to promote and enhance trust in India as a secure global sourcing hub, and also to promote data protection in the country. For more information about DSCI or this report, please contact: Data Security Council of India Niryat Bhawan, 3rd Floor Rao Tula Ram Marg New Delhi – 110057 India Phone: +91-11-26155070 Fax: +91-11-26155072 Email: info@dsci.in Foreword Insider threats originate from within the organisation. The trusted employees, contractors, partners and suppliers are the source of these attacks. Some of them are as trusted as privileged users. Hence, they can cause more damage. Verizon 2010 Data Breach...

Words: 7525 - Pages: 31

Free Essay

Swn Jdkjkjje Jne

...Employment News 31 May - 6 June 2014 www.employmentnews.gov.in 21 UNION PUBLIC SERVICE COMMISSION EXAMINATION NOTICE NO. 09/2014-CSP (LAST DATE FOR RECEIPT OF APPLICATIONS : 30/06/2014) DATE :31.05.2014 CIVIL SERVICES EXAMINATION, 2014 (Commission’s website-http://upsc.gov.in) F. No. 1/5/2013-E.I(B) : Preliminary Examination of the Civil Services Examination for recruitment to the Services and Posts mentioned below will be held by the Union Public Service Commission on 24th Aug., 2014 in accordance with the Rules published by the Department of Personnel & Training in the Gazette of India Extraordinary dated 31st May, 2014. (i) Indian Administrative Service. (ii) Indian Foreign Service. (iii) Indian Police Service. (iv) Indian P & T Accounts & Finance Service, Group ‘A’. (v) Indian Audit and Accounts Service, Group ‘A’. (vi) Indian Revenue Service (Customs and Central Excise), Group ‘A’. (vii) Indian Defence Accounts Service, Group ‘A’. (viii) Indian Revenue Service (I.T.), Group ‘A’. (ix) Indian Ordnance Factories Service, Group ‘A’ (Assistant Works Manager, Administration). (x) Indian Postal Service, Group ‘A’. (xi) Indian Civil Accounts Service, Group ‘A’. (xii) Indian Railway Traffic Service, Group ‘A’. (xiii) Indian Railway Accounts Service, Group 'A'. (xiv) Indian Railway Personnel Service, Group ‘A’. (xv) Post of Assistant Security Commissioner in Railway Protection Force, Group ‘A’ (xvi) Indian Defence Estates Service, Group...

Words: 47693 - Pages: 191

Free Essay

Whirlpool

...Employment News 11 - 17 February 2012 www.employmentnews.gov.in 21 Union Public Service Commission EXAMINATION NOTICE NO. 04/2012-CSP DATED 11.02.2012 (LAST DATE FOR RECEIPT OF APPLICATIONS : 05.03.2012) CIVIL SERVICES EXAMINATION, 2012 (Commission's website - http://www.upsc.gov.in) F. No. 1/4/2011-E.I(B) : Preliminary Examination of the Civil Services Examination for recruitment to the Services and Posts mentioned below will be held by the Union Public Service Commission on 20th May, 2012 in accordance with the Rules published by the Department of Personnel & Training in the Gazette of India Extraordinary dated 4th February, 2012. (i) Indian Administrative Service. (ii) Indian Foreign Service. (iii) Indian Police Service. (iv) Indian P & T Accounts & Finance Service, Group ‘A’. (v) Indian Audit and Accounts Service, Group ‘A’. (vi) Indian Revenue Service (Customs and Central Excise), Group ‘A’. (vii) Indian Defence Accounts Service, Group ‘A’. (viii) Indian Revenue Service (I.T.), Group ‘A’. (ix) Indian Ordnance Factories Service, Group ‘A’ (Assistant Works Manager, Administration). (x) Indian Postal Service, Group ‘A’. (xi) Indian Civil Accounts Service, Group ‘A’. (xii) Indian Railway Traffic Service, Group ‘A’. (xiii) Indian Railway Accounts Service, Group 'A'. (xiv) Indian Railway Personnel Service, Group ‘A’. (xv) Post of Assistant Security Commissioner in Railway Protection Force, Group ‘A’ (xvi) Indian Defence Estates Service, Group ‘A’. (xvii) Indian Information...

Words: 50586 - Pages: 203

Free Essay

Cis 500

...Law Enforcement Technology Needs Assessment Law Enforcement Technology Needs Assessment: Future Technologies to Address the Operational Needs of Law Enforcement In partnership with the Lockheed Martin Corporation By Christopher S. Koper, Bruce G. Taylor, and Bruce E. Kubu With contributions by Eugene Glover, John Anderson, Paul Snabel, Chuck Wexler, Rachael Bambery, Nathan Ballard, Anthony Bellero, David Prothero, Willie Marsh, Mike Schroeder, Mike Taylor, Greg Maultsby, Donnie Gilley and Dave Kier Police Executive Research Forum 1120 Connecticut Ave., N.W., Suite 930 Washington, D.C. 20036 Jan 16, 2009 Report Outline Section Executive Summary Chapter 1: Overview / Introduction Chapter 2: Technology and Law Enforcement: An Overview of Applications, Impacts, and Needs Chapter 3: The PERF Technology Needs Assessment Survey Chapter 4: The PERF-Lockheed Martin Law Enforcement Future Technologies Workshop Chapter 5: Conclusions and Next Steps Pages 3-9 10-11 12-32 33-47 48-64 65-73 Appendix A: References Appendix B: The PERF Technology Needs Assessment Survey Appendix C: Survey Technology Term Definitions Appendix D: Responding Agencies (PERF Survey) Appendix E: Supplementary Survey Tables Appendix F: List of Workshop Attendees 74-79 80-91 92-98 99-102 103-124 125-127 2 Technology and Law Enforcement: Future Technologies to Address the Operational Needs of Law Enforcement EXECUTIVE SUMMARY Background The effects of technology can be seen...

Words: 37391 - Pages: 150