1283:
338:
of criminal investigative analysis, which includes behavioral profiling, had evolved significantly since the 1970s when the FBI's
Behavioral Science Unit began offering profiling assistance to other law enforcement agencies. Initially, profiling was more about understanding unknown offenders' personalities and behavioral traits based on crime scene analysis. This method has since grown into a more comprehensive tool known as criminal investigative analysis, encompassing a variety of services such as investigative suggestions, interview strategies, and trial support.
189:. It provides personnel and training to assist in investigations throughout the country and at US embassies worldwide. It also supports other Critical Incident Response Groups within the FBI, FBI headquarters and field offices, FBI legal attaches (at embassies abroad), and all US law enforcement agencies. The section is divided into two main sections: the National Center for the Analysis of Violent Crime and the
244:
the FBI that specialize in crimes against children, such as the
Violent Crimes Against Children program (VCAC). The Violent Crimes Against Children program aims to provide quick and proactive responses to threats and/or acts of abuse and exploitation of children that fall within the FBI’s jurisdiction.
614:
In order to generate profiles of offenders, members of the BAU use a concept known as psychological profiling. Belief in psychological profiling has often been supported by anecdotal evidence describing BAU profiles as a necessary key to solving a crime. A homeless man in North
Carolina, for example,
401:
meticulously plan and prepare for acts of violence. Throughout this process, they frequently exhibit worrying behaviors, characterized as observable and identifiable actions suggesting potential progression towards targeted violence. While no individual behavior definitively signifies an individual's
337:
the FBI's
Behavioral Analysis Unit 5 (BAU-5), relies on extensive training and law enforcement experience to develop and apply behavioral profiles. This unit focuses on research, strategy, and instruction, crucial elements that help understand and manage criminal behavior more effectively.The field
243:
Behavioral
Analysis Unit 3 focuses on crimes against children and provides support to other law enforcement officials through criminal investigative analysis, a process through which analysts review, assess, and interpret offender behavior. Behavioral Analysis Unit 3 also assists other units within
416:
BAU assistance to law enforcement agencies is provided through the process of "criminal investigative analysis." Criminal investigative analysis is a process of reviewing crimes from both a behavioral and investigative perspective. It involves reviewing and assessing the facts of a criminal act,
618:
In a number of studies, professional criminal profilers have been compared to other groups such as students, police officers, and clinical psychologists. In order to evaluate these groups, each participant was presented with the details of a previously solved crime. The profile written by the
275:
The
Violent Crimes Against Children program responds to the above violations by aiding the child victims and supporting federal, state, local, tribal, and international law enforcement in identifying, investigating, and deterring individuals and groups that exploit
615:
was apprehended after a BAU profile was issued for a case that the local police force had not been able to solve. Although anecdotal evidence such as this abounds in popular media, the concept of psychological profiling has not been empirically proven.
218:, but the complex technological aspect of cybercrime poses unique challenges for law enforcement. There have been different approaches to reduce cybercrime through technological advances. Computer sciences and cybersecurity have applied this by using
367:
driven or rely on the seasoned intuition of experienced investigators. This ongoing debate highlights the need for continuous research and evaluation to refine criminal profiling techniques and ensure they are practical and scientifically valid.
115:
that uses behavioral analysts to assist in criminal investigations. Their mission is to provide behavioral-based investigative and/or operational support by applying case experience, research, and training to complex and time-sensitive
619:
participant was then compared to a profile of the guilty party. In no study did the group of profilers outperform the other groups, and in some studies, they were clearly outperformed by both police officers and chemistry students.
409:. Responses to these requests for BAU assistance are facilitated through the network of field coordinators of the National Center for the Analysis of Violent Crime. BAU services can consist of on-site case consultations, telephone
135:
to violent offenses targeting both children and adults. They provide expertise on new investigations, ongoing pursuits, and cold cases, collaborating closely with federal, state, local, and tribal law enforcement agencies.
329:. The report is analyzed by the agents to investigate the Criminal Investigation Analysis of a killer. This can help solve unsolved cases and/or new cases in the future, by identifying the suspects of the cases.
632:, such as Robert Homant, have also dismissed the previously mentioned studies by stating that they lack external validity as they do not accurately represent the situations in which members of the BAU work.
164:
Employing a data-driven approach to assess an individual's cognitive patterns and behavior, determining the likelihood and extent of their progression towards targeting and potentially attacking a specific
341:
One of BAU-5's core activities is conducting research and providing instructional courses that enhance the skills of law enforcement officers nationwide. The unit's efforts aim to educate officers on
345:
applying behavioral analysis techniques effectively in their cases. This training often involves analyzing solved and unsolved cases to identify patterns suggesting similar offender behaviors.
146:: Examining factors such as the offender's motives, victim targeting, level of sophistication, actions, and connection to the crime in question, as well as the chronological sequence of events.
622:
Despite these findings, members of the BAU continue to use psychological profiling. Public confidence in psychological profiling is also high and has been greatly promoted by TV shows such as
356:
in high-profile cases. The unit's role is often advisory, providing the groundwork for local agencies to build their cases rather than actively participating in the investigation.
1328:
445:
to assist investigators faced with these investigations. Recently, the BAU released "The School
Shooter: A Threat Assessment Perspective" report to guide school administrators,
852:
271:
International parental kidnapping: wrongfully keeping a child outside the United States with the intention of obstructing the lawful exercise of parental rights
1574:
1539:
453:, and law enforcement in identifying and evaluating threats in schools. The BAU maintains a reference file for experts in various forensic disciplines such as
1032:
348:
The strategy aspect of BAU-5's work involves advising law enforcement agencies on various facets of criminal investigations. This could include developing
1807:
1460:
1298:
64:
565:
1318:
805:
322:
179:
112:
77:
546:(BSU), which later created and developed what eventually became known as the BAU. It is also seen in the NBC television show based on the novels,
1569:
1534:
588:
was released, which details the experiences of two BSU team detectives interviewing inmates with psychological disorders. In August 2017, the
569:
152:: Combining behavioral science principles, psychological theories, and science-based approaches to plan, execute, and evaluate interviews.
1442:
1082:
648:
1123:
Kocsis, R.; Hayes, A.F.; Irwin, H.J. (2002). "Investigative experience and accuracy in psychological profiling of a violent crime".
1551:
1432:
1561:
1545:
297:
solve and identify serial murders. The ViCAP uses a 15-page format that requests information about a crime that was committed.
1488:
1350:
1333:
935:
898:
290:
282:
1313:
560:
186:
158:
Providing behaviorally informed suggestions to enhance the efficiency of investigations and allocate resources effectively.
69:
695:
1425:
1308:
1654:
1619:
1199:
402:
trajectory towards committing targeted violence, the presence of multiple behaviors may warrant attention and concern.
1862:
1465:
1452:
425:. BAU staff conduct detailed analyses of crimes for the purpose of providing two or more of the following services:
1822:
1415:
506:
1236:
526:
223:
128:
108:
54:
1664:
1420:
1227:
265:
Sexual exploitation of children: producing, trading, distributing, and/or selling child sexual abuse material
196:
The
National Center for the Analysis of Violent Crime consists of five Behavioral Analysis Units, or "BAU"s:
1828:
1684:
1624:
1407:
1355:
572:, no. 12, January 8, 2008) heavily features a member of the BAU. Additionally, in season 5 of the HBO show
421:, and interaction with the victim, as exhibited during the commission of the crime, or as displayed in the
1193:
783:
363:
and practitioner qualifications. Critics and proponents alike discuss whether the practice should be more
1713:
1689:
1649:
1345:
1262:
255:
1669:
1629:
1437:
1372:
1267:
219:
915:
1528:
1244:
579:
342:
190:
582:
for a profile of the "fake" serial killer they are investigating. In
October 2017, the Netflix show
1791:
1639:
1604:
1257:
1252:
293:(Violent Criminal Apprehension Program) is a computer program that was established in 1984 to help
397:
The BAU focuses on preventing targeted violence by identifying concerning behaviors. For example,
1733:
1634:
1614:
1493:
1385:
543:
175:
719:"Investigating a Serial Killer: The Development of the FBI's Role Told Through Public Documents"
1843:
1272:
584:
538:
406:
359:
Despite its proven utility, criminal investigative analysis continues to face debates over its
49:
1718:
1644:
1164:
1061:"Federal Bureau of Investigation - Investigative Programs - Critical Incident Response Group"
458:
268:
Trafficking of child sexual abuse material: either distribution or possession of the material
718:
1674:
1523:
1390:
652:
548:
532:
131:’s Behavioral Analysis Units handles diverse cases nationwide, spanning from terrorism and
8:
1679:
1659:
1340:
677:
629:
554:
466:
462:
1014:"The Violent Criminal Apprehension Program (VICAP) and its Application to Serial Murder"
1362:
1140:
603:
598:, based on true events, was released. It featured a member of the BAU who helped catch
594:
488:
470:
454:
372:
364:
326:
227:
1159:
1775:
1745:
1220:
1144:
983:
957:
931:
894:
740:
696:"Offender Profiling and Expert Testimony: Scientifically Valid or Glorified Results?"
589:
405:
The BAU receives requests for services from federal, state, local, and international
315:
185:
The
Investigations & Operations Support Section is a branch of the FBI's overall
1132:
923:
886:
853:"Countering teh Cyber Enforcement Gap: Strengthening Global Capacity on Cybercrime"
730:
520:
501:
1205:
1755:
1013:
958:"The Federal Bureau of Investigation's Efforts to Combat Crimes Against Children"
758:
515:
410:
294:
1136:
1101:
1060:
927:
1472:
624:
496:
483:
438:
434:
426:
398:
878:
1856:
1812:
1723:
1579:
890:
744:
599:
511:
42:
735:
1817:
1770:
1765:
1750:
1513:
1213:
491:" who travel the country assisting local law enforcement on diverse cases.
433:, critical incident analysis, interview strategies, major case management,
759:"Criminal Profilers | Bureau of Alcohol, Tobacco, Firearms and Explosives"
1760:
1740:
1518:
1380:
430:
422:
360:
325:
which is then put in the system of the FBI’s Behavioral Analysis Unit in
310:
251:
Child abductions: disappearance of a minor, typically 12 years or younger
231:
178:. The Behavioral Analysis Unit (BAU) was launched in 1972 as part of the
481:
The BAU was brought into mainstream culture by television shows such as
262:, and travel with the intention to engage in sexual activity with minors
203:
Behavioral Analysis Unit 2 (threats, cyber crime, and public corruption)
200:
Behavioral Analysis Unit 1 (counterterrorism, arson and bombing matters)
1697:
1609:
1397:
259:
211:
207:
132:
820:
1728:
916:"IX. The FBI's Behavioral Analysis Unit III: Crimes Against Children"
349:
215:
827:
883:
2016 IEEE Conference on Intelligence and Security Informatics (ISI)
574:
418:
353:
352:
techniques, providing investigative leads, or assisting with media
121:
879:"Approaches to understanding the motivations behind cyber attacks"
446:
1329:
Child Abduction and Serial Murder Investigative Resources Center
441:. In addition to the above services, the BAU staff produced the
413:, and/or consultations held at the BAU with case investigators.
333:
Behavioral Analysis Unit 5 (research, strategy, and instruction)
247:
The VCAC prioritizes the following violations against children:
1599:
450:
210:
has been a problem for the FBI. In today's digital landscape,
117:
1122:
429:, investigative suggestions, profiles of unknown offenders,
962:
U.S. Department of Justice Office of the Inspector General
914:
Hoffer, Tia A.; Shelton, Joy Lynn E. (November 22, 2012),
65:
Criminal, Cyber, Sex Crimes, Response, and Services Branch
378:
The Operations Support Branch contains three main units:
174:
The Behavioral Analysis Unit was originally called the
1540:
Integrated Automated Fingerprint Identification System
1102:"Behavioral analysis a key in solving violent crimes"
877:
Kumar, Sumeet; Carley, Kathleen M. (September 2016).
238:
Behavioral Analysis Unit 3 (crimes against children)
1235:
518:
novels and the corresponding films (
281:Behavioral Analysis Unit 4 (crimes against adults,
602:, also known as the Unabomber, through the use of
437:assistance, prosecution and trial strategies, and
1319:National Center for the Analysis of Violent Crime
323:National Center for the Analysis of Violent Crime
254:Contact offenses against children: production of
180:National Center for the Analysis of Violent Crime
113:National Center for the Analysis of Violent Crime
78:National Center for the Analysis of Violent Crime
1854:
476:
1535:Computer and Internet Protocol Address Verifier
922:, New York, NY: Springer New York, p. 65,
806:"FBI — Investigations & Operations Support"
784:"FBI — Investigations & Operations Support"
1461:Criminal Justice Information Services Division
16:Unit of the US Federal Bureau of Investigation
1221:
913:
222:(IDSs), Intrusion Prevention Systems (IPSs),
74:Investigative and Operations Support Section
487:, which depict an elite group of "FBI agent
876:
371:The headquarters for the BAU is located in
1228:
1214:
1055:
1053:
828:"Critical Incident Response Group (CIRG)"
734:
120:, typically involving acts or threats of
1552:National Incident-Based Reporting System
1018:Culminating Projects in Criminal Justice
169:
1443:Weapons of Mass Destruction Directorate
1433:High-Value Detainee Interrogation Group
1194:Critical Incident Response Group (CIRG)
1050:
1030:
716:
214:share similar motives with traditional
1855:
1546:Law Enforcement National Data Exchange
693:
388:Rapid Deployment & Technology Unit
1334:Violent Criminal Apprehension Program
1209:
1099:
1007:
1005:
717:Osowski, Kaylee (December 11, 2018).
561:Law & Order: Special Victims Unit
1157:
1011:
689:
687:
672:
670:
1426:Communications Exploitation Section
1100:Owens, Gerald (November 12, 2009).
832:FBI Federal Bureau of Investigation
321:This report is then relayed to the
13:
1655:FBI Victims Identification Project
1620:Rod Blagojevich corruption charges
1002:
14:
1874:
1489:Information and Technology Branch
1466:National Crime Information Center
1351:Special Weapons and Tactics Teams
1187:
1033:"Criminal Investigative Analysis"
984:"Violent Crimes Against Children"
920:Suicide Among Child Sex Offenders
751:
710:
684:
667:
641:
1314:Critical Incident Response Group
1281:
1200:Behavioral Analysis Unit profile
1125:Journal of Interpersonal Science
1031:Scherer, Amber (June 10, 2014).
507:Criminal Minds: Suspect Behavior
187:Critical Incident Response Group
70:Critical Incident Response Group
1309:Criminal Investigative Division
1237:Federal Bureau of Investigation
1151:
1116:
1093:
1087:Federal Bureau of Investigation
1075:
1024:
988:Federal Bureau of Investigation
976:
950:
907:
870:
144:Criminal Investigative Analysis
109:Federal Bureau of Investigation
55:Federal Bureau of Investigation
1665:High-Value Interrogation Group
845:
798:
776:
580:visit the BAU team in Quantico
552:, and the CBS television show
385:Special Events Management Unit
300:This includes information on:
1:
1453:Science and Technology Branch
1160:"Does profiling really work?"
723:DTTP: Documents to the People
635:
477:References in popular culture
443:Child Abduction Response Plan
1829:FBI Law Enforcement Bulletin
1823:FBI–Apple encryption dispute
1685:Special Intelligence Service
1625:FBI files on Michael Jackson
1416:Counterintelligence Division
1063:. Fbi.gov. November 30, 2011
1012:Rust, Lyle (March 1, 1989).
808:. Fbi.gov. November 30, 2011
786:. Fbi.gov. November 30, 2011
609:
494:The CBS weekly drama series
392:
7:
1650:FBI Special Advisor Program
1137:10.1177/0886260502017008001
928:10.1007/978-1-4614-5937-8_9
256:child sexual abuse material
220:Intrusion Detection Systems
10:
1879:
1670:Joint Terrorism Task Force
1630:FBI files on Elvis Presley
1438:Terrorist Screening Center
1299:Criminal, Cyber, Response,
1172:(7 (July/August 2004)): 67
885:. IEEE. pp. 307–309.
1838:
1800:
1784:
1706:
1691:U.S. v. Scheinberg et al.
1588:
1560:
1529:Combined DNA Index System
1506:
1481:
1451:
1421:Counterterrorism Division
1406:
1371:
1297:
1290:
1279:
1243:
694:George, James A. (2008).
651:. Fbi.gov. Archived from
343:Applied behavior analysis
191:Operations Support Branch
107:) is a department of the
89:
60:
48:
38:
28:
23:
1863:Behavioral Analysis Unit
1640:FBI search of Mar-a-Lago
1408:National Security Branch
1356:Hazardous Devices School
1324:Behavioral Analysis Unit
1037:Law Enforcement Bulletin
891:10.1109/isi.2016.7745496
527:The Silence of the Lambs
407:law enforcement agencies
101:Behavioral Analysis Unit
24:Behavioral Analysis Unit
1615:FBI method of profiling
1386:Behavioral Science Unit
1346:Crisis Negotiation Unit
736:10.5860/dttp.v46i4.6892
544:Behavioral Science Unit
176:Behavioral Science Unit
156:Investigative Approach:
1808:FBI portrayal in media
1373:Human Resources Branch
630:forensic psychologists
510:both feature the BAU.
417:interpreting offender
382:Crisis Management Unit
278:
1719:Delf A. 'Jelly' Bryce
1645:FBI Silvermaster File
1165:Monitor on Psychology
700:Vanderbilt Law Review
678:"Behavioral Analysis"
649:"FBI — Serial Murder"
241:
230:software to mitigate
170:History and structure
139:Their tasks include:
1714:Harry "Skip" Brandon
1675:Lindbergh kidnapping
1680:Ruby Ridge standoff
1605:Bridgman Convention
1494:Intelligence Branch
1473:Laboratory Division
1341:Hostage Rescue Team
1301:and Services Branch
162:Threat Evaluations:
1635:FBI Miami shootout
1202:(archived version)
655:on October 7, 2010
604:forensic profiling
595:Manhunt: Unabomber
373:Quantico, Virginia
365:Empirical evidence
327:Quantico, Virginia
1850:
1849:
1776:Joseph D. Pistone
1746:Joseph L. Gormley
1502:
1501:
1196:—Includes the BAU
937:978-1-4614-5936-1
900:978-1-5090-3865-7
590:Discovery Channel
578:, two detectives
316:Physical evidence
150:Interview Tactics
97:
96:
1870:
1792:FBI Headquarters
1391:National Academy
1295:
1294:
1285:
1284:
1230:
1223:
1216:
1207:
1206:
1182:
1181:
1179:
1177:
1155:
1149:
1148:
1120:
1114:
1113:
1111:
1109:
1097:
1091:
1090:
1083:"School Shooter"
1079:
1073:
1072:
1070:
1068:
1057:
1048:
1047:
1045:
1043:
1028:
1022:
1021:
1009:
1000:
999:
997:
995:
980:
974:
973:
971:
969:
954:
948:
947:
946:
944:
911:
905:
904:
874:
868:
867:
865:
863:
849:
843:
842:
840:
838:
824:
818:
817:
815:
813:
802:
796:
795:
793:
791:
780:
774:
773:
771:
769:
755:
749:
748:
738:
714:
708:
707:
691:
682:
681:
674:
665:
664:
662:
660:
645:
439:expert testimony
411:conference calls
21:
20:
1878:
1877:
1873:
1872:
1871:
1869:
1868:
1867:
1853:
1852:
1851:
1846:
1834:
1796:
1780:
1756:J. Edgar Hoover
1702:
1593:
1591:
1584:
1575:Deputy Director
1556:
1498:
1477:
1447:
1402:
1367:
1300:
1286:
1282:
1277:
1239:
1234:
1190:
1185:
1175:
1173:
1156:
1152:
1121:
1117:
1107:
1105:
1098:
1094:
1081:
1080:
1076:
1066:
1064:
1059:
1058:
1051:
1041:
1039:
1029:
1025:
1010:
1003:
993:
991:
982:
981:
977:
967:
965:
956:
955:
951:
942:
940:
938:
912:
908:
901:
875:
871:
861:
859:
851:
850:
846:
836:
834:
826:
825:
821:
811:
809:
804:
803:
799:
789:
787:
782:
781:
777:
767:
765:
757:
756:
752:
715:
711:
692:
685:
676:
675:
668:
658:
656:
647:
646:
642:
638:
612:
542:) featured the
516:Hannibal Lecter
479:
431:threat analysis
399:active shooters
395:
295:law enforcement
172:
33:
17:
12:
11:
5:
1876:
1866:
1865:
1848:
1847:
1842:
1840:
1836:
1835:
1833:
1832:
1825:
1820:
1815:
1810:
1804:
1802:
1798:
1797:
1795:
1794:
1788:
1786:
1782:
1781:
1779:
1778:
1773:
1768:
1763:
1758:
1753:
1748:
1743:
1738:
1737:
1736:
1726:
1721:
1716:
1710:
1708:
1704:
1703:
1701:
1700:
1695:
1687:
1682:
1677:
1672:
1667:
1662:
1657:
1652:
1647:
1642:
1637:
1632:
1627:
1622:
1617:
1612:
1607:
1602:
1596:
1594:
1589:
1586:
1585:
1583:
1582:
1577:
1572:
1566:
1564:
1558:
1557:
1555:
1554:
1549:
1543:
1537:
1532:
1526:
1521:
1516:
1510:
1508:
1504:
1503:
1500:
1499:
1497:
1496:
1491:
1485:
1483:
1482:Other branches
1479:
1478:
1476:
1475:
1470:
1469:
1468:
1457:
1455:
1449:
1448:
1446:
1445:
1440:
1435:
1430:
1429:
1428:
1418:
1412:
1410:
1404:
1403:
1401:
1400:
1395:
1394:
1393:
1388:
1377:
1375:
1369:
1368:
1366:
1365:
1363:Cyber Division
1360:
1359:
1358:
1353:
1348:
1343:
1338:
1337:
1336:
1331:
1326:
1311:
1305:
1303:
1292:
1288:
1287:
1280:
1278:
1276:
1275:
1270:
1265:
1260:
1255:
1249:
1247:
1241:
1240:
1233:
1232:
1225:
1218:
1210:
1204:
1203:
1197:
1189:
1188:External links
1186:
1184:
1183:
1150:
1131:(8): 811–823.
1115:
1092:
1074:
1049:
1023:
1001:
975:
949:
936:
906:
899:
869:
857:heinonline.org
844:
819:
797:
775:
750:
709:
683:
666:
639:
637:
634:
625:Criminal Minds
611:
608:
497:Criminal Minds
484:Criminal Minds
478:
475:
435:search warrant
427:crime analysis
394:
391:
390:
389:
386:
383:
335:
334:
319:
318:
313:
308:
305:
287:
286:
273:
272:
269:
266:
263:
252:
240:
239:
212:cybercriminals
205:
204:
201:
171:
168:
167:
166:
159:
153:
147:
95:
94:
91:
87:
86:
85:
84:
83:
82:
81:
80:
62:
58:
57:
52:
46:
45:
40:
36:
35:
30:
26:
25:
15:
9:
6:
4:
3:
2:
1875:
1864:
1861:
1860:
1858:
1845:
1844:Hogan's Alley
1841:
1837:
1831:
1830:
1826:
1824:
1821:
1819:
1816:
1814:
1811:
1809:
1806:
1805:
1803:
1799:
1793:
1790:
1789:
1787:
1783:
1777:
1774:
1772:
1769:
1767:
1764:
1762:
1759:
1757:
1754:
1752:
1749:
1747:
1744:
1742:
1739:
1735:
1734:"Deep Throat"
1732:
1731:
1730:
1727:
1725:
1724:Sibel Edmonds
1722:
1720:
1717:
1715:
1712:
1711:
1709:
1705:
1699:
1696:
1694:
1692:
1688:
1686:
1683:
1681:
1678:
1676:
1673:
1671:
1668:
1666:
1663:
1661:
1658:
1656:
1653:
1651:
1648:
1646:
1643:
1641:
1638:
1636:
1633:
1631:
1628:
1626:
1623:
1621:
1618:
1616:
1613:
1611:
1608:
1606:
1603:
1601:
1598:
1597:
1595:
1587:
1581:
1580:Special agent
1578:
1576:
1573:
1571:
1568:
1567:
1565:
1563:
1559:
1553:
1550:
1547:
1544:
1541:
1538:
1536:
1533:
1530:
1527:
1525:
1522:
1520:
1517:
1515:
1512:
1511:
1509:
1505:
1495:
1492:
1490:
1487:
1486:
1484:
1480:
1474:
1471:
1467:
1464:
1463:
1462:
1459:
1458:
1456:
1454:
1450:
1444:
1441:
1439:
1436:
1434:
1431:
1427:
1424:
1423:
1422:
1419:
1417:
1414:
1413:
1411:
1409:
1405:
1399:
1396:
1392:
1389:
1387:
1384:
1383:
1382:
1379:
1378:
1376:
1374:
1370:
1364:
1361:
1357:
1354:
1352:
1349:
1347:
1344:
1342:
1339:
1335:
1332:
1330:
1327:
1325:
1322:
1321:
1320:
1317:
1316:
1315:
1312:
1310:
1307:
1306:
1304:
1302:
1296:
1293:
1289:
1274:
1271:
1269:
1266:
1264:
1261:
1259:
1256:
1254:
1251:
1250:
1248:
1246:
1245:Field offices
1242:
1238:
1231:
1226:
1224:
1219:
1217:
1212:
1211:
1208:
1201:
1198:
1195:
1192:
1191:
1176:September 28,
1171:
1167:
1166:
1161:
1158:Winerman, L.
1154:
1146:
1142:
1138:
1134:
1130:
1126:
1119:
1108:September 28,
1103:
1096:
1088:
1084:
1078:
1062:
1056:
1054:
1038:
1034:
1027:
1019:
1015:
1008:
1006:
989:
985:
979:
963:
959:
953:
939:
933:
929:
925:
921:
917:
910:
902:
896:
892:
888:
884:
880:
873:
858:
854:
848:
833:
829:
823:
807:
801:
785:
779:
764:
760:
754:
746:
742:
737:
732:
728:
724:
720:
713:
705:
701:
697:
690:
688:
679:
673:
671:
654:
650:
644:
640:
633:
631:
627:
626:
620:
616:
607:
605:
601:
600:Ted Kaczynski
597:
596:
591:
587:
586:
581:
577:
576:
571:
567:
563:
562:
557:
556:
551:
550:
545:
541:
540:
535:
534:
529:
528:
523:
522:
517:
513:
512:Thomas Harris
509:
508:
503:
499:
498:
492:
490:
486:
485:
474:
472:
468:
464:
460:
456:
452:
448:
444:
440:
436:
432:
428:
424:
420:
414:
412:
408:
403:
400:
387:
384:
381:
380:
379:
376:
374:
369:
366:
362:
357:
355:
351:
346:
344:
339:
332:
331:
330:
328:
324:
317:
314:
312:
309:
306:
303:
302:
301:
298:
296:
292:
284:
280:
279:
277:
270:
267:
264:
261:
257:
253:
250:
249:
248:
245:
237:
236:
235:
233:
229:
225:
221:
217:
213:
209:
202:
199:
198:
197:
194:
192:
188:
183:
181:
177:
163:
160:
157:
154:
151:
148:
145:
142:
141:
140:
137:
134:
130:
127:Overall, the
125:
123:
119:
114:
110:
106:
102:
92:
88:
79:
76:
75:
73:
72:
71:
68:
67:
66:
63:
59:
56:
53:
51:
47:
44:
43:United States
41:
37:
34:(38–39 years)
31:
27:
22:
19:
1827:
1818:Junior G-Men
1771:Clyde Tolson
1766:Peter Strzok
1751:Wesley Grapp
1693:(10 Cr. 336)
1690:
1323:
1291:Organization
1174:. Retrieved
1169:
1163:
1153:
1128:
1124:
1118:
1106:. Retrieved
1095:
1086:
1077:
1067:February 10,
1065:. Retrieved
1040:. Retrieved
1036:
1026:
1017:
992:. Retrieved
987:
978:
966:. Retrieved
961:
952:
941:, retrieved
919:
909:
882:
872:
860:. Retrieved
856:
847:
835:. Retrieved
831:
822:
812:February 24,
810:. Retrieved
800:
788:. Retrieved
778:
766:. Retrieved
762:
753:
729:(4): 19–24.
726:
722:
712:
703:
699:
659:February 10,
657:. Retrieved
653:the original
643:
623:
621:
617:
613:
593:
583:
573:
559:
553:
547:
537:
531:
525:
519:
505:
495:
493:
482:
480:
459:anthropology
442:
415:
404:
396:
377:
370:
358:
347:
340:
336:
320:
299:
288:
274:
246:
242:
206:
195:
184:
173:
161:
155:
149:
143:
138:
126:
104:
100:
98:
90:Abbreviation
61:Part of
32:1985–present
18:
1761:David Icove
1741:Helen Gandy
1590:Methods and
1519:Bureaupedia
1104:. WRAL News
837:October 11,
763:www.atf.gov
423:crime scene
361:Methodology
311:Crime scene
234:threats.
232:cyberattack
1698:Waco siege
1610:COINTELPRO
1592:activities
1507:Technology
1398:FBI Police
1263:Cincinnati
636:References
585:Mindhunter
539:Red Dragon
467:entomology
463:psychiatry
455:odontology
260:sextortion
228:anti-virus
208:Cybercrime
133:cybercrime
1785:Buildings
1729:Mark Felt
1524:Carnivore
1268:Cleveland
1145:144703573
745:0091-2085
706:(1): 238.
610:Criticism
566:Signature
564:episode "
521:Manhunter
489:profilers
471:pathology
393:Operation
350:Interview
276:children.
224:firewalls
216:criminals
1857:Category
1660:Guardian
1570:Director
790:June 10,
575:The Wire
570:season 9
549:Hannibal
533:Hannibal
500:and its
447:teachers
419:behavior
354:Strategy
307:Offender
122:violence
1801:Related
1548:(N-DEx)
1542:(IAFIS)
1531:(CODIS)
1381:Academy
1258:Buffalo
1253:Atlanta
862:May 11,
628:. Some
592:series
555:Clarice
502:spinoff
451:parents
165:entity.
39:Country
1707:People
1600:Abscam
1514:Airtel
1143:
1042:May 9,
994:May 8,
990:. 2024
968:May 8,
964:. 2009
943:May 9,
934:
897:
768:May 9,
743:
558:. The
536:, and
304:Victim
226:, and
118:crimes
50:Agency
29:Active
1839:Other
1813:G-Man
1562:Ranks
1273:Tampa
1141:S2CID
469:, or
291:ViCAP
283:ViCAP
1178:2012
1110:2012
1069:2012
1044:2024
996:2024
970:2024
945:2024
932:ISBN
895:ISBN
864:2024
839:2017
814:2014
792:2012
770:2024
741:ISSN
661:2012
289:The
99:The
1133:doi
924:doi
887:doi
731:doi
568:" (
129:FBI
111:'s
105:BAU
93:BAU
1859::
1170:35
1168:.
1162:.
1139:.
1129:17
1127:.
1085:.
1052:^
1035:.
1016:.
1004:^
986:.
960:.
930:,
918:,
893:.
881:.
855:.
830:.
761:.
739:.
727:46
725:.
721:.
704:61
702:.
698:.
686:^
669:^
606:.
530:,
524:,
514:'
504:,
473:.
465:,
461:,
457:,
449:,
375:.
258:,
193:.
182:.
124:.
1229:e
1222:t
1215:v
1180:.
1147:.
1135::
1112:.
1089:.
1071:.
1046:.
1020:.
998:.
972:.
926::
903:.
889::
866:.
841:.
816:.
794:.
772:.
747:.
733::
680:.
663:.
285:)
103:(
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.