December 1986

Law Enforcement Bulletin

"The main idea of [NCA VCl was to bring together the fragmented efforts from around the country so that they could be consolidated into one national resource center available to the entire law enforcement community. " December 1986, Volume 55, Number 12

2 An American Response to an Era of Violence By Roger L. Depue, Ph .D. 6 NCAVC's Research and Development Program By Richard L. Ault, Jr., Ph .D. 9 Criminal Profiling: A Viable Investigative Tool Against Violent Crime By John E. Douglas, M.S., and Alan E. Burgess, M.Ed . 14 The Violent Criminal Apprehension Program- VICAP: A Progress Report By James B. Howlett, M.S., Kenneth A. Hanfland, and Robert K. Ressler, M.S. 23 The NCAVC Training Program: A Commitment to Law Enforcement By Robert R. Hazelwood, M.S. 27 Automated Crime Profiling By David J. Icove, Ph .D, P.E. 31 VICAP Alert mu Law Enforcement Bulletin

United States Department of Justice Published by the Office of The Cover: Federal Bureau of Investigation Congressional and Public Affairs, This special issue of the Bulletin reports on the Washington, DC 20535 William M. Baker, Assistant Director National Center for the Analysis of Violent Crime, its four major programs, and the services it provides to the law enforcement community. William H. Webster, Director Editor- Thomas J . Deakin Assistant Editor-Kathryn E. Sulewski Art Director-Kevin J . Mulholland The Attorney General has determined that the The FBI Law Enforcement Bulletin publication of this periodical is necessary in the Production Manager-Marlethia S. Black (ISSN-0014·5688) is published monthly by the transaction of the public business required by Reprints-Beth Corbi n Federal Bureau of Investigation, 10th and Penn· law of the Department of Justice. Use of funds sylvania Ave. , N.w., Washington, DC 20535 . for printing this periodical has been approved Second-class postage paid at Washington, DC . by the Director of the Office of Management Postmaster: Send address changes to Federal and Budget through June 6, 1988. Bureau of Investigation, FBI Law Enforcement Bulletin, Washington, DC 20535.

ISSN 0014- 5688 USPS 383- 310 Director's Message

To further law enforcement cooperation , this This special issue of the Bulletin describes issue of the FBI Law Enforcement Bulletin con• the development of the center, its four major tinues the reporting begun in August 1985, of programs, and the center's services now developments in the National Center for the available to law enforcement agencies. It also Analysis of Violent Crime (NCAVC). The need discloses how the center is providing training for for interagency cooperation in law enforcement police officers. The new insights into the criminal has become even more vital with the problem of personality and the innovative investigative the serial violent criminal. This highly mobile, techniques developed as a result of research repetitive offender often eludes identification and and case experiences of the center are apprehension by law enforcement because his immediately incorporated into training curricula. crimes transcend jurisdictional boundaries. This This new knowledge is also being disseminated offender often confounds the investigations of to the law enforcement community through separate police agencies where he operates articles in professional journals, such as the FBI which may not be aware of similar crimes Law Enforcement Bulletin, in addition to the elsewhere. center's direct training efforts. The FBI , in its dual role as a Federal All of us in law enforcement must work criminal justice agency and as a law enforce• together to combat the violent criminal and use ment service organization, offers assistance to every technique available to us. Inscribed on the other agencies investigating these violent of• courtyard wall of FBI Headquarters is our belief: fenses through its NCAVC. The center is a law "The most effective weapon against crime is enforcement-oriented behavioral science and cooperation .. . the efforts of all law enforcement computerized resource center which con• agencies with the support and under• solidates research , training, and investigative standing of the American people." The center is support functions. It was jOintly planned by the now an important asset to law enforcement in Department of Justice agencies of the National the struggle to control the serial violent offender. Institute of Justice (NIJ), the Office of Justice Assistance, Research and Statistics, the Office of Juvenile Justice and Delinquency Prevention, several State and local law enforcement agencies, and the FBI. NIJ initially funded the William H. Webster pilot project, but today the center is totally sup• Director ported within the FBI's budget. December 1, 1986 An American Response to an Era of Violence

By The year 1980 marked the begin• victims of us all. Awareness of its ROGER L. DEPUE, Ph.D. ning of a new decade. It was a time for danger affects the way we think, Special AgenVUnit Chief looking back at the record and where we live, where we go, what Behavioral Science Instruction and evaluating America's progress toward we buy, how we raise our children, Research Unit and the good life on the one hand and for and the quality of our lives as we Administrator looking ahead toward the best possible age. The specter of violent crime National Center for the Analysis of future on the other. Despite many and the knowledge that, without Violent Crime significant accomplishments made dur• warning, any person can be FBI Academy Quantico, VA ing the previous decade, one glaring attacked or crippled, robbed , or societal failure stood out. Violent crime killed, lurks at the fringes of con• had steadily increased in American sciousness. Every citizen of this society and it was continuing to increase country is more impoverished, less at an alarming rate .' In fact, the violent free, more fearful , and less safe, crime wave which had begun in 1963 because of the ever present threat was showing no signs of abatement well of the criminal. Rather than alter a into 1980.2 One of the more reliable system that has proven itself in• indexes, the homicide rate had more capable of dealing with crime, than doubled since 1962. More than society has altered itself." 5 20,000 people were being murdered per It was a downward spiral. Some• year as we entered the new decade. thing had to be done. The year 1980 itself became a record In 1981 , the Attorney General of the year with more than 23,000 people United States, William French Smith, 3 becoming victims of homicide. It was established the Attorney General's Task unprecedented mayhem. The rates for Force on Violent Crime. It was his other serious violent crimes, such as intention to assemble a group of aggravated assault, forcible rape, and knowledgeable individuals who were rObbery, were equally disturbing. highly recognized for their expertise in a Predatory stranger-to-stranger violent variety of pertinent professions and crime was increasing steadily, while the academic disciplines to study the pro• number of cases cleared by arrest were blem of violent crime in America. The 4 decreasing. Lois Haight Herrington, task force was to make recommenda• Chairperson of the President's Task tions regarding what might be done to Force on Victims of Crime, summarized curb the rapid growth of violent crime the national situation like this: and to reduce its adverse impact on the "Something insidious has hap• quality of American life. 6 pened in America: crime has made In addition to establishing the task their hundreds of crimes had been force, Smith required each agency of analyzed. 7 The research instrument the Department of Justice to submit a consisted of a 5-part, 57-page protocol report outlining what the agency might which was completed in conjunction do to assist in a national effort to reduce with 5- to 10-hour intensive interviews the level of violent crime. The Federal of the murderers by veteran FBI Agents Bureau of Investigation (FBI) received with behavioral science backgrounds. its mandate, and Director William H. The overall purpose was to elicit Webster began a systematic survey of information regarding each offender's Bureau resources to determine those developmental history; physical and which could be applied to this national personality characteristics; modus cause. The FBI's Training Division operandi; pre- and post-offense located at the FBI Academy at Quantico, behavior; victim selection, manipulation, VA, was immediately considered to be and control; and techniques used to a major resource to draw upon for ideas. successfully evade detection, It was often used as a think tank to apprehension, prosecution , and address issues of this nature. After sub• confinement. mitting its initial report, the Training Divi• The research was conducted with sion was designated the lead division in the assistance of academic and mental formulating the FBI's role in combating health consultants who were led by Dr. violent crime in America, and within it, Ann Wolbert Burgess of Boston City the (BSU) Hospital and Boston University (now at became the center of activity. the University of Pennsylvania). The Na• Over the years, the BSU had tionallnstitute of Justice (NIJ) awarded established an impressive record of a grant to Dr. Burgess to pursue the furnishing assistance to Federal, State, project with her FBI colleagues. The and local law enforcement agencies. research resulted in the development of During training on violent criminal valuable investigative techniques, as behavior, police officers would well as insights into the personalities of frequently discuss unsolved cases and these killers. This body of knowledge ask for the instructor's opinion about the served to enhance training and con• type of person they might be seeking. sultation functions. The staff of the BSU They were also interested in obtaining was often called upon to address innovative investigative ideas, and the criminal justice and behavioral science instructors helped them plan case conferences and symposia on violent strategies. Soon, the BSU was con• crime matters. sulting on unsolved cases on a regular In addition to their training, basis through a formalized Crime research, and consultation functions Analysis and Criminal Personality Pro• specifically designed to help law en• filing Program. forcement officers deal more effectively FBI Agents from the B'ehavioral with violent crime, members of the Science Unit had also completed the Behavioral Science Unit traveling first law enforcement-oriented be• throughout the country had occasion to havioral science Criminal Personality observe a variety of State and local pro• Research Project. Thirty-six of the most grams designed to deal with violent notorious sexually oriented serial crime problems and to identify the best. murderers incarcerated at that time and Ideas such as former Los Angeles

December 1986 I 3 BEHAVIORAL SCIENCE SERVICES * NATIONAL CENTER FOR THE ANALYSIS OF VIOLENT CRIME

resource center available to the entire law enforcement community. In addition to the Attorney General's emphasis on the problem of violent Office Computer crime, the 98th Congress of the United Management Engineering States had shown interest in specific Services violent crime issues, such as "missing and murdered children," the "sexual ex• ploitation of children," "unidentified dead bodies," and "serial killers." 8 For in• stance, in 1983, Senator Arlen Specter, Chairperson of the Subcommittee on Juvenile Justice, Committee on the BEHAVIORAL SCIENCE t----'------i BEHAVIORAL SCIENCE JudiCiary, U.S. Senate, with the strong INSTRUCTION INVESTIGATIVE support of Senator Paula Hawkins, held & RESEARCH SUPPORT hearings as a means of gaining informa• tion from violent crime "experts" upon which to base new legislative initiatives and funding decisions. The goal was to strengthen the criminal justice system's capabilities to deal more effectively with a breed of human predator that often seemed to travel throughout the coun• try with relative impunity, coldly murder• ing vulnerable women and children for Research Inter- Instruction Profiling no apparent motive. & discipli• & Training & VICAP Since 1982, the Office of Juvenile Development nary Consultation Justice and Delinquency Prevention Services (OJJDP) had been investigating the I possibility of awarding a grant to a diver• sified group of individuals made up of criminal justice professionals, academi• I cians, writers, and other interested per• sons in order to establish a pilot VICAP Police program. Together with the National In• L ­ Fellowship stitute of Justice, OJJDP funded a meeting of interested parties which was Figure 1 Organizational chart for the National Center for the Analysis of Violent Crime. held in the summer of 1983 at Sam Houston State University's Center for Criminal Justice, located in Huntsville, Police Departm!'lnt Commander Pierce Personality Research Project Advisory TX. At the conclusion of the 2-day R. Brooks' Violent Criminal Apprehen• Board in November 1982, and resulted meeting, and after several presentations sion Program (VICAP) and the Arson In• in the concept of a National Center for on violent crime topics, the participants formation Management System (AIMS), the Analysis of Violent Crime (NCAVC). unanimously agreed that a National codeveloped by Dr. David Icove, were The main idea of this center was to bring Center for the Analysis of Violent Crime identified, and their founders invited to together the fragmented efforts from should be established. Furthermore, the FBI Academy for consultation. Such around the country so that they could they agreed that it should be ad• a meeting was held with the Criminal be consolidated into one national ministered by the FBI's Behavioral

4 I FBI Law Enforcement Bulletin "The NCA VC's role . .. is to serve as a law enforcement clearinghouse and resource center for the most baffling and fearful of the unsolved violent crimes . ..."

Science Unit and physically located at ment and the Training Programs of the The latest advancements in computer the FBI Academy. It was to be a law NCAVC. The Behavioral Science engineering are being applied to violent enforcement-oriented behavioral Investigative Support (BSIS) Unit ad• crime problems with promising results. science and data processing resource ministers the Profiling and Consultation The concerted efforts of the U.S. center to consolidate research, training, and the Violent Criminal Apprehension Congress, the Department of Justice, and consultation functions for the pur• Programs of the NCAVC. The chief of and Federal, State, and local criminal pose of providing assistance to Federal, the BSIR is the administrator and the justice agencies to bring violent crime State, and local law enforcement agen• chief of the BSIS is the deputy ad• under control have made a difference cies who were confronted with unusual, ministrator. The organizational chart of in America. They have contributed to bizarre, and/or particularly vicious or the NCAVC is set out in figure 1. slowing the downward spiral and in• repetitive violent crime. The overall goal has been to reduce creasing the risk for the violent offender. Speaking at the National Sheriffs the amount of violent crime in American The National Center for the Analysis of Association Annual Conference in Hart• society. The NCAVC's role in this regard Violent Crime was born out of these na• ford, CT, on June 21, 1984, President is to serve as a law enforcement clear• tional efforts and represents the new Ronald Reagan announced the inghouse and resource center for the feeling in America. We are not only establishment of the NCAVC with the most baffling and fearful of the unsolv• going to fight back-we are going to primary mission of identifying and track• ed violent crimes, such as homicide, for• win. ing repeat killers.9 It was described as cible rape, child molestation/abduction, a joint project of the Department of and arson. The NCAVC collects and Justice and the FBI. analyzes violent crime data and pro• In June 1984, the NCAVC was vides assistance to law enforcement given life as a pilot project supported agencies in their attempts to identify, with NIJ funds furnished by way of an locate, apprehend, prosecute, and interagency agreement between the NIJ incarcerate the persons responsible for and the FBI. In October 1985, the total these and other violent crimes and to cost of funding the center was absorbed develop new programs for the preven• in the annual budget of the FBI. tion of violent crime victimization. As it was originally conceived, the The NCA VC represents a new and Footnotes NCAVC consisted of four programs• powerful weapon in the law enforce• 1 Federal Bureau of Investigation. Crime in the United 5tates-1984 (Washington. DC: U.S. Department Research and Development, Training, ment arsenal to combat violent crime. of Justice, 1985). Profiling and Consultation, and VICAP. Its research efforts are bringing forth 2 James Q. Wilson, Thinking About Crime (New York: Basic Books, 1975), p. 5. These four basic programs constituted new insights into violent criminal 3 Supra note 1. • R. M. Holmes and J. E. DeBurger, "Profiles in the backbone of the NCA VC and con• behavior and personality. Its training Terror: The Serial Murderer: Federal Probation, vol. 49 , tinue to exist today; however, the FBI programs are disseminating the latest 1985, pp. 29-34. • Final Report of the Presldenrs Task Force on Vic• has found it administratively feasible to violent crime information and in• tims of Crime, by L. H. Herrington, Chairperson (Library divide the programs within two vestigative techniques. More and more of Congress Cataloging in Publication Data Report No. 82- 24146) (Washington, DC: The White House, 1982), Behavioral Science Units. cases are being successfully analyzed, p. vi. In January 1986, the original and criminal profiles are being con• • Report of Attorney General's Task Force on Violent Crime, Washington, DC, 1981. Behavioral Science Unit which structed with remarkable accuracy. Im• 7 "Crime Scene and Profile Characteristics of administered the NCAVC was split into aginative investigative and prosecutive Organized and Disorganized Murderers: FBI Law Enforcement Bulletin, vol. 54, No. 8, August 1985, pp. two units, with each unit responsible for strategies are being developed , 18-25. • U.S. Congress, Senate, Committee on the the administration of two of the four resulting in earlier detection and arrest Judiciary, Patterns of Murders Committed by One Per• NCAVC programs. The Behavioral and more-certain conviction and con• son, in Large Numbsrs with No Apparent Rhyme, Reason, or Motivation. Hearings before the Subcommit• Science Instruction and Research finement. VICAP is operating to link un• tee on Juvenile Justice of the Committee on the (BSIR) Unit continues the traditional solved violent crimes to one another Judiciary, 98th Congress, 1st sess., June 1983, (Serial No. J-98-52) (Washington, DC: U.S. Government training functions of the original from throughout the country and to pro• Printing Office). vide assistance in the coordination of • B. T. Roessner, "President Extols 'War on Behavioral Science Unit, as well as Crime,' " The Hartford Courant, June 21, 1984, pp. AI , administers the Research and Develop complex interagency investigations. A14.

December 1986 I 5 NCA VC'S Research and Development Program By RICHARD L. AULT, JR., Ph.D. Special Agent/Program Manager Research and Development Program Behavioral Science Instruction and Research Unit National Center for the Analysis of Violent Crime FBI Academy Quantico, VA

Research is often regarded as As the number of cases submitted research . As interviews were conducted either a complex and arcane art form or to what was then called the Behavioral of rapists and murderers, some of the a simple review of literature. Conse- Science Unit (BSU) for profiling increas- findings were presented to various quently, it is frequently considered to be ed , the necessity for additional relevant academic and professional groups. a luxury that an organization can do data became obvious. Information was Among those interested in the research without. In the Behavioral Science Ser- needed about the offender, his methods was Dr. Ann W. Burgess of the Boston vices/National Center for the Analysis of of operation, his victim selection, his City Hospital. Her enthusiasm to con- Violent Crime (NCAVC) at the FBI personality makeup, and his view of tinue the research on violent offenders Academy, the Research and Develop- himself. Moreover, by 1978, BSU led her to obtain several grants from the ment Program is an integral part of the members were profiling more than un- Department of Justice to conduct process of analysis of violent crime. solved homicides; they were also pro- research with the FBI. Members of the Since the inception of crime scene filing rapes, arsons, extortions, and NCAVC have been collaborating with analysis­also called profiling­much of other violent and nonviolent offenses. Dr. Burgess in the research studies in the original information that was used In 1979, the BSU received some of these grants, the first of which to profile the offender of violent crimes approval to institute the Criminal was obtained in 1982. was taken from the existing research. Personality Research Project (CPRP), Using a refined version of the first However, most of that research was in which the unit members conducted protocol, BSU members and Dr . oriented to the academic community preliminary research on violent of- Burgess continued the study of serial and provided little that was useful to the fenders. Equipped with a protocol that murderers (so called because they type of profiling done by members of the covered most aspects of the offense killed several victims over a period of NCAVC. and many facets of the offender's per- time). Another grant was awarded for sonality, the Special Agents conducted research on serial rapists and child ab- extensive interviews of incarcerated ductors/molesters. Results from the first violent offenders. grant are being published in profes- It was through the CPRP that researchers outside the FBI became in- volved in the unit's violent crime sional journals, including the special experiences-such as divorce, mar• issue of the FBI Law Enforcement riage, change of environment-and load Bulletin in August 1985. Results of the stress to risk-taking. Among the results, rape study will be published in the near the researcher found that even though future. police officers with greater negative life experiences (divorce, death in the fam• Current Research ily, etc.) took more risks, they did not The function of the Research and necessarily fail to achieve their goal Development Program in the NCAVC is more. That is, they may take more risks to generate interest in research , provide to achieve a goal, but those risks will not administrative support for approved necessarily result in failure. Special Agent Ault research projects, and to assure that the Still other important research in• results are consistent with the cludes studies on arson. The capability methodology. exists in the NCAVC to analyze multi• The studies of violent offenders and ple arsons. One NCAVC member violent crimes are not the only projects developed a computer-assisted system that the NCAVC has conducted. In to collect, organize, and analyze infor• 1985, a rape survey was completed mation that is important in the evalua• which inquired into the attitudes of tion of multiple arson cases. Called the police toward rape. Police are often Arson Information Management System depicted in popular literature as insen• (AIMS), it provides computer assistance sitive or even hostile to rape victims. to fire departments and police to help The results of the study on police at• them develop strategies to predict and titudes toward rape determined that prevent multiple incendiary crimes. The police are not insensitive to the plight latest application of computer analysis of rape victims. Moreover, police strong• of arson is set out in a study based on ly view rape as a serious crime deserv• information received from the Prince ing severe punishment. The value of Georges County, MD, Fire Department. this study is found in the contribution of The results of the study provide signifi• empirical research that corrects popular cant information on profiles of offenders misconceptions and reveals what the and their motives for the offenses. Pro• police themselves think about other viding the law enforcement community aspects of the criminal justice system accurate information about motives of which prosecutes the offenders. perpetrators enables investigators to Another research project ac• conduct logical, motive-based investiga• complished by the NCAVC involved an tions. The importance of this type of inquiry into risk-taking and life• accurate information cannot be experience stress by police officers. overstated, and the results of these The purpose of the study was to ascer• studies will be published in future issues tain the relationship of recent life of the FBI Law Enforcement Bulletin.

December 1986 I 7 "Providing the law enforcement community accurate information about motives of perpetrators enables investigators to conduct logical, motive­based investigations."

Left: Special Agent Robert K. Ressler consults with the project staff of the Criminal Personality Research Program at Boston City Hospital. Pic· tured are: Dr. Ann W. Burgess (at computer) and (standing from left) SA Ressler, HollyJean Chaplick, Marieanne Clark, and Peter Gaccione.

Below: Checking a reference are SA Ault and Cindy Lent.

o

Research is also currently con• The future itself is a study for the The changing image and mission ducted in other topics such as the NCAVC. The anticipation offuture prob• of the FBI in the past 10 years have pro• history of psychological services in lems in law enforcement is not being vided the National Center for the policing and the administrative goals of neglected. Using Delphi methodology, Analysis of Violent Crime with an un• the NCAVC. These projects will be a member of the NCAVC is now com• paralleled opportunity to dig finished in the near future, and their pleting a serious study that attempts to into the foundations of violent and conclusions published as they are determine the directions of law enforce• nonviolent crimes with the hope of completed. ment in the next 20 years. discovering clues about the behavior of Yet another important area for offenders that can be applied in a prac• research is terrorism. An NCAVC Future Research tical fashion to investigations. Members member will soon be publishing the The future also holds promise for of the NCAVC hope to continue results of several years of research in• other research topics. Using unique• searching to support investigations to training programs that are designed yet valid-methods for research, into violent crime. to enable individuals who may be held members of the NCAVC can address as hostages in terrorist-or other• such areas as public corruption , situations to cope more effectively with fugitives from justice, jury selection, the stress of their captivity. This child molestation, terrorism, and extor• research emphasizes hostage survival. tion. In fact, areas in the criminal justice system still needing research are limitless.

8 I FBI Law Enforcement Bulletin ______Criminal Profiling A Viable Investigative Tool Against Violent Crime

Quickly apprehending a perpetrator 1) Evaluation of the criminal By of a violent crime-rape, homicide, child act itself, JOHN E. DOUGLAS, M.S. abduction - is a major goal of all law en• 2) Comprehensive evaluation Special AgenVProgram Manager forcement agencies. Unlike other of the specifics of the crime Profiling and Consultation Program disciplines concerned with human scene(s), violence, law enforcement does not, as Behavioral Science 3) Comprehensive analysis of Investigative Support Unit a primary objective, seek to explain the the victim, actions of a violent offender. Instead, its National Center for the Analysis 4) Evaluation of preliminary task is to ascertain the identity of the of• of Violent Crime police reports, fender based on what is known of his FBI Academy Quantico, VA actions. Described by one author as an 5) Evaluation of the medical and emitter of signals during commission of examiner's autopsy protocol, ALAN E. BURGESS, M.Ed. a crime,l the criminal must be iden• 6) Development of profile with Special AgenVUnit Chief tified as quickly as possible to prevent critical offender characteristics, Behavioral Science further violence. While studies explain• and Investigative Support Unit ing why certain individuals commit 7) Investigative suggestions and violent crimes may aid them in their predicated on construction of the Deputy Administrator search, law enforcement investigators profile. National Center for the Analysis must adapt the study findings to suit The process used by the person of Violent Crime their own particular needs. Criminal pro• preparing a criminal personality profile FBI Academy Quantico, VA filing is a tool law enforcement may use is quite similar to that used by clinicians to combine the results of studies in other to make a diagnosis and treatment plan: disciplines with more traditional techni• Data is collected and assessed, the ques in an effort to combat violent situation reconstructed, hypotheses are crime. formulated , a profile developed and tested, and the results reported back. The Profiling Process Criminal personality profiling has The profiling process is defined by been used by law enforcement with suc• the FBI as an investigative technique by cess in many areas and is viewed as a which to identify the major personality way in which the investigating officer and behavioral characteristics of the can narrow the scope of an investiga• offender based upon an analysis of the tion. Profiling unfortunately does not crime(s) he or she has committed. The provide the identity of the offender, but process generally involves seven steps. it does indicate the type of person most likely to have committed a crime having certain unique characteristics.

December 1986 I 9 Profile Applications to build a profile of the offender. 5 The One area in which criminal pro• theory behind this approach is that filing (personality assessment) has been behavior (sexual, physical , verbal) useful is in hostage negotiation. 2 Law reflects personality, and by examining enforcement officers need to learn as the behavior of the rapist during the much as possible about the hostage assault, the investigator may be able to taker in order to protect the lives of the determine what type of person is hostages. They must be able to assess responsible for the offense. Common the subject in terms of his probable characteristics of arsonists have been course of action and his reactions to derived from an analysis of the Uniform Crime Reports .6 Knowledge of the ar• Special Agent Douglas various stimuli. In such cases, police obtain information about the offender sonist's psychodynamics can aid the in• through verbal contact with the hostage vestigator in identifying possible taker and possibly through access to his suspects, predicting location of subse• family and associates. quent arsons, and developing techni• Criminal profiling techniques have ques and strategies for interviewing also been used in identifying suspects. anonymous letter writers 3 and persons Criminal profiling has been useful who make written or spoken threats of in investigating sexual homicides violence.' In cases of the latter, because many of these crimes appear psycholinguistic techniques have been motiveless and thus offer few obvious used to compose a "threat dictionary," clues about the killer's identity. In whereby every word in a message is murders that result from jealousy or assigned, by computer, to a specific a family quarrel, or take place during category. Words as they are used in the commission of a felony, the readily message are then compared to those identifiable motive generally provides words as they are used in ordinary vital information about the identity speech or writings, and the vocabulary of the killer. Because many sexual usage of a particular author or speaker homicides fail to provide this infor• may yield "signature" words unique to mation, investigators must look to that individual. In this way, police may methods that supplement conventional Special Agent Burgess not only be able to determine that investigative techniques to identify the several letters were written by the same perpetrator. individual but also learn about the background and psychology of the Case In Point offender. Criminal profiling uses the Rapists and arsonists also lend behavioral characteristics of the of• themselves to criminal profiling techni• fender as its basis. Sexual homicides, ques. Through careful interview of the for example, yield much information rape victim about the rapist's behavior, about the mind and motivation of the law enforcement personnel may be able killer. A new dimension is provided to the investigator via the profiling techni• que, particularly in cases where the underlying motivation for the crime may be suddenly hidden from even the more•

10 I FBI Law Enforcement Bulletin "Criminal profiling uses the behavioral characteristics of the offender as its basis."

On occasion. NCAVC profilers or major case specialists will conduct on-site consultations. Pictured from left are Special Agents Robert Hazelwood. Ray Phelps. James Wright (kneeling). Robert Ressler. and Alan Burgess. experienced detective. The following nations, background of the victim, and her panties were pulled down to her case will illustrate this point. previously reported neighborhood knees. The murder weapon (hammer) During the fall of 1982, an urban crimes, etc., was still pending, the belonging to the victim was found in kit• Midwest police department detective detective was advised that a profile chen sink, and it appeared that the vic• telephonically contacted the FBI's could not be provided at that time. After tim's blood had been washed off the Behavioral Science Unit at the FBI approximately 1 week, the detective for• hammer by the subject. Crime scene Academy asking for some assistance. warded the necessary information to the photographs further revealed that the The detective described in detail the local FBI field office criminal profile subject opened dresser drawers and rape/murder of a 25-year-old white coordinator. After reviewing the case for closet doors. Investigative reports in• married woman . The detective advised completeness, the profile coordinator dicated the victim's husband advised that the apartment where the victim was forwarded the materials to the that jewelry belonging to victim was killed had been ransacked, but they Behavioral Science Investigative Sup• missing. were unable to determine at that time port Unit at the FBI Academy for The victim and her husband had if anything was taken by the killer. In analysis. lived in the apartment for approxi• view of the fact that many leads were Color 8 x 10 crime scene photo• mately 6 months, and neighbors and still outstanding and information con• graphs re-created the crime and re• associates reported they were friendly cerning the autopsy, laboratory exam i• vealed that the victim was killed in her and quiet and kept to themselves. The living room, with no evidence of any medical examiner concluded in his struggle or defense attempts by her. The victim was lying face up on the liv• ing room floor. Her dress was raised up over her hips exposing her genital area,

December 1986 I 11 "Profiling . . . does not provide the identity of the of- fender, but it does indicate the type of person most likely to have committed a crime having certain unique characteristics."

Profilers in "think tank" session. Seated: SAs James Wright, Patricia Kirby, and Ronald Walker. Standing: Lt. Thomas Cronin, PO, Police Fellow (left) and SA R. Stephen Mar• digian (right) protocol that there was no apparent in• returned to the living room where he The detective was coached regard• dication that the victim was sexually confronted the victim face to face and ing suggested reinterview techniques of assaulted. Laboratory reports indicated repeatedly struck victim about her head the victim's husband. In addition, the that the victim had been drinking at the and face. After killing her, the offender detective was further advised that if the time of the assault, and there was no realized that the police would surely im• victim's husband were given a evidence of semen present in or on the plicate him as the obvious murderer. He polygraph examination, he in all prob• victim or her clothing. then washed blood from his hands in the ability would react more strongly to the From the above information, the kitchen sink and also cleaned blood and known fact that he was "soiled" by his criminal profiler advised the detective fingerprints from the hammer. He roil• wife's blood than to questions concern• that he had already interviewed the ed the victim over in a face-up position ing his wife's murder. The detective was killer. The surprised detective was and "staged" the crime to appear the told to have the polygraph examiner presented with the following probable way he felt a sexually motivated crime direct questions at the husband, crime scenario. should look. He conducted the staging acknowledging the fact that he got The victim was drinking with the by making it appear that the offender blood on his hands and washed them offender prior to her death. An argument searched for money or personal proper• off along with the hammer in the kitchen ensued, reaching a threshold where the ty in the apartment. sink. offender could not take it any longer. Upon hearing this analysis of the About 5 days later, the detective Angered , he obtained a "weapon of crime, the detective exclaimed, "You called the criminal profiler to advise opportunity" from a kitchen cabinet and just told me the husband did it." that the victim's husband was charged with murder. According to the detective, the husband failed the polygraph and subsequently admitted his guilt to the polygraph examiner.

12 I FBI Law Enforcement Bulletin The Profiling and Criminal profiling is available to where the detective has another in• Consultation Program local, State, Federal, and foreign law vestigative weapon available to him in The FBI's profiling program has enforcement agencies or departments. solving a violent crime. The offender, on grown considerably since the late 1970's It should be noted that not every violent the other hand, has an added worry that from "informal" analysis and profiling crime matter lends itself to the profiling in time he will be identified, indicted, during criminal psychology classes at process. The criminal profile coor• successfully prosecuted , and sen• the FBI Academy to the present for• dinators in the FBI field offices deter• tenced for his crime. malized program. Currently, the pro• mine during review of the case whether gram consists of one program manager it can be profiled. However, while a case and seven criminal profilers and crime may not be suitable for profiling, the analysts. These Agents were selected coordinator may still submit it to the primarily for their investigative ex• Behavioral Science Unit for other types perience, expertise, and educational of services. Criminal profilers at the FBI backgrounds. The Behavioral Science Academy may assist the law enforce• Footnotes Investigative Support Unit has found ment community by providing inter• 1 M. Willmer. Crime and Information Theory (Edin· that anyone seeking transfer into this viewlinterrogation techniques, in• burgh. England: The University of Edinburgh. 1970). vestigative suggestions and techniques, 2 M. Reiser. ·Crime-specific Psychological Consulta· highly specialized program must tion," The Police Chief. March 1982, pp. 53-56. possess above all other attributes and establish probable cause for search l M. Casey-Owens, "The Anonymous Letter Writer-A Psychological Profile?" Journal of Forensic accomplishments a strong investigative warrants as a result of National Center SCience, vol. 29, 1984, pp. 816-819. for the Analysis of Violent Crime violent • M. S. Miron and John E. Douglas, "Threat background that includes participating Analysis: The Psycholinguistic Profile," FBI Law in, supervising, and managing major offender research findings, assist pros• Enforcement Bulletin, vol. 48, No. 9, September 1979, ecutors relative to prosecutive pp. 5-9. case assignments. , R. R. Hazelwood, "The Behavior-oriented Inter• During 1985, the Criminal Profiling strategies, and possibly provide view of Rape Victims: The Key to Profiling," FBI Law Enforcement Bulletin, vol. 52, No. 9, September 1983, and Consultation Program received testimony as a witness for the prosecu• pp. 8-15. over 600 requests for profiling tion or as an expert witness during the • A. O. Rider, "The Firesetter-A Psychological Pro• file," FBI Law Enforcement Bulletin, vol. 49, No.6, June assistance. It is anticipated that once sentence phase of the trial. All cases 1980, pp. 4-11. must be submitted to the local FBI field 7 Vernon J. Geberth, Practical Homicide Investiga• the FBI's Violent Criminal Apprehension tion: Tactics, Procedures and Forensic Techniques (New Program (VICAP) is fully operational, the office for review and administrative York: Elsevier, 1983), p. 399. number of profiling requests will nearly handling by that criminal profile double annually. coordinator. One key link to the success of the Lt. Commdr. Vernon J . Geberth of FBI's Criminal Profiling Program is its the New York City Police Department criminal profile coordinators who are wrote in his book, Practical Homicide In• located at every one of the FBI's 59 field vestigation: Tactics, Procedures and offices. These highly trained and Forensic Techniques, "This program has selected Agents are responsible for proven to be beneficial to law enforce• screening cases and for providing ment and has provided homicide detec• preliminary investigative suggestions to tives with a viable investigative investigators. While the field coor• tool. ..."7 dinators do not have the authority to pro• Criminal profiling will never take the vide profiles to requesting law enforce• place of a thorough and well-plan \led in• ment agencies, they are authorized to vestigation nor will it ever eliminate the prepare preliminary "rough draft" pro• seasoned, highly trained, and skilled files which are reviewed by the profiling detective. Criminal profiling has, staff at the FBI Academy prior to being however, developed itself to a level disseminated to the requesting agency.

December 1986 I 13 Right: Pierce R. Brooks (left). originator and first Program Manager of VICAP. and David J. Icove enter crime report data into the VICAP computer system. Far center: Mr. Brooks (left) and Special Agent Ressler (right) Far right: Mr. Howlett (left) and Mr. Hanfland (right) The Violent Criminal Apprehension Program VICAP: A Progress Report

By Origin of the VICAP Concept In 1958, Pierce Brooks, already a JAMES B. HOWLED, M.A. On the afternoon of May 29, 1985, 10­year veteran with the Los Angeles Senior Crime Analyst VICAP Pierce R. Brooks sat down in front of a Police Department, had been assigned two "different" homicides among his KENNETH A. HANFLAND computer terminal at the FBI Academy and saw his idea, which was some 27 many cases. He believed that both Crime Analyst VICAP years in the making, become a reality. killers had killed before and decided to and On that afternoon, he watched as data attempt to find out if similar murders had ROBERT K. RESSLER, M.S. from the first VICAP crime report were occurred elsewhere in the country. His Special AgenVProgram Manager entered into the brand new VICAP com- available resources were sparse. There VICAP puter system. Brooks, who had lived at was no national information center Behavioral Science the FBI Academy for approximately 9 which collected information on the modi Investigative Support Unit months while serving as the first pro- operandi (MOs) of transient killers. National Center for the gram manager of the FBI's new Violent There was a teletype system, but Analysis of Violent Crime Criminal Apprehension Program, was teletypes were easily lost and many FBI Academy Quantico, VA just 2 days from returning to his wife and were not even read . Brooks employed home in Vida, OR. a new tact in the investigations; he

14 I FBI Law Enforcement Bulletin ".. . VICAP is a nationwide data information center designed to col/ect, col/ate, and analyze specific crimes of violence."

began going to the city library and regarding the development of a National the computer support system, and reviewing major city newspapers look- Center for the Analysis of Violent Crime internal procedures. VICAP officially ing for stories describing similar cases. (NCAVC). The NCAVC was seen as a became operational on May 29, 1985, The use of the library to search for formalization and extension of the 2 days before the self­imposed deadline similar cases during a homicide existing programs within the unit, as of June 1, 1985. investigation in the late 1950's was a well as an attempt to identify other in- primitive forerunner of VICAP. It was novative concepts being developed What is VICAP? that effort which spawned the idea that around the country. The BSU programs As envisioned by Brooks and im- grew into today's reality. had resulted from the work in the plemented by the FBI with his development of criminal personality pro- assistance, VICAP is a nationwide data VICAP and the FBI filing and the supporting research done information center designed to collect, During the 1970's, Brooks spoke by members of the unit in the area of collate, and analyze specific crimes of with officials of the U.S. Department of violent crime. violence. Currently, cases which meet Justice about his concept. Eventually, A BSU staff member joined the the following criteria are accepted by LEAA funds were approved to finance VI CAP Task Force, and the Behavioral VI CAP: a task force to study the idea. Homicide Science Unit programs merged concep- 1) Solved or unsolved homicides investigators, crime analysts, and other tually with VICAP. In 1984, the National or attempts, especially those criminal justice experts from over 20 Center for the Analysis of Violent Crime that involve an abduction; are State and local law enforcement agen- was formally established by an apparently random , motiveless, cies participated. interagency transfer of funds from the or sexually oriented; or are Coincidental with the activities of National Institute of Justice to the FBI. known or suspected to be part the VICAP Task Force were discussions VICAP had until then been only a of a series; by members of the FBI's Behavioral concept, and it was decided that the first Science Unit (BSU) at the FBI Academy year of operation would be considered a field test of all aspects of the program, including the VICAP Crime Report form ,

December 1986 I 15 "By analyzing the case­related information submitted by law pattern characteristics exist among the

Right: Checking VICAP entries are Mr. Hanf/and (standing), Constance Dodd (left), and Michael Mahieu (right). Far center: Anna Boodee (seated left), Mr. Howlett (center), and Roland Reboussin (right). Far right: Tracking criminals are major case specialists Winston Norman (left) and Terence Green (right).

2) Missing persons, where the cir- similar pattern characteristics exist three­part VICAP Crime Report form cumstances indicate a strong among the individual cases in the had been developed to collect the infor- possibility of foul play and the vic- VICAP system. The identification of mation necessary to support the opera- tim is still missing; similar patterns is made by analyzing tions of VICAP. The Bureau's profile 3) Unidentified dead bodies where MO, victimology, physical evidence, coordinators from each of the 59 field the manner of death is known or suspect description, and suspect divisions received in­depth training suspected to be homicide. behavior exhibited before, during, and regarding the VICAP Program itself, as It is important that cases in which after the crime. well as the use and completion of the the offender has been arrested or iden- The goal of VICAP is to provide all report form. It then became the job of tified are still submitted so that unsolv- law enforcement agencies reporting these individuals to provide training to ed cases in the VICAP system can be similar pattern violent crimes with the in- State and local law enforcement person- evaluated for possible linkage to known formation necessary to initiate a coor- nel, especially homicide investigators, offenders. Also, it is anticipated that the dinated multiagency investigation which regarding VICAP and the submission of VICAP system will be expanded to in- will lead to the expeditious identification information using the form. clude rape, child sexual abuse, and ar- and apprehension of the offender Perhaps the largest task was that son cases within the next 12 to 24 responsible for the crimes. of continuing the development of the months. computer programs necessary to allow VICAP's First Year By analyzing the case­related infor- the analysts to manipulate the vast mation submitted by law enforcement The attainment of the first objective, amounts of data in a meaningful way. agencies, the VICAP staff determines if becoming "operational" by June 1, 1985, and the entry of the first data into the computer were, of course, only the beginning. A very comprehensive,

16 I FBI Law Enforcement Bulletin enforcement agencies, the VICAP staff determines if similar individual cases in the VICAP system."

The level of detail collected by the report Crime Report form was collecting infor• not the issues. It was , however, becom• form dictated that large and complex mation that was too detailed for its ing apparent that the time had come to programs be developed. And the type intended purpose of providing crime carefully review and reevaluate the of case matching demanded by VICAP analysts with the information necessary VICAP Crime Report. had never been accomplished before on to establish linkages among cases. In early 1986, the report underwent such a large scale. All of these factors VICAP's purpose was not to an extensive review, revision, and combined to make the entire develop• investigate cases but to analyze them . validation process. The revision was ment process slow and occasionally In order to do so effectively, general pat• tested during controlled tests by over 30 frustrating. terns have to be discernible, and that is experienced investigators attending the better done by establishing the general 144th Session of the FBI National A Major Revision parameters of events rather than ex• Academy and modified further based Approximately 6 months after tremely specific reconstructions. Crime upon their input. Finally, it was reviewed VICAP began to receive cases for en• scenes are seldom exactly replicated , by nationally known homicide in• try into the system, two things became but general MOs are. Crime analysis vestigators who had both an extensive evident. First, the number of cases be• and criminal investigation require dif• knowledge of VICAP and extensive ing received by VICAP was fewer than ferent levels of specificity. experience completing the existing originally anticipated. Second, develop• In addition, feedback regarding the form . The final product of these efforts ing a good understanding or overview report form was being received from the is the VICAP Crime Analysis Report of individual cases from information investigators who were completing the form . contained in the VICAP reports was dif• form. A vast majority commented that ficult for the VICAP staff. The VICAP it was "just too time consuming." The value of VICAP and the benefits to be derived from completing the form were

December 1986 I 17 "VICAP and the National Center for the Analysis of Violent Crime have been developed to serve State and local law enforcement. "

The VICAP Crime Analysis distribution may be limited to jurisdic- enforcement. VICAP is a no­cost Report Form tions over 50,000 in population, but as resource to enhance the ability of law The VICAP Crime Analysis Report additional copies are printed, the enforcement, nationally, to identify and form was released in July 1986. It is distribution will widen. apprehend the most violent of all both shorter and simpler than the pro- If you need a copy or copies of the criminals in society today­the serial totype. Most of the 15 pages to be com- form and your department has not murderer. If it helps just one officer iden- pleted are checklists, which can be received them , contact either the tify and arrest just one serial murderer, answered in 15­20 minutes. nearest FBI field office or resident how many lives will have been saved? Information which was submitted to agency or write or call VICAP directly. We may not know the precise answer VICAP on the first form and which is The address is: to that question, but if it's just one life, already in the VICAP computer system VICAP VICAP will have served law enforce- ment well. will not be lost or need to be reported NCAVC again . It will be converted automatically FBI Academy to be compatible with information Quantico, VA 22135 reported using the new form . From the perspective of the VICAP Or call (703) 640­6131 and ask to be staff, the report is expected to be both connected with VICAP. more effective and efficient. Efficiencies VICAP and the National Center for will be gained in the review and data the Analysis of Violent Crime have been entry functions, as well as in the time developed to serve State and local law required for computer proceSSing of the fD.4"IRcvJ­1I16I US Dtpartlllt.1 01 J.lkr data. The relative simplicity of the infor- OM'f'io.lllG«!1I fedetalikirelUdlnvt5upll(lfl mation, a brief narrative of the case, and the amenability of the data to analytical manipulation will all serve to enhance " J C ... effectiveness. Local law enforcement agencies have expressed concern with regard to the security of the cases they submit to ~ VICAP. As originally planned, VICAP is ­­­"V::­:'O:':':Lf=NT::­­:::C::­:'R'M""'NC:­:­A""L­ A' 7'::::­:'R::::fH­;:::fN:­:':S""'O""'N­ 'R:::::'::"OG::"::R'":":":'AM a confidential system . Based upon Privacy Act guidelines, the substance of each case remains within the VICAP system and will not be disseminated without prior approval of the submitting agency. When cases are linked through VICAP VICAP, the investigators in the local agencies are given each others' names Crime Analysis Report and telephone numbers so they can coordinate their efforts. The availability of the VICAP Crime Analysis Report form will also be im- proved. It is the desire of the VICAP staff to have the report distributed to and stocked by every law enforcement agency in the country. The initial

VICAP NCAVC FBl ACADlMY ~", ... o.\;'A mn till)I~1l1 PAGI! I PAOEl II. VICTIM INFORMATION DO NOT COWPlZT! THIS UPOaT WITHOUT fiRST READING L ....snucnOr.,'S

U This b Victim _ of_ Vlcdm(lo) In Th" hw:Wenl. (a...l:IIbcr) (Iotal)

Sulna.ofTblt Vlc.dm, I 0 I)rct:ued (III r"lUlI 0' Ihlt Inddt:nlJ 1 0 Su""llIor of AIt6(k J O Mlulnl 5. RqIOrtiI\lA.­c', ______6. Add______

(\hl, finl, middl ..)

U . Reportina~,C-NumlMn la. Allas(H) (lndudl", _klen nalDlt .nd prior IMr,led Mm...): I). NCiC Numbe, IfVkdm 11 11t.4­.s... or ZI lin UnkknliRed Dnd Bod" In¥.,.upl""·' N.me, 15. In_u,.I,,,,·,PboneNumbet­, ___ • ___ • ___

16. V1CA.P~MW"'bponType, 19. R...lcknl CI.." ______}O, Sule. ___ 31 ZIP: ___ 1 0 Orlclnal SubtDlMlon 01 Thl' Cue Jl. Soc.ial $Kurl.., Numben __­ _­__ Jl FBI N...sber- ____ 1 0 ~lnoM;nt 10 P,u,­I, Submlltitd lnformalNm J 0 CorTulNm of P~~ly Submlfled In(ormal~ Su: 17. la_lprl", Aacnq', Cue SUNaI ". I O M.le , o Female .. o Unknown I 0 ()pcn (acll .. e In..aIIpIlClft) .. a CIe.red by Anen lI. ," (lftll(d~ ~n!f::::iIlY .. O HI_Plnle , 1 0 Sutpended IA¥eulpdClft) 5 0 Clellred (b, UCR I a BIIc.k , DOtH' , a C._lin o OrIc:ntallAalln o Unknown J 0 ()pen __ An.... Warr..nl 1-..cd . .. .)6. o.lt: 01 Blnh: ­­'­­'_ ;""""FiiiNSI!I t-) I (da) I (yrl 18. Thl& VICAP Crime AnalYlI& Report PerulN 10 lhe Pollowl", T,pe CaN (dwc.k one onM: 99 a Unknown I 0 M... ,de, or Altempted M...nter ­_ Vlellm Id.. nllfled lIo 10 hem 191 1 a Unidentified Dead Bod, Where t.bnne, of Dellih 11 Known or Slupeeled 10 Be Homlo::ldc: flo 10 hc:m 19) J a KidM,pplnt 0' MI..lnc Penon with IMdenee 01 Foul PIli, ( ..Iellm nlll mi..lnll )a. Ht:llhl (or bell ntlltllllr), _ fee, _ Inc.he. 99 0 UnklKlwn lactlo iteDllO) 19. Sued on Vour brpen..nce .nd the RCMilu of die hn·atlpt.lon of Thb CaN. Do VOII )9. Approll:lmale Wellhl: __'bo. Believe Thb Offend.. r H ... KIIlc:d Beforel 99 0 Unknown

l a Va (ea:plaill. In Nlln.dYe Sul'llflLlryl 99 0 UII'IIhIe 10 De.le,..hw .0, Build tch«:k one oal,): 1 O No I O SawoU(lhlnj ) 0 1..,.. (lloo;k,) 2 o MflIhllll(a¥"n,cl 99 a Unkn_n 10. There b 1111. Indlallon 1M.1 Th" C­ 11 Related 10 Ort;t.nlKd On.1 T ....ffic:ldna' I O V ... 2 O No 99 0 Unabl" 10 De.lentUnc "I. KablA:nph(ehec.konconl,): 1 a Bald or ShI¥Cd .. a Shoulder Lenlth 'ijiiNUh.Ciii,jINi.." 1 0 Shorler TtwIn Colla, Lt­nllh } a Loniu Than Shouldt:r' Le~ 11 . Today'. Dale: J a Collar lA:ncth 99 O U""_n .. 1. tbJr Sbadc "'beck one onl,): 0 ... I au,1N J 0 Nelthe, I or 1 Abo" 1 O o.,k 99 a Unknown Vkdm U.ISttDI ~~~ o o (_I ida) (,'1 "J, ~Inut Hair Color (cbec.k one onl,p 1 a Cn, IInd/or Whlll: 5 a 8IKII 1), Dc.th or Major AtPuh: ~~~ o o (_) ida) \,r) 1 a Blond 6 0 Other ) O Red 99 0 Unknown 1... Vlc.llm or Body found ~~~ o o .. 0 8,own (_) (dll) (yr)

PAGIIJ Ill. OFFENDER INFORMATION If ,our ¥lc.dm I, t:llhe, • ml ..lnl penon or lin ... nidt:nllflcd dt:ad bod,. re'pOad 10 hem, .... throup 48. OFFENDER DEFINI!D. AI ...Kd In Ihl. VICAP Crime Analy.'" RepOrl. "offender" Indudn lI"flIUI, Otherwl.... 1010 ht:Dl "9. perpelflllGn, 0' penoN Ihe InlleulplOt hat rcll_blt: (II...... 10 bello:llc IIr.. rapontible for lhe ..... AbnomM.llda M THth' eommlMionofthrc.rllDolt. 1 a None 5 O l)e(ll,ed 9 0 Other IdeKrlbe): __ 1 O &r.ca 6 a Nocknblc Gapt 3 a Brobn or ChIpped 7 0 Some or All M ..lna O Uak­. II""""P'"55. Thif, It Ofiendiltt __01 _ Offl'nckIiIJ In TbJa Incldenl • .. C Croolcd 8 o Suolned ~ ...bcrl (Iou!) ..5 ca­. or CorTud" I.maa NOI'IDIIII, Worn by or AMoc..llled with VlctlDl: 56. The Offt:nde, b (dwek one oal,): I O N_ 6 Mt:talFnl!lC I 0 Ua.known­­NOI Secn (&0 10 h ... 8}1 1 0 PrcKrlptloa 7 C Rlm.la. 1 a Unknown­­Src:n J a Contaeu 8 0 Othu (dcKribe)! ____ 1 a lderuiflrd (named)­­Nol In C...uody .. 0 81focalt .. 0 In Cuuod, 5 0 Pt..dc. Frame 99 Unknown 5 a Dec.eaKd FnW'h!!iiiil'i'UKfI' Loc.atloo 01 Nockcllble Scan or Birth...,k, (Roc call_): I O None .. T_ 7 0 Other \deKribeh __ 1 0 Fac.e. He_, or N..c.k 5 a Bullock, (lu1.finl.mwl", J 0 Ann(ll or Hllnd(tJ 6 a Feel or Lt­II.' 99 a Unknown 58, AU..(d) (lnc.I ...dlflllftllldc.n Mmt: lind prior ....rrlt:d name,):

"7P'"I' , T_ttooLoc:lltiont: I O None o TortO 7 C Othu (d"Krlbc): __ 2 O P.c... Hud,orNt:c.k O &lI1ock. 59. R...Id..nl ell.,.: ______60. Stale: ___ 61 . ZIPI ___ 3 0 Ann(o,) or Hllndlt) u Feel or LeIl,1 99 C Unknown ..a. Tllnoo iktlpuc 62_ Soc.III SeelUi.., N ...mbr" __­_­__ 6J. FBI N...mber ____ 1 0 Inlrial. or Wonb Other (tped"): ____ 1 O N ...mixritl P"ii1i"fi!ii'Ii'Qi!! J O PicNre(t}or Oc.lln(t) 64. Su: ii·,UtMflW'P'iiiiW"M,,1J 1 O Mllie 1 0 P.. _le 99 0 Unknown 49 Did the Vletlm HII~ Ouul.ndinc PhYllca1 FUI... rn (c:flI6... d 1',.... ~lc.uble Iilllp. pbYlic:a1 RKt:: ddormil" elc..)t (Do nOi repql lnio.­malion reporled In hl'lN .... Ihroulh ..a, llbo..".) I a 8IKk J O HItPlnlc. 5 OOthrr ~ g ~: (deKriix): ______1 a c....c.ulan .. a OrIencallAalan 99 a Unknown 66. Dale of Blrlh: ­­1­­' _ 99 0U ~ (!no1/(u )/(,r) 99 a Unknown

50 Cel'lCrall.,. Prderrcd CIolhlnl Scyl.. (lhi.ltrm dul. wllh IItMnl ",Ie M dru. ",plalh prcferrcd by 67 ~~t7r:~=le)_ITllMoflndd"nt bun) lbe ,"c.lim. not II detailed dochl", OcK,lpdoO\)1 I 0 Bwlnr" Suit 6 0 Work Ckllh", or 68. Ht:llhl (orix'i "limate)! _'eel _Inc.het (10_ fHI _Inchal 1 0 C.,.."I Uniform 99 a Uaknown 1 a Caudy or C.rl,h 88 a Othu (deK,ii>l:): ____ .. a Spon or Alhlt:d(" 69. 8u.ild {eht:ek 01'lC onlv l! } 0 W"'lern Wear 99 Unknown I a SI!UIII(Ihlnl , o t.rp (o,IOCky) , a Medl... m(avenlC) o Unknown 51 Cenenlly Preferred PredOMlunl Color TOM 0( Clolhlnl .. khec.k one onl,): 70. Hair Lenph (eht:c.k one onl,): I O Whilfl .. 81...... 7 0 8roWf\lfT6N I a Bald or Shaved Sboulder Lt­nllh 1 O V .. IID.... 5 O l'l.lrplc,l\'lolt:u 8 OCn,VBIac.tu , o Shor1rrTluonColt.rl.enlth ,• C Lon..,r 1M.n Shoodder Lenllh ) OCrccN 6 u Red,Ora"," , o Collar Lenllh .. a Unknown 52 If Thl& Vlc.lhn It II MI..lnl Penon or Unldcmlflt:d IXad, Clve _ IX,"I1ed. Oucrlptlon ofCluthinl: 71. Hllir Shade (ehec.k one only): I O Lllh, , , a Nellher I or 1 Abolle a Dark .. o Unknown n. Pl'c.domlnanl H.lr Color (ehec.k one onl,): "M,nd4N4 I a Gn,lIndJorWhhe maek 5J Vlc.tim', Retldeace (dll'ek one onl,): , 0 ...... • Other I 0 Si",It:.Famil, Owt:III", .. MocorVt:hlc.Ie , 0 ...... • DUnk_n 1 u Muhl·Fllmll, D ..o.elllni 5 Screel 0 "'_ 1 Trmporar, or TraMknl """.i", 99 Unknown . 5 .. CurrenIOce....,.liClft{t): I) ____

December 1986 I 19 PAGE 5

73. Was Wearing Glasses: 1 D Yes 2 D No 99 D Unknown

74. Facial Hair (check all that apply): 1 D None 3 D Beard 99 D Unknown 2 D Mustache 4 D Other

75. Appeared Generally Well Groomed: 1 D Yes 2 D No 99 D Unknown

76. Offender Wore a Disguise or Mask: 1 D Yes 2 D No 99 D Unknown

SCARS ANDIOR BIRTHMARKS 77. Noticeable Scars or Birthmarks (not tattoos): 1 D Yes 2 D No 99 D Unknown

TATTOOS 78. Noticeable Tattoos: 1 D Yes 2 D No 99 D Unknown

OUTSTANDING PHYSICAL FEATURES 79. Other Outstanding Physical Features of the Offender Not Reported Above (crossed eyes, noticeable limp, physical deformity, etc.): 1 D Yes (describe): ______2 D No 99 D Unknown

IV. IDENTIFIED OFFENDER INFORMATION If you have an offender in custody or identified in this case, complete Items 80 through 84. Otherwise, go to Item 85. OFFENDER BACKGROUND 80. Cities and States of Residence during Last 5 Years (exclude current city of residence): 1) 3) 2) 4)

81. List the States the Offender Has Visited during Last 5 Years (attach separate sheet if necessary): 1) 3) 2) 4)

82. Foreign Countries Lived or Traveled in: 1) 3) 2) 4)

PROPERTY OF OTHERS 83. Offender Was in Possession of Property of Others (check all that apply): 1 D Body Parts 4 D Jewelry 2 D Clothing 5 D Photo(s) 3 D Credit Card(s), Checks, or other 88 D Other (specify): ______I.D.

OFFENDER'S ADMISSIONS 84. Offender Admits Other Similar Crime(s) of Violence: 1 D Yes (attach details) 2 D No

20 I FBI Law Enforcement Bulletin PACE' PACe? V. VEHICLE DESCRIPTION 99. U the Offclllda­ 1,,!llAted CoaIKI whh the Vied. by "'1"«"1 and 11IUMd1A,,, Ph,.kal "­1,111, lftdkale the Type: 01 Direct and hD.editle Ph".lcal AMa.ilt 8dow, 85...... Vehicle KAOW1I to H... )kolin UlOId In Thl.lndcknll I 0 lIamcd"tciyand Ph".kally Onr· J 0 Choked Vklba I O Ya 1 O NoOt'Unilnown/aocohclII96) POWlred Vkdm {JIkkcd up, carried 0 Stabbed Vicdlll ._y,elc.) 0 SllOi VictllD NOTE: Compmc ..chide In(GnnIIlkm I( 1) ....chkle ... uMd by lhe off"ndcr In IbM 1 0 HII Vktllll with H.nd, Flal, Of 0 Other 01""':1 ~It InddeDI: Of' 2) thu u • tIl....'n• .,.non _.Ad Ihe "hick" IIIIMlnl1 or) Ihtl ban Clubblna Weapon unkicndfl~ dead CaM and Ihe vchlcle hat bun wnnecl.d with ,h. VICIIIII; or of) Ihe vehicle I. In any ­v IlrnlnClndy involv.d In Ihla Inddenl. UiiHfllllfl!Wp"""I'",,, 86. Old Ih. V.hlde 8ot:10Cl110, or W.. II under Ihe Civil Control 0(, Ihe Vlcdml 100. Lan Known London or ldenllfled Vkdm or Locallon or Unl4cntlfled Dud Body Reconry Shirl a. 0 City 01 (Ir wldtln lnc:orpot'.led city, lown. elc.) l O Y" 1 D Na

81. The Vehkle W~ld No~lI., a. Or..c:rlbed at Bel"" b. 0 CounlY or (If not within Inc:orponled city, town, Itc.) 1 0 bccptklnlllly Well Maln,­Ined (".harp" J 0 Neilhn I or I Above 1 0 Not Gucrally Well Xcpt r'kal­\lp" 99 C Unknown d. ZIP, 88. The Vehlcl., Woo.dd NOnNIlly Be OtlCrlbed .. EXlnl' I a N ...... ,ILIo'1: Model .) 0 Nellhn I or 2 Abov. "!l.51!!%"'''" 1 0 Older Model 99 0 Unknown BODY RECOVERY SITE 10 1. Onc:.rlpdOA o( GeM:r.' Ala oIlhe Body Recovlry Slle (cblrek OM: onjy}l 89. Uunte Number, ______90. LkclUC Su.1.' ______I O Rurai ) D Urban 1 0 Suburban 99 0 Uunown 9, Vchk~ YQr: _ ___ 91 . Make, ___ 9]. MOIkI: 101. The Nelpborbood 01 the 80cty Ruovery She h PTc40Mi"",ul,. "­heck onc anly): 94. Body Styic., I 0 Bu.1_, Inckaatrial, Of c:o.­rdal • a Un.iQbablced Of WUde.tnaI I a P.""II.IC' C.r 6 D MOIOf'C:yc1e 1 a F..... Of AlrkuINnl 99 a Unknown a U"'~"':'~_::If~"== == =: ) O Raldc.nIl.t 1 0 V.n Pkk~p II ~ ) 0 TnKk 101. The Body Ruo'l'C"ry Sltc W .. (check .. ID&RY" .pedyr. • a "Jccp" TyPe 11.1.• Bnmco, 81ucr, elc.) 99 0 U"kn_n I 0 Any Rlrlldcnc:e 7 0 In an Oprn fleW 5 O Trac:tol­Tnllel 1 a AI or Nur. School 0.­ Playpound • 0 In a Vchlc1t l O in a Rctail Shoppln. Ot",let 9 a O!I Public Tnnlportatlon 95, Colo. , ­;;:,••==­,'­­­­­ ­''''=...==m'',--- • 0 On I P\lbl/e Str«1 88 0 O"'~h<:'~""~""~h'.=:==== = 5 a In. VlceArA :­: 6 a A [)crIMI., Wooded Am 99 0 Unknown V!. OFFENSE M. O. 104. 11M: Bod., R.ccoftry Site W .. Vktl.'. Rnldencc, 1 O Yn 1 O No 99 0 Unkno...n "UM,j'liWPPU'M'ii.ii""QMi'Q'''''ij'iiJM 105. The Body Recovery Slle W .. Victim', Work PIKe, 96, Thc Victim or a Wh_ Repo"~d Thai Ihe Offcru1cr', Appro.ch 10 Victim WUl I O Yn 1 O No 99 a Unknown I 0 No LIt,lnc Victim or Pcnon Wlcncwed thc OHlndn'. Appl"Ollch 10 Victim 106. Pocenll.1 Wltn­. at Ihc Tlmc Ih~ Of(cnd." wfl Ihe BodY'1 Ihe Bod,. Recovcry Sltc: (aoto1t~m 100) 1 0 Othcl Plt09lc Wc.e PreHnt In the 2 a A,u W.. EMcntl.lly DcHned 1 a 8., Deception or Com Opcnl,., ... lth Sublcr(UI<\ or Ploy (C.I., ofrert ...lltenCe or rCqUClU hnmedlete Arca 99 a Unknown dlrccdon) lIo 10 Itcm 97.nd thcn 10 10 hem 1(0) J a 8y SutprlK: t..y In W.h or Stcppcd from Conculmenl MURDER OR MAJOR ASSAULT SITE ther Sutpo"1tc. 5 O IIl.VlceArc. ) 0 Lay In W.h­­In Vchldc 6 0 A OcRMJy Woocicd Ara 0 Uunown

PACE. V!. OFFENSE M. O. (cont.) III, 11M: Munlc. or Major Aluuh Sile. W.. Vkd",', Rnldcnc:., 1l5. The Vktlm'. LNI Known Loc.tlon W .. Vktl",·. Re,kknc:c: I a Ya 1 0 No 99 0 Unknown I a Ya 1 No 0 Uunown

111. The Munlcr 01" Majo, "­ult Sile W .. Victim', Work Placc; 116 The Vkd",'. LNI Known Locadon Wu Vlclim'l Work Placc I 0 Yn 1 a No 99 0 Unknown I ::J y", 1 a No 99 0 UnltAown Ill. PtHentl.1 WItnc.Ma .1 Ihe TImc of the MlIrdcr 0' M.Jor ...... Ult l ¥9tU J"f'i,,+,iii I 0 Othc, Pcopk WClC PrcKnl In the 1 a Are. W.. Eatc.nllally Dacrtcd 117, There It E.tdcnc:c Thallbc OHcndc, Dbabled lbe TclcphOM, Othot, Udllllc., o.Secll.ity Dc.vlc:,., h..mcdilltc Area 99 0 Unknown I a Yc. 1 a No 99 0 Unknown SITE OF OFFENOE"R'S 'NmA1. CONTACT WITH V,cnM 118. Thc Propeny., tIM: CrI_ Sccncc.) W.. Ra_lted, Vlndaliled, or Oumc.cl: 114. W.. lhe SiTc oflbc OHeftdc,·. l1'Ilt"l Conc.c.t with lhe VklhD the Be_ .. lhe: MuRkl 1M" MfJor 1 ,., Yn 1 . No 99 0 Unknowa AMaultSild I C Ya(aotohcIDIZO) 1 0 NoOfUnJr.ROWIl 119 There A,c IndicaliolY Thai thc Offcndc, Took $l:CPl to Oblllcnic or Octt,o., E.tdcnee..1 Ib.c Sc:cnc: 115. [)c,.c;,lpdon 01 Gcnc.nl Are. of Initial Offcndc.r.Vlcdm ContaCl (c.hcck ant: anly): I 0 Runl ) a Urbron I a Yet 1 0 No 99 0 Unkno ....n 1 a Suburbron 99 a Unknown '''Pfuilj!iiii·'''M"'''''·il5i@''&jil'lh'flM!''Q 116, Thc Nelchbolhood of Inlt"l OHcndcr.VI(:tlm ContaCI II P,,,dooninontl,. (ehlldt ont: onl.,.): tlO. Wrlllni 0' C.,vl... on Bod,: I a ButlnCM, Indullrlal, or Commcrclal • 0 Uninhabited or WIlde.ntcM I a Yel (dclCrlbc), ______1 a No 1. a f.,m or ApleulNnl 99 0 Unknown ) 0 Rc.lckntlal 1)1. lrulrumlrnl UHd 10 Wrltc olC.tve Oft Bod,. I 0 Knlfc or Othcr Stu.tp lrulrllmcnl • a Wrldna hUlrumcnr (pcn, CIC .) 117. 'IlIc Inll'" Offendcl.vlc.tlm Conucl W.. {check .. many ...ppIY)1 1 0 Blood II a Other ~p«.lr,. ): 1 0 Any Raldcnce 7 0 1" an (}pcn Fkld ) O UplIlck 1 a AI or Ncar a School or PIa.,.lfO

123. The Ncllhbolhood of Vlcdm'l WI Kno ... n Loc.llon W.I Prcdomi""ftd,. (check one only): 1l5. W.. Thcrc Any Communication (rom the. Of(cndcr Bc(ore or Aftu lhe Crlmer I 0 8wIRCM, IndUlltlal, or CCKl:lm.ercilll • 0 Unlntu.bhed or Wlldcmc .. I 0 Yel (CndOH • copy or ''/'RopIl. 1 a No 1 a farm or A.,lcllh"nl 99 D Unkno... n of the communlclllo"l 99 0 Unkno... n J D Ruldential

114. The Vlcdm'.1.&M: K_" Location W .. (ehcdt .. _"Y" .pply)! I 0 Any RCiIdcac:c 7 a In .n Oprn AcId 1 a AI or Near a School or Playp­ound • D In • Vchkie l O in. Retail Sbopplna OUtrlcl 9 0 On Public TnntJlOtUllon a On. P\iblle SuCCI 88 0 Or.~;"';' ""';:':I" ~'======o In.VkeArc:a ;;: o A OcRMI., Waodcd Am 99 0 Unknown

December 1966 I 21 PACE 10 PAC! II VII. CONDITION OF VICTIM WHEN FOUND !!ii","!§@,mii ,,"iii!§M"'iQ:!!'pji""II''''Q IJO. CIothI", on Victim Whc.n Found, 116. T'hc.rc It Rc_ to Bell,ve lhe Of(cnck, ),(01<'" the Bod, r,_ 1M Alta 01 th.I o..th She to the Arc. of the Body RoIco"",,,, Site I 0 fully Orated ) O Nuck U 0 OIher ,"I'"lty)l _____ I C Y.. 1 o !liD 3 0 Unable to Detcrm.lne 1 a hnialJy Und,nHd 1)7. etlldcnec &lUll'''' Ihe o(lcodllf DbpoMd 01 Ih. Bod., In the Followln, Manoerl 151. Tbe­re h Eridenl:e the Victim Wit Re4.~ b, QI'.ndet', 1 0 ()pcnl, Ohpl.yitd or Ckhc:rwl" ) 0 With en '­""",..01 Lack 01 I 0 Yet 1 a No J 0 U..ble to Oeillfllllnc Placed 10 I_,ll' Oleco...",,.., Conc:cm at 10 Wbcl.h.u or Noc 1M 1 C Conculed, Hldci"o, or OthuwllC Body W .. DI~olfr.,..d 151. Th"'tlllt Ericknclllo Suual ThaI Any or All oflhe Victim'. Cloth'", had belln Rippe" Ot"TOnI I Placed I" OnIcr J.o P"'lCnt OMco..". 99 a UMble to J)ucrml,.. I a Vn 1 a No J a Un­bill 10 Delermlne

III II Appun the Body of the Vied ... W .. '.,,,,,,Io,,,,li)l Plated In all UnneN,..1 Of Unu.tlloJ P.llion 15). Thue It Eritknce 10 SuU~1 ThaI An, or All aI dt18 Victim', Cloc hl", had been Ctil from Ih18 Body, u~aed _,,,,, Dtalll, Had Occurred ,•.•.• 01' poMd,), I a VIII 1 0 Nu ) a u.. ble to Dclermlne l O Y.. :: 0 No ) 0 U,.,.bl. 10 D.lcnoinc 1J9. Body w.. OUc:ovcm,,, 154. 1111..". aI mil Vlwafl Clocblnl Wer. Mlttlnl 'rum Ihe Bod, RKO .... ry 5111: I 0 Yn (lderulfy)· 1 Nu I a Burled J 0 In.Coro~I_r ( ...,,6va'lpttu.bc»t a 99 Unknown :: O Co"ucd ,cfrl...rator) a ) a In " Body 01 Water ..II".... "ltc, river, a 'n,V.hlcle nc.) O kc,lc,.;IlbocI,..,.",) 155. VIc1.I.IIIo'. CkMbI", (not on tM bod,) Recow­.rc:d.1 It.. Body Rccuw­.ry Slcll W... I 0 Plied Nully ) Hidden <4 a la. Bulldln& None ol Uw Above a a 1 a Sc.n.red 4 0 f'lot Applklbk 140. Illhe &oct,. W.. OI.co...,.cd In Waler, W .. II Wel,h,edr I D Y.. WlthWhld :: O No I Sf. &.ed on the l"woatlpdoD., 'IlM­n It IMdeftU 10 SU..... ""'1 &he Offllndc. Took Small Pe ...... 1 II~ Ioche:r WI'I dothlnal From d.., Vkdfll (theM Ilum rMY or rMY..at iN: ...It.\oIIblll, II.... pbotu., driyu', 1.kaIH, .ullN' Cotnll'Dll ~wlllry, IIIC .)I I 0 VIII ~) . 1 a No 1411'.,1,""+"". W.. doc Vied. Bound~ •• '9 99 0 Unknown I C Y .. :: a No lao 10 he. 146) In. Mickel) Uwd 10 Blnd or Retenln 1M Vied_ or the Bod,l 1 a A4 Attic:le of Oothl", 4 a Chala Vlll. CAUSE OF DEATH AND/OR TRAUMA 1 a Tape: 5 a Hlackvff, IN' Thumbc:uff. J O ~(O! ...., .ope.M,lnlorwlne,wlrc, U 0 ""'::"::,'~"'~<:I"'~' ~===== luthermClftl,~le .) _ "1'"11118'" lIYlctlaa It I Rlmro.­, 10 10 11.111 151. 14), The Ew­lIknc" Su~h Thai Ihe Re.lnllnl", Ocw­Io:­.w w... (ehc:c:k _ only): I a Btvuatu la Ihe SceQc b, lhe Off"ndu J 0 Boch I U'd 1 Abaw­e 157. MfliM:.1 w.IIIoh..,,'. or Coronll.'. Officially LWled C.IIK of Dellh, 1 0 An Attide Found II the Sc"ne by 99 a Unknown I a Cunthot WowwI{,t) 11 a Butnt­­ fire 1M Offender 1 0 Scab Wound,") U 0 Bu.nt __ Chc.m.I",1 ) 0 Cuulna or IndM: Woundll) Il 0 Bur.. _ SuI"I", 144, P"h aI Body Bound Cc:.hecl! ... man, ....pply), o &Junl Foree Il)j!oltY 14 0 Hypoth.erm1a or Ea­poMIre I a Ha.nde or Annt , 0 IUnciI.nd Ankle:(t) Bound Ta,etber a Stnn....a.don ­­ M.n...I, U"IUfll. 15 a Mlln!oltrilion IN' OebydI'Xlion 1 0 P_, Anklell), or l.ep 88 a ~:: h:"~"~" :""'::h:"::===== Undc:I.mdncd (drele OIM­) 16 0 Eiec:lroculion J O Nee" a Smotbr:ri", 17 a C...... bl'" ~"O' 4 a ArIat Bound to Tano C Al ...., Oc:dUl.!ou ­­ Ifllllmal II 0 bplu.l.­.: Traullll1 &~I o Tano eom.,...,..lun 19 a Uftlktermlned IU. Tbc IUndl... on the Vlclha Were .. (aaUoCh _e than meu_ry 10 e.onuol '<'klb.', I~ g ~~ eavelJKntl): U C OthIIt Ctpllc!fy)l _____ I ,., V... 1 a f'lo J a U..ble la IkIl:ralInc 146. The Body W .. Tkd la Anothu Obf.eCI1 'IM'" I C ~ ~ 151. M.;o, Tnum. LocllfonCt) (che

PAOt! 11 PAOli I' Vlll. CAUSE OF DEATH AND/OR TRAUMA (conI.) 160. E.lllruued NlilDberaiSub Wound., ______172. Sc_n Iderumutlon In • Body Clw­ltY of lhe Vlcllm, 1 C No ) D inAn... Unlble 10 lklllfmlne 161 EaII""ledNu...berofCunlq;Wound.,,______1 O lnV.al.. 4 O lnM()\Ilh 17). EykillnC:1I of Other EJaculldon 161. Numbnof EnlryGuMhot Wouncil, ______I O No 1 a On Body of VIC:llm U..b1l1lo Delermlne 16). Ra.. of Cunfl.Cl I O NotAppllc:able o CI_ (powder rqld~ / QlllocKnal 174. ThC­f1l II EYi ) a 175. b The,., Erid.ncc of Sexual IftHnlon aI FOI'II:lan OlI;«I(,) (Olkr It...n 1M pIInl.)lnlo lhe Vklllll'. Bod,! I a VII' 2 o No(ao 10 hlllll 171) 164 n".eil'#!P'''''§8hl: M.,1u Wr:rcl6cnllfled on the Vledm', Bodfl I O Yn 1 O NoliotohllCllI66) 116. Ew­ldenu o( Sr:x...llntenlon aI FOt"dan ObJllc:tltl SIIII ill Bod,. Wbc:n AnI O\Kow­ulld (II·I·,roc:k.,lwlll,knllr:,c1Olbinp 165. I.oeadon a1811" M.t.... , Iobjec:t) (obJUI) I O F":II 6 O C,oln 1 O NIIe." '1 O Cenlp,l .. MOUI~ ======II 4 C 0 OI""'r ) O Abdgrncn 8 O Thlaklt) ' I VlaI~= C O P

167. Et._nb of U"_IIN' Addldo.....1 ~ult upon Vlc:dm I a None 6 0 QI(lIndcr uplortd, Probed, or lX. FORENSIC EVIDENCE 2 a Vletba ~ Mudilled C.w­Ida en Wouncb ) 0 B.u­u on Vlelu. of Vicd. 4 a Vied_ Run On, by Vllhkw U 0 o",~",:,..':.~,,"~Ify~ ':"::===== 171. Wapont UMd by Offenckr ia Thl, luMult s 0 £w­kk.u of Canalblll6111 / V ....pl'.. _ \i.'" I a N_ 5 UplUtll I <"] fj'Urnt 6 H.ndtIN'FHI 16& Body rlra IkIlaOYCd by QI(lIrMien ) C Suobblns or Cultlnl Wupon 18 ,., OtMr WUpolt idacrliN:)1 ___ , 0 N_(lQIOJtIlIll''10) 10 O Ann{t} 4 a 811tdaeon or Club 1 O Had II '­' t.elf­I ) O Sc:alp 11 C e.--,It) 119. Aaluh WCilponll) UMd by Off,ftlkr, 4 O fln u O Nlppl~} I 0 Wupon of Opportunl,y """linde, flndt WAPOIIII IN' nur ,"nd S C THm 14 0 ","" 1 0 W""",", aI Choke Calfenckr ph'III:lecl' wUpott Ind brlnp 10 ,nlM­) 6 O E""W IS O Ge:nlcallil ) 0 80ch I Ind 1 AhoYII 7 0 Etr(" 16 a InlllrMl OrpM 99 a Unltaown • O N_ U O Other(.cwc:lfy) t O H.ftdt..) 180. Rlleonry of NNull WUpon(l) (check .. lllany ...pply) I a Not Reco ..... lld ) ­ Reo:ourcd Eltewhue ­- W!N:,.,' _ 169, O"'_mMrlMnl Melhod: 1 a R«o..... ed At Sc:cne I 0 8111111100 5 O S.wcdOff III. Type: Flnl"", UM:d: 1 CUI __ Skl11edlSu.all:Il (,~clfy" a 18 a Othu I C Hlnd",n 88 a Othu 11(1«'"'' _____ ) 0 CUI ­­ U",kUledlRouah<"1I Z a Rlne • O Huked /Choppr:dOf( ) O Shotl'ln 99 O UnknoWft ,,,,'mYi" 18l. C.liberorG.u..,a1F1.Ulm(I)u.cd· ______170. II The.r: Ew­ldllQCII of In Ju...Iluh 10 Any 0' the Vledlll', Sc­.ual Qrpnt Ot" Bod, C.w­hlel' .. I a Vn l a Na ~ 10 hlllll 111) ) a UnabJeIO Or:lennllM- 18). Numbe:. ofCroovn.nd OIrecllon oIT..ltt 01 Rllcow­lI.ed Bulin or ' ."""'1_____ 1S4. SlIII of Shoqua Shell Pllileu Rec.ove.ed at U~ l 171 . Ty~ 5IIsua.l AtAull, or Altempl tch.eek .1I1h11 .ppIY)l I a VqI..1 U O Ot"'~h'~'_~;''''~) ~' ===== :"'11' 1 a Anal :­: TyPI!~ ) 0 Vlcdm PllrfonlMd 0..1 511. on Offendu 99 Unable 10 ~llInnlne 185. Wbal II thll Offllnder', Blood a l O A ) O AB 99 0 Unknown 4 0 Offeadc:r Perlormed Onl Sa on Victim 1 0 8 4 0

116. Wk.1 It mil Rh factOl' of lhe. OOllftlk.', Blood1 I a Pothl"'l1 1 a Nllpdw­e 99 0 u....ftOWJt

22 I FBI Law Enforcement Bulletin The NCA VC Training Program A Commitment to Law Enforcement

By ROBERT R. HAZELWOOD, M.S. Special AgenVProgram Manager Training Program Behavioral Science Instruction and Research Unit National Center for the Analysis of Violent Crime FBI Academy Quantico, VA

Oet. Sgt. Kevin Mullen, Boston PO, 1986 Police Fellow, confers with SA Ellen Kearns, Boston FBI Profile Coordinator. in a profile workshop during the recent Police Fellowship Retraining Seminar at the FBI Academy.

The training program of the may possess with other members of the National Center for the Analysis of criminal justice system and those Violent Crime (NCAVC) is responsible disciplines which have historically pro• for all education and training associated vided invaluable assistance to law with the NCAVC. This responsibility in• enforcement (mental health, victim cludes providing guest speakers, con• advocates, and various academic ducting specialized training for police fields). and FBI Special Agents, and adminis• tering the NCAVC Police Fellowship in A Training Commitment criminal personality profiling. The NCAVC was established to NCAVC educational and training provide the law enforcement commu• efforts are directed primarily toward the nity with a clearinghouse and resource law enforcement community. However, center for unsolved violent crimes. It we are also interested in sharing does so by collecting and analyzing whatever knowledge and expertise we violent crime data and providing

December 1986 I 23 innovative investigative assistance, Science, and the FBI National Academy such as criminal personality profiling Associates, to name a few. The NCAVC and the Violent Criminal Apprehension training program has also provided Program (VICAP). A natural extension guest lecturers for courses offered at the of this assistance is to train law enforce• Southern Police Institute, the North• ment officers in , or at least acquaint western Traffic Institute, the Delin• them with , the application of behavioral quency Control Institute, the Armed science techniques to the investigation Forces Institute of Pathology, and the of violent crime. The NCAVC training Federal Law Enforcement Training program accomplishes this task in four Center. ways: 1) Field police schools, 2) FBI Special Agent Hazelwood Academy courses, 3) speaking Police Fellowship Program engagements, and 4) NCAVC police The NCAVC offers a 1-year fellowships. fellowship in criminal personality pro• filing at the FBI Academy to selected Field Police Schools officers. All expenses except salary and Members of the NCAVC and benefits are borne by the FBI. This pro• specially trained Agents assigned to FBI gram is discussed more fully below. field offices provide cost-free training in The NCAVC Police Fellowship violent crime investigative methodology for law enforcement agencies Developmental History throughout the United States. Such The police fellowship in criminal courses are 1 to 5 days in length and personality profiling predated the are conducted at sites selected by the establishment of the NCAVC and requesting agency. evolved from FBI Director William H. Webster's mandate to provide intensive FBI Academy Courses training on the behavioral analysis of Courses 3 to 14 days in length are violent crime to law enforcement agen• conducted at the FBI Academy and in• cies. It was determined that a 9- to clude speakers from a variety of 12-month program would be necessary disciplines. Officers invited to attend the to train and provide sufficient hands-on courses do so at no expense to profiling experience to individuals who themselves or their departments. could then be expected to provide behavioral science expertise to their Speaking Engagements departments. The NCAVC provides speakers for In 1982, at the direction of Assis• law enforcement and other professional tant Director James D. McKenzie, Roger organizational meetings or conferences. L. Depue, current NCAVC Adminis• Since June 1985, NCAVC speakers trator, asked several large police agen• have participated in national meetings cies if they would be interested in of the International Association of Chiefs participating in such a program. The of Police, the National Sheriffs Associa• response was overwhelmingly positive. tion , the Harvard Associates in Police Assistant Director James D. McKenzie

24 I FBI Law Enforcement Bulletin "[Our commitment} is to train law enforcement officers in, or at least acquaint them with, the application of behavioral science techniques to the investigation of violent crimes."

Police Fellowship Recipients 1984-87 Top row (left to right): Thomas Cronin, Kevin Mullen, Robert Gebo, William Bradway, Steven Conlon, Edward Richards, Ralph Stone. Bottom row (left to right): Thomas Brennan, Joel Kohout, Eric Witzig, Dayle Hinman, Denis Cremins, Sam Bowerman, Carlos Avila, Raymond Pierce.

agency's jurisdictional area, and the agency's willingness to allow the partici- pant to provide behavioral science assistance to neighboring departments upon his/her return. The NCAVC has set the following criteria for participants in the fellowship. The participant must: 1) Be a sworn law enforcement officer, 2) Have an outstanding in- vestigative record, 3) Possess a bachelor's degree, preferably in the behavioral sciences, and Executive Assistant Director John Steven Conlon of the Iowa Division of 4) Have proven abilities to E. Otto enthusiastically endorsed the Criminal Investigation, Lt. Thomas address groups and articulate newly designed fellowship program and Cronin of the Chicago Police Depart- thoughts in writing, recommended it to Director Webster, ment, Det. Robert Gebo of the Seattle who quickly approved the program. Police Department, Agent Dayle 5) Have a minimum of 3 years' In September 1983, the Baltimore Hinman of the Florida Department of experience in the investigation County, MD, Police Department was in- Law Enforcement, and Det. Sgt. Kevin of major cases, vited to participate in the fellowship, and Mullen of the Boston Police Depart- 6) Be held in high esteem by in January 1984, Det. Sam Bowerman ment. Recipients of the 1987 fellowships fellow officers, became the first police fellow. The are Sgt. Carlos Avila of the Los Angeles 7) Agree to conduct crime number of fellowships offered was in- Sheriffs Department, Special Agent analysis and prepare profiles creased to four in January 1985. The Joel Kohout of the Minnesota Bureau of for at least 3 years upon com- 1985 fellows were Det. Denis Cremins Investigation, Cpl. Thomas Brennan of pletion of the fellowship, of the Los Angeles Police Department, the Pennsylvania State Police, and 8) Be in excellent physical condi- Det. Raymond Pierce of the New York Special Agent Ralph Stone of the tion and be proportionate in City Police Department, Sgt. Edward Georgia Bureau of Investigation. height and weight, and Richards of the Texas Department of 9) Agree to a complete Selection Criteria Public Safety, and Det. Eric Witzig of the background investigation by the Metropolitan Police Department, Agencies invited to nominate an of- FBI. Washington, DC. Six fellowships were ficer for participation in the fellowship offered in 1986. The officers par- are chosen based on the number of ticipating are Det. Sgt. William Bradway sworn officers in the agency, the size of of the Michigan State Police, Agent the population served , the amount of violent crime committed within the

December 1986 I 25 "... since [June 1985], over 3,500 hours of training have been provided to more than 40,000 people . . . at more than 400 locations throughout the United. States, Canada, Europe, and the Caribbean."

Selection Process and profiling skills of the participants. In fellowship is not an unrealistic amount The nominees are selected by their this phase of the program, they are of time for an individual to study in order respective departments subject to final assigned cases for analysis and pro• to become proficient in the art of approval by the FBI. Many departments filing jOintly with a more-experienced profiling. have added selection criteria to those NCAVC profiler. All cases assigned to items required by the NCAVC. The the police fellows are analyzed in group Conclusion NCAVC does not ' participate in the consultation. Such a group typically in• selection process, unless requested to cludes at least one NCAVC profiler, all The NCAVC became operational in do so by the nominating agency. At the police fellows, and frequently Dr. James June 1985, and since that time, over request of the nominating agency, Luke, consulting forensic pathologist. 3,500 hours of training have been pro• members of the NCAVC will provide a The case is presented to the group by vided to more than 40,000 people briefing on the fellowship to department the responsible police fellow and is then representing the disciplines mentioned leaders and individuals who may wish discussed extensively. The consultation earlier in this article. This training has to apply for the program. groups operate very much 'Iike "think taken place at more than 400 locations tanks" in that ideas are surfaced, throughout the United States, Canada, Instructional Program debated, and discarded or adopted. Europe, and the Caribbean. It was con• The NCAVC Police Fellowship con• This process is invaluable to the novice ducted by members of the NCAVC and sists of an academic phase and an profiler and gives him/her the benefit of Special Agent profile coordinators application phase. During the first 3 the experience and thoughts of others. assigned to field offices of the FBI. months of the fellowship, the officers Following the group consultation, the of• These efforts serve as an example of participate in educational and training ficer prepares a written profile for review the effectiveness of the NCAVC train• courses at the FBI Academy, as well as by an NCAVC profiler and eventual ing program in disseminating informa• elsewhere. The officers attend courses dissemination to the requesting agency. tion of investigative value in violent of instruction at the University of In addition to analyzing cases and crime matters. They also serve to Virginia, the Armed Forces Institute of preparing criminal personality profiles, demonstrate the commitment of the FBI Pathology, and various police the police fellows represent the NCAVC to its training mission in the law enforce• academies. Courses conducted at the through speaking engagements, par• ment community. FBI Academy include homicide and ticipation in research interviews of rape investigation, sexual exploitation of incarcerated violent offenders, and children , abnormal psychology, involvement in on-site major case con• equivocal death evaluation, criminal sultation with other NCAVC members. personality profiling, and a myriad of Obviously, the training received other topics. during the fellowship is extensive and Although the 'Police fellows are time consuming, involving a substantial acquainted with the concept of criminal investment on the part of the FBI and personality profiling during the first 3 the participating agencies. However, months of the fellowship and do sit in there are individuals who commercially on case consultations with investigative conduct 2- to 5-day courses on profiling agencies, they are not assigned cases and advertise that attendees will be able for analysis and profiling. The last 6-9 to prepare profiles upon completion of months of the fellowship are devoted the course. Experience has demon• primarily to developing the analytical strated that the length of the NCA VC Automated Crime Profiling

". . . experts in criminal personality profiling are taking advantage of the existing technology of artificial intelligence . . . to capture the elusive decision making rules associated with the profiling of serial violent criminals."

By DAVID J. ICOVE, Ph.D., P.E. Senior Systems Analyst Behavioral Science Investigative Support Unit National Center for the Analysis of Violent Crime FBI Academy Quantico, VA

In the fall of 1983, Special Agents intelligence, or AI as it is known to its Reactive strategies include crime scene from the FBI's Behavioral Science Unit users , to capture the elusive investigative support during immediate constructed a criminal personality decision making rules associated with response to incidents, while proactive profile describing an individual who the profiling of serial violent criminals. strategies explore effective anti­crime could have been responsible for a series This article is an overview of the programs to both deter and apprehend of fires at religious homes and houses ongoing research and development offenders. of worship that summer in a posh New efforts by the NCAVC to automate the Briefly, the model emphasizes the England community. The profile was criminal personality profiling process. reporting of violent crimes (step 1) to the prepared at the request of the com- Future articles are planned to advise law NCAVC for crime pattern analysis and munity's pOlice department, which later enforcement researchers and investi- classification. This information may discovered that the FBI's profile not only gators as to the success of this exciting come from written media accounts (step accurately described the suspect in and thought­provoking technology. 2), crime scene processing (step 3), detail but also pinpointed his residence, VICAP crime reports (step 4), or violent based upon a series of intricate Violent Crime Model crime research findings (step 5). Crime computer calculations using artificial The relationship of AI to the pattern analysis (step 6) can determine intelligence technology. The suspect profiling process is best described using if any case trends are detected in the later confessed to the crimes. the "Violent Crime Systems Analysis profiled incident that have existed in the This pioneering use of artificial Model." (See fig. 1.) This model was past, predict the probability of the intelligence technology in crime analysis developed during the conceptualization occurrence of future incidents, and and criminal personality profiling pro- and development of the' NCAVC check for the possible identification of vided the groundwork for the present computer systems and traces the prior known/unknown criminal offenders automation efforts at the FBI's National philosophical activities involved with the based upon their past methods of Center for the Analysis of Violent Crime detection, prediction, and prevention of operation. (NCAVC) .1 In an active project at the violent crime. Crime pattern recognition analysis NCAVC, experts in criminal personality The model is divided into reactive can also classify incidents into naturally profiling are taking advantage of the and proactive investigative strategies. occurring groups, such as the type of existing technology of artificial

December 1986 I 27 crime, motive, or temporal conditions. The use of effective crime preven- Furthermore, pattern analysis can tion strategies will minimize the risk of reveal multidimensional trends and pro- future violent crime incidents. Many files in the crime data which in the past strategies include operational, person- have gone undetected. nel, and physical security programs. Based upon prior profiling ex- However, once an incident occurs, the periences in combating violent crimes effective case management of the in- (step 7), effective prevention strategies vestigation must be carried out. The are documented for future operational violent crime investigator at the scene and training use (step 8). Using summarizes the incident and submits a historical information, actual prob- VICAP report. The feedback loop is then Dr. Icove abilities of success can be assigned to completed with an inquiry into the model the suggestions of specific, proven of the encoded case data. prevention strategies.

Figure 1 The Violent Crime System Analysis Model

PROACTIVE REACTIVE

Artificial Intelligence Crime Pattern Analysis Crime Strategies Violent and Classification Scene ~ and Training ~ Crime Computer System Profiles Implications Incidents ­ (6) ­­­­­­' '­(7) ­ ­(8) ­­ (1) ­

L[ Media Reports (2)

Crime Scene Processing '­(3)

VICAP Crime Reports '­(4)

Violent Crime Research Data '­(5)

28 I FBI Law Enforcement Bulletin "Computer technology is also necessary to support ongoing behavioral science research efforts."

Several computer systems pres- most similar to the new case. This crime Computer technology is also ently serve the needs of the NCAVC in pattern analysis technique, called necessary to support ongoing behav- support of the VICAP, profiling and template pattern matching, was ioral science research efforts. NCAVC consultation , and research programs. specifically designed for VICAP and staff members are encouraged to The computers are located at both programmed by the FBI's Technical perform and publish research studies on Quantico, VA, and Washington , DC. Services Division. The VICAP computer all aspects of violent crime and rely upon system also produces selected computers at Quantico for their support. VICAP management information system reports Some research projects include the use which monitor case activity of portable computers carried into the The Violent Criminal Apprehension geographically, with hope that it will field. Program (VICAP) computer system is eventually trace the travels of serial Artificial Intelligence Project located at FBI Headquarters in violent criminals across the United Washington, DC, and stores information States. Using the insight and experience on unsolved homicide­related violent gained with VICAP and AIMS computer crimes reported to the NCAVC. VICAP technology, the NCAVC staff is now Profiling crime reports are entered on­line from developing a comprehensive AI the NCAVC at Quantico, using a secure The profiling and consultation knowledge­based expert system which telecommunications network. program uses a collection of crime will assist users of the NCAVC computer When a new case is entered, the pattern recognition computer programs system in tracking and predicting violent VICAP computer system simultaneously on mini­ and micro­computers at the crimes. Knowledge­based expert compares and contrasts over 100 NCAVC's offices to detect and predict the systems have proven effective in selected modus operandi (MO) behavior of violent criminals. The Arson applying knowledge to solve problems categories of that case with all other Information Management System that ordinarily require human cases stored in the data base. After (AIMS) is a crime pattern analysis intelligence.3 Figure 2 illustrates this overnight processing, a printed computer program used at the NCAVC system and the relationships of the computer report is returned to the which has enabled staff members to various individuals in its design and use. VICAP crime analyst handling the case. predict accurately the times, dates, and It is anticipated the project will be This report lists, in rank order, the top locations of future incidents, as well as completed in 2 years. 10 "matches" in the violent crime the most probable residence of Following the diagram in figure 2, databank; that is, the 10 cases that were suspects.2 the knowledge engineer transforms prior experiences of the crime profiler and the Figure 2 A schematic diagram of the NCAVe's Artificial Intelligence KnCINledge-Based results of violent crime research into a Expert System knowledge base. Using artificial- intelligence computer software, the knowledge base is transformed into decision rules defining an inference EXPERT SYSTEM engine. The NCAVC investigators input new cases and receive consultation via a user interface. New Cases Inference ... Advice & Knowledge The expert­based computer system I Engine Analysis Engineer under development will allow the I NCAVC to: I User USER..... Inter- 1) Eliminate useless investigative paths which historically have I face I proven fruitless in profiling and I Knowledge identifying the offender; Knowledge Crime Advice & Base Modifica- Profiler 2) Preserve and recall knowledge Analysis of similar cases, criminal tions personality profiles, and research studies; December 1986 I 29 The NCAVC is actively researching and experimenting with computer­assisted linguistic analysis techniques to evaluate the content of these com- munications in an effort to determine the authorship profile and assess the viability of the threat.

Summary Presented in this article have been the systems approach to the manage- ment of violent crime data and the development of an artificial intelligence crime profiling computer system for the National Center for the Analysis of Violent Crime. The major benefit of this The NCAVC Computer Center effort is an effective management infor- mation system which will track the activities of the program, assess the 3) Display the hierarchy of com- AI applications show great poten- impact of law enforcement efforts plex criminal network problems tial for solving complicated crime pro- against violent crime, and introduce from the general to specific filing and assessment problems. automated computer­assisted profiling level; Research is currently being conducted technology. 4) Develop and use decision rules in two such uses which will be inte- which accelerate computation grated into the NCAVC's AI computer time, as well as allow the project. investigator to understand the Social network analysis is a problem better; behavioral science­oriented approach Footnotes 5) Receive advice and consulta- that describes the interaction patterns 1 D. J. Icove. et al.. Incendiary Fire Analysis and 4 Invastlgatlon. Open Fire Service Learning Program tion from the expert system on between people. This analysis can be (Lexington. MA: Ginn Publishing Co .• 1984); D. J. Icove, new and existing cases based used to identify possible courses of V. B. Wherry, and J. D. Schroeder, Combating Arson· For.Profit: Advanced Techniques for Investigators upon prior knowledge captured action an individual or group might take, (Columbus, OH : Battelle Press, 1980). by the system; as well as to surmise as to the 2 J. L. Bryan and D. J. tcove, "Recent Advances In Computer·Assisted Arson Investigation," Fire Journal. 6) Preserve information in an ac- hierarchical structure of an organization National Fire Protection Association. vol. 71 , No. 1, or group. Examples of the application January 1977; D. J. Icove and H. L. Crisman, "Applica· tive form as a knowledge base, tion of Pattern Recognition to Arson Investigation," Fire rather than a mere passive of social network analyses include struc- Technology. National Fire Protection Association, February 1975; "Arson: the Prevention Chain," National listing of facts and figures; tures of organized crime syndicates, Clearinghouse for Criminal Justice Systems, U.S. 7) Train novices to think as an motorcycle gangs, and terrorist groups. Department of Justice, May 1980. 3 B. G. Buchanan and E. H. ShortliHe, Rule·Based experienced crime profiler NCAVC staff members are developing Expert Systems (Reading, MA: Addison·Wesley would; and AI procedures to manipulate data and Publishing Co., Inc., 1984) . • R. H. Davis, "Social Network Analysis: An Aid in 8) Create and preserve in an compute the probable hierarchies and Conspiracy Investigations," FBI Law Enforcement interactions of complex organizations. Bul/etln, vol. 50, No. 12, December 1981 . active environment a system • M. S. Miron and J. E. Douglas, "Threat Analysis: that is not subject to human The behavioral analysis of threaten- The Psychollnguistic Approach," FBI Law Enforcement Bulletin. vol. 48. No. 9., September 1979; U. Perret, failings, will respond to cons- ing oral and written communications in "Computer Assisted Forensic Linguistic System tant streams of data, and can extortions, bombings, and terrorist 'TEXTOR,'" IEEE International Conference: Security through Science and Technology, September 1980. generalize large bodies of incidents is another viable application knowledge. of artificial intelligence technology to real­world law enforcement problems.5

30 I FBI Law Enforcement Bulletin VICAP ALERT

Benjamin Herbert Boyle move in November 1981 , took him to #1 On November 20, 1979, Boyle RACE: Caucasian ; DOB: 7/22/43, western Oklahoma. From that time un- attempted to kidnap a 28­year­old white Hobart, OK; HEIGHT: 5' 7"; til his arrest in October 1985, he was a female as she was walking along a WEIGHT: 170 Ibs; HAIR: Red ; EYES: truck driver for numerous trucking com- residential area in Colorado Springs, Blue; COMPLEXION: Fair; BUILD: panies, making both local and cross- CO . He tried forcing her into his per- Muscular; SSAN : 443-42-4965; FBI country hauls. (See map for routes of sonal automobile, but the victim pulled NO.: 405 757 EA8; DRIVER'S Boyle's travels.) During those years, he a small knife from her pocket, stabbed LICENSE NO.: OK 443-42-4965 lived in Oklahoma, Texas, and Boyle 5 times, and fled. Boyle pleaded (Type: Chauffer). Louisiana. guilty to attempted kidnaping and was In addition to the murder charge in given a 5­year probated sentence. Crime Amarillo, Boyle was convicted of at- Benjamin Herbert Boyle was tempted kidnaping in Colorado Springs, arrested on October 17, 1985, and has CO , and a warrant has been issued for since been in custody in Amarillo, TX, his arrest in connection with a rape in charged with the murder of a white Colorado. female. Modi Operandi Background Described below are three crimes Boyle was in the military from connected with Boyle. August 1960 to August 1963, and was discharged in Wheeler, IN . From 1969 to 1980, he indicated he lived in Col- orado, where he owned an auto body shop. He moved to Las Vegas, NV, in February 1980, where he resided until November 1981 , during which time he worked in an auto body shop. Another

VIOLENT CRIMINAL APPREHENSION #2 On April 18, 1982, Boyle was tound in her mouth. Cause ot death Violent Crime, VICAP, FBI Academy, allegedly picked up by torce a 17-year• was ligature strangulation. Fingerprints Quantico, VA 22135 (703-640-1127) old white temale hitchhiker trom a ma• of Boyle were found on the sticky side or Sgt. Modeina Holmes or Sgt. Walt jor highway in Colorado Springs, CO. of the duct tape. Yerger, Special Crimes Unit, Amarillo, He reportedly pulled his tractor trailer off In this last incident, Boyle reported• TX (806-379-2230). When calling onto a side road, torced the victim to ly was driving his distinctive truck-a Amarillo, refer to tile CAS #227,412. commit oral sex, vaginally raped her, fire-engine red, 1981 Peterbilt, with a and then took her back to the highway conventional cab and twin chrome and released her. A warrant has been stacks. issued tor Boyle's arrest in this case. #3 On October 14, 1985, Boyle Alert to Chiefs and Sheriffs allegedly picked up a 20-year-old white This information should be brought temale hitchhiker north of Fort Worth, to the attention of all homicide officers. TX, The victim's body was tound the If unsolved cases in your department next day 14 miles north of Amarillo, hid• resemble Boyle's MOs or fit the time den in a clump of bushes. She had been frame and routes taken by Boyle (see beaten with a blunt instrument, bound map pictured above), contact either the with gray duct tape, and left nude. The National Center for the Analysis of victim had been sodomized and semen

­­ - Unusual Pattern

This pattern is classified as an accidental whorl and is given an outer tracing referenced to a meeting tracing. The impression has three well-defined deltas, and the accidental whorl is the only pattern which may possess more than two deltas.

Change of l2~~ Address Law Enforcement Bulletin Not an order form

Complete this form and return to: Name

Director Tille Federal Bureau of Investigation Address Washington , DC 20535

Cily State Z,p U.S. Department of Justice Second Class Mail Federal Bureau of Investigation Postage and Fees Paid Federal Bureau of Investigation ISSN 0014-5688

Washington, D. C. 20535

Official Business Penalty for Private Use $300 Address Correction Requested

The Bulletin Notes

Officer George Stokesberry, Nampa, 10, Police Department, responded to a fire call on June 5, 1985, and rescued a couple from their burning apartment. The officer had to crawl through heavy smoke to save the sleeping wife. The Bulletin is pleased to join Officer Stokesberry's superiors in the Nampa Police Department in commending this lifesaving service.

Officer Stokesberry