Style and Theme of Attack

The limits placed on human behavior implicitly give a profile or description of the criminal offender. The fact that my computer is being attacked during the day tells me something about the offender. What this tells me is they are available during day time working hours which implies they don’t have a job or at least not a consistent paying job. Their income may be fragmented, part-time, or they maybe fully unemployed.

Gaining access by subterfuge implies that they are “ready” and willing to talk to the victim. And that is exactly what my veiled clandestine nemisis seems to be doing. “He” wants to direct my behavior. “He” has moved me away from my home PC and now, as a result, I have to use my phone to publish over WordPress. This gives “him” a tremendous thrill at being capable of controlling aspects of my life and this element of the crime establishes the “Power” aspect of the offense. As I have previously related, Power Rapists have a history of property crime. The re-occuring theme of “theft” in my personal history of victimization tells me that this person maybe split against women or he may be carrying out some retaliation from a perceived wrong doing, a vendetta retribution. He (or they) may have a history of property crime, theft, even shop lifting. Devaluement of women is often seen in “authoritarian” and white supremacists personalities. People with these types of personalities usually have high levels of narcissism and feel entitled. As a result they view people as objects, lacking empathy and tolerance for others. The feminine aspect of my very way of being may be viewed as “weak”. My veiled clandestine nemisis has shown me exactly the kind of power he is capable of weilding over me. As you can infer I have become his “object,” a mere “play-thing” in his play pen.

The offenders have knowledge in modes of intelligence gathering. They are familiar with computers and cellular technology. They may even do or perform work that requires mechanical intelligence or requires computer knowledge. I use they because I don’t believe that it’s one person acting alone. I believe it to be an organized criminal network.

Advertisements

Sudden Problems With Logging In To Wordpress (Updated)

“Even the darkest human evil has a pattern. Whatever the attack, it contains themes, recurring elements, dominant characteristics, and identifiable structures. The facets of the attack will reflect distortions in the forms of intimacy for which they are searching. The breakdown in the fruitful search for acceptable power and appropriate intimacy characterizes the inner narrative of violent men.” -Chapter “Limited Narratives”, Criminal Shadows

It seems, at least to me, I often experience problems with my computer after I’ve posted something someone doesn’t agree with, or perhaps they feel I’m getting too close. From my last post you probably can infer I’m being harrassed. So, I don’t know when my next lengthly post will be. My latest posts have shed light on facts I believe are crucial to my case like a large percentage of crime is committed with in a certain radius of the criminal’s home. I feel like I am being victimized by someone who lives near me or at least someone who has familiar knowledge of the local surrounding area. I also feel like what I’m learning about and writing about is striking a chord with this certain someone. So, with that, all I can really manage to type on my cell phone is this:

The FBI has established that there are four (4) types of rape motives for men who sexually victimize women: Sadistic, Reassurance, Anger, and Power.

The sadistic rapist is expected to be married, whereas the reassurance type is predicted to be single, living with his parents. The anger rapist is believed to have an action oriented occupation, and the power rapist is believed to have a history of property crime.

Murder is dichotomized even simpler; “organized” and “disorganized” style of attack. The former plan and restrain their victims before carefully hiding the body and concealing the evidence of the crime. The latter, by contrast, carry out an impulsive attack. Fleeing the crime scene with little attempt to move the body after death. These characteristics are thought to reflect aspects of the criminal’s personality. Thus, an organized crime would likely be carried out by an individual living an organized life, holding a job with a reasonable work history, intelligent and socially competent. Whereas as the disorganized crime scene would reflect the opposite.

I feel that what has been happening to me can be viewed similar to a sadistic, power hungry criminal with a high level of organization.

Today I logged in to WordPress at approximately 10:30 am. I received my two-step authentication code via my cell phone. Once I was logged in to WordPress I started experiencing problems, the screen locked-up and I couldn’t do any work and then the browser I was using shut down and closed. At 10:34 am I received another two-step authentication code. A code I did not request. I believe someone was trying to hack my WordPress account at that time.

This isn’t the first time this has happened to me. I’ve been “mail bombed” via my email account of which I received a virus too. This virus dates buckets of spam mail the year 2006 and as a result I have to delete loads of spam emails every time I log in just to get to my current email. Needless to say, I’ve changed emails. I have had software stolen, I’ve had another email account stolen and rendered unrecoverable, my first original Facebook account was hacked into and the password changed, and now this account with WordPress is constantly being attacked by some hacker trying to gain access. This tells me that this “certain someone” has expertise with computers, may have worked in IT and apparently is suffering from a breakdown in modes of acceptable power and intimacy, issues with which he reveals his aggressive will and antisocial behavior.

A Facebook Account Dilemma

461062-don-t-use-facebook-fatigue

In a conversation with someone this morning discussing how I’ve recently been receiving an overload of friend’s request from what appears to be various fraudulent accounts impersonating famous celebrities. This someone said to me, “Well, maybe it was something YOU did. YOU like talking about phalluses, penis envy, and castration complexes. Maybe it was something YOU said.”

The various Facebook friend’s request I have been receiving include variations in the names Oprah Winfrey and Dwayne “The Rock” Johnson. These accounts use images of both Oprah Winfrey as a profile picture and Dwayne “The Rock” Johnson as a profile picture respectively. All display similarities in photo images; piles of waded dollar bills, gold watches, bars of gold, expensive sports cars, etc. It’s almost as if they are trying to entice individuals to accept their friend’s requests in an attempt to get people to “follow” their Facebook pages. Some of these pages promote a “lottery” where if you download the latest Dwayne Johnson movie, your name gets entered into a contest and you could win cash, prizes, even an expensive car. Does this eerily sound like some type of pyramid scheme?

The following Facebook accounts have sent me friend’s requests:
Oprah Winfrey Gail, Oprah Win, Oprah Wilfrey, Dwayne J, Orpahh Bae, Orpah Winer, Ruun Johnson, Operahh Wiiwinfrey. And this isn’t a complete list. There were a few other account name with variations in their spelling too that are not included in this list.

Okay, back to my morning conversation with “my friend.” Historically what “my friend” implied has been called “victim blaming.” This occurs quite frequently in the criminal justice system when women are raped or victimized in some way. Often times police officers feel that responsibility was either fully or partially due to the behavior of the woman. Phrases like, “She enticed the perpetrator.” “She dressed too sexy.” (believing clothing can convey consent for sexual action irrespective of will or verbal consent.) “She was in a bar all alone.” “She was drinking and intoxicated.”(believing intoxication reduced her ability to resist or refuse and therefore is to blame.) “She placed herself in a threatening environment or situation.” “She was asking for it.” The study of victimology seeks to mitigate the perception of victims as responsible. There is a greater tendency to blame victims of rape than victims of robbery if victims and perpetrators know each other.

In 1947 Theodor W. Adorno defined what would later be called “blaming the victim” as one of the most sinister features of the fascist character. Shortly thereafter Adorno and three other professors at the University of California, Berkeley formulated their influential and highly debated F-scale (F for fascist) published in The Authoritarian Personality (1950), which included among the fascist traits of the scale the “contempt for everything discriminated against or weak.” A typical expression of victim blaming is the “asking for it “idiom, e.g. “she was asking for it” said of a victims of violence or sexual assault.

Secondary victimization is the re-traumatization of the sexual assault, abuse, or rape victim through the responses of individuals and institutions. Types of secondary victimization include victim blaming, disbelieving the victim’s story, minimizing the severity of the attack, and inappropriate post-assault treatment by medical personnel or other organizations. Secondary victimization is especially common in cases of drug-facilitate, acquaintance, military sexual assault, and statutory rape.

Victims experience stigmatization based on rape myths. A female rape victim is especially stigmatized in patrilineal cultures with strong customs and taboos regarding sex and sexuality. For example, a society may view a female rape victim 9especially one who was previously a virgin) as “damaged”. Victims in these cultures may suffer isolation, physical and psychological abuse, slut-shaming, public humiliation rituals, be disowned by friends and family, be prohibited from marrying, be divorced if already married, or even killed. Even in many developed countries, including some sectors of the United States society, misogyny remains culturally ingrained.

So, was I “asking for it” by publicly writing and discussing features of narcissism, female masculinities, and phallic women?

Jack The Ripper Crime Scene Analysis

american-ripper5

In his book “Criminal Shadows: Unlocking the minds of serial killers and sexual predators and cracking cases” David Canter illustrates the case of “Jack the Ripper” in Victorian London to describe the concept of how criminals have a tendency to commit crimes close to a home base known as the “circle hypothesis.”

Canter goes on to theorize about the five crimes committed around the vicinity of Whitechapel Road in London during late 1888 by the notorious serial killer Jack the Ripper were committed by some local resident Londoner in the area of Whitechapel. The authorities had various suspects but Canter suggests James Maybrick and Aaron Kosminski. However in recent years, during the summer of 2017, a TV series “American Ripper” explains precisely why the identity of the true Ripper had remained concealed. It was postulated that notorious American serial Killer H.H. Holmes was indeed “Jack the Ripper.” Jack the Ripper, aka Dr. Henry Howard Holmes whose real name was Herman Webster Mudgett, graduated from the School of Medicine at the University of Michigan in 1884. Jeff Mudget, Herman Webster Mudgett’s great-great-grandson, postulates that it was his great-great-grandfather who committed the Jack the Ripper murders in late 1888 between the dates of August 31, 1888 and  November 9, 1888. If this is true, this makes the real Jack the Ripper a commuter / traveler / tourist to London during the span of the killing sprees. This fact defies intuitively what investigators know and have theorized about criminal activity.

Ripper Murders2

For those notorious cases that have remained unsolved, it is very likely that various elements common to the type of crime being analyzed, defy traditional “rule of thumb” indicators. At the time, London investigators were looking for a local area resident, another Londoner. Information may have been over looked, at the time, because the evidence that would have proved true, remained concealed under the guise of an alias. H.H. Holmes used frequent alias and had booked passage to London under one of those alias. He was a tourist taking up lodge using a fake identity. According to this theory, in which Jeff Mudgett produced pretty compelling evidence to prove that the first five cannonical murders of Jack the Ripper were committed by an American citizen. Jeff Mudgett claims that even Scotland Yard visited America following the murders believing that the Ripper could have been an American but they abandoned their investigation, probably due to lack of evidence. There trail may have went cold.

The Murder Castle

H. H. Holmes (Herman Webster Mudgett) was born May 16, 1861 and he was America’s first serial killer. He also doubled as a swindler, forger, arsonist, thief, kidnapper, and bigamist. Even today his monstrous acts are notable for their plentitude and cold-blooded efficiency. No one know how many people he killed but estimates range as high as 200.

Mudgett is best known under the alias H.H. Holmes, which he adopted upon moving to Chicago in 1886. In that city he prospered as a legitimate druggist, but secretly indulged a passion for crime, primarily fraud and homicide. In 1890 he completed construction of an imposing three-story commercial building of his own design that would soon become known as the Murder Castle.

From the outside the building looked something like a Medieval fortress, complete with turret. On the inside it was a diabolical killing factory, a labyrinth of trap doors, secret compartments, and hidden stairways.

The upper floor held soundproofed, airtight rooms hooked up to gas lines so the victims could be silently asphyxiated (or possibly roasted alive). A nearby chute dropped directly to the basement, where vats of acid waited to strip the flesh from bodies whose skeletons were sold to medical supply houses. Other corpses were partially dissected, then offered as cadavers to medical schools. Those that couldn’t be sold were incinerated in the huge furnace (crematorium) or buried in pits of quicklime.

Mudgett’s victims were mainly young women, some of whom worked in his building. Others were out-of-town visitors who rented rooms there. These were found in especially plentiful supply in Chicago during the World’s Columbian Exposition of 1893.

As the fair drew to a close, however, the doctor’s fraudulent business practices began to catch up with him, and he abandoned the city with his new bride (still being married to the previous two) for a cross-country spree of swindling and murder. A year later he was finally arrested for killing his henchman, Benjamin Pietzel, and three of Pietzel’s children.

While he languished in a cell in Philadelphia the full story of Mudgett’s heinous life of crime came out.

Reporters asked former instructor Dr. George Heath what the accused killer had been like while studying at Michigan. “I remember him as a mild, inoffensive student of ordinary ability and seemingly the last person in his class to follow the murderous career that he seems to have followed,” the doctor replied.

However, a classmate remembered Mudgett as a liar and a sneak with an unnatural liking for dissection who once obtained permission to take a body home with him to cut up over spring vacation.

It was also in Ann Arbor that Mudgett first concocted the macabre swindle of which he was most found. He would take out a life insurance policy on an accomplice, then steal a cadaver of the same height and weight and disfigure it so that it could no longer be recognized. After the accomplice left won the cadaver would be presented as that of the insured, and the policy redeemed.

Mudgett went to the gallows on May 7, 1896 at the age of 34 at Moyamensing Prison in Philadelphia Pennsylvania. He was executed on only one count of murder. The fall did not kill him instantly. Instead he dangled at the end of the rope, slowly strangling for nearly 15 minutes. At his own direction his coffin was encased in cement and buried 10 feet deep.

Despite the fact Jack the Ripper may have been an American and not a Londoner, the fact remains that murders were probably committed by someone lodging on or around Whitechapel Road.

Making Use Of The Space Around Us

jack1.jpg
Artist rendition of “Jack the Ripper”

“A criminal is more vulnerable in his history than in his future.”

Spatial Relations

In evaluating criminal behavior how our habits relate to the space around us has proven crucial in understanding how and why criminals commit crime. Actions are unknowingly tied to spatial patterns, a fact that can be seen in public meetings. The next time you attend any sort of talk, make a note of where the people who ask the questions are sitting. People who have systematically studied this will predict that question-askers tend to sit towards the front and towards the middle of the audience. In Canter’s own experience, questions are most likely to come from people sitting in the first two rows toward the side of the room closest to the main entrance. (For me it was usually always the first row near the exit, first three seats. Making a point to always arrive early enough to grab the much sought after position.)

Opportunity

Two processes are at play. One is opportunity, or technical possibility. In some positions it is easier to catch the lecturer’s eye, or judge when an interjection is feasible without being impolite. The second is individual predetermination. A person keenly interested in a topic, or in taking part in discussions, will tend to place themselves where it is easier to catch the lecturer’s eye. The person may not even be aware of these actions and what they mean. Typically it is part of implicit habits that we take for granted and notice only when someone mentions them.

Availability

Federal Bureau of Investigations’ special agents studied thirty-two (32) burglars who had committed from five to seventy burglaries. They created a map for each burglar evaluated. The relationship between where the burglars lived and where they committed their crimes had a direct link. This research established general rules relating to criminals’ residences and where they commit their crimes. This particular study required the researchers to measure distances between the crimes committed. Out of the thirty-two small-town felons the maps showed that most burglaries can be put on the same sized sheet of A4 paper which always included and established the burglars’ home residences.

The Role of Distance

The case of “Jack the Ripper” is a notorious case because these murders remain unsolved. Jack the Ripper terrorized the area around Whitechapel Road in London between the months of Aug 31, 1888 and November 9, 1888. He killed five victims; Mary Ann Nichols, Catherine Eddowes, Elizabeth Stride, Annie Chapman, and Mary Jane Kelly. It is possible to walk around the Whitechapel sites related to the Jack the Ripper murders in an afternoon and about a quarter of million tourists do each year. More modern serial murders have taken place over larger distances of space. The development of faster transportation systems such as cars, railways, and buses have enabled criminals to commit crimes over vaster distances of space.

The very distances over which crimes are committed tell us something about the individual who perpetrated them. In Victorian Whitechapel it is not surprising that Jack the Ripper moved around on foot, but if he left the area in a horse-drawn cab why was the farthest distance between any two attacks still within an easy walk? Whitechapel was not the only area of London with narrow streets and many potential victims. We can prudently assume that the scenes of his crimes were within walking distance of each other from where he lived or was lodging.

The Circle Hypothesis

The “Circle Hypothesis” is the idea of mapping all the crimes thought to have been committed by one, possibly unknown, individual and identifying the two crime locations furthest apart from each other. Using these locations as the diameter, a circle can then be drawn that includes all the offenses. The hypothesis is that the criminal will be found to live inside that circle, possibly close to the middle.

Maximizing Opportunity, Reducing Risk

In one of my previous blog posts I indicated the following as character attribute in a profiling case:

*Enjoys the space provided by radio frequency / this provides a safer area for him / her to hide.
*Enjoys being clandestine and hidden / makes him/her feel superior like he/she has outsmarted the victim and the victim is “stupid.”
*Average to above average intelligence.

If we assume that the criminal has a base, then he is likely to have some degree of familiarity with the area around the base as well as with the people who may live in and around the surrounding neighborhoods. One theory says that criminals are unlikely to carry out a crime very close to home for fear of recognition, or because of the risk of getting drawn into police inquiries. The old adage, “Criminal don’t crap on their own doorsteps!” But often times criminal analysis of crime scenes defy traditional “rule of thumb” theories. It is my opinion that crimes that go unsolved for any length of time defy traditional crime scene analysis intuition; theories that have been put in place about the way investigators think and investigate crime.

For me, in my evaluation of crime, successful criminals make use of the people and places that surround them and are probably one of the key character attributes to orchestrated organized criminal activity. This particular character attribute has been observed in many psychopaths; dons of organized crime who exploit and manipulate their victims and business associates.

But how is a person to describe a physical assault when no physical contact has been made? Even worse, how is one to get an accurate description of the perpetrator? He / she does not show their face directly to anyone. It has become clear that the use of transmitted signal(s) via space and distance are his greatest allies in protecting his identity.

 

Ripper Murders2.jpg

 

Making Maps Of Criminal Activity Pertaining to Serial Offenses

To help illustrate and understand this concept investigators make use of maps. The optimum distance from the base to the first crime could be indicated by drawing a small circle, say, at the top right-hand corner of the sheet of paper. Let us label the first small circle “first crime.” In this simple world the criminal cannot travel very far without getting into unknown territory. Too far and he may not know his way around and easily escape. There may be other risks that he is unaware of as well. The imaginary distance between the “base” and the “first crime” may be regarded as an optimum one, from the criminal’s point of view; just far enough to be safe, but not so far that unfamiliarity provides its own risks.

His second crime scene selection. If he wants to keep the same optimum level of risk, the area in which he attacked is probably no longer safe. People may be more vigilant there. He may be recognized. It is no longer a sterile, unsullied zone. If he is to keep optimum distance the criminal has to go elsewhere, at the same distance from his base but in a different direction. Assuming the opportunities are the same in every direction, then, for example, up in the top left-hand corner is a good a place as any. We can, therefore, draw a further circle in the top left corner of our sheet of paper, and mark it “second crime.”

What is true of the location for the second crime is true for the third, which he must locate at the same sort of distance, although in a different direction, and also for the fourth. The four notional crimes would be arranged on the blank sheet of paper in the four corners like dots on dice cubes. In an actual example we would not expect the dots to quite as evenly spaced because the actual layout of streets would produce distortions in the pattern.

Once you have committed four crimes, if you want to continue, keeping the same optimum distance from home, then you must return to the vicinity of earlier crimes. A fifth crime, therefore, could be located between the third and fourth, or anywhere else that the criminal felt least vulnerable. Pythagoras would have understood the power of this geometry immediately. To maintain the optimum balance between familiarity and risk you would have to commit your crimes in a circular region around your home: a band of criminal opportunity.

The problem for police is that they would not have the location of where the offender was living marked on their map. All they would have would be the locations of the crimes reported to them. They would have the equivalent of our sheet of paper with the red square for the base removed, leaving just the location of the five crimes. In my example these form an irregular circle of points with a large blank white space in the middle. So, as you can see, in this simple example, if the police had a ma of offenses sitting roughly on a circle like this, it would be reasonable to assume for any investigation the possibility that the offender lived near the center of the circle. This theory dispels the notion that “commuters” or “travelers” to the area would commit the crimes as crime statistics state that this rule of thumb holds true in 80% of cases. Only 10% are known commuters or travelers.

The simple, direct logic, derived from a few principles leads to the “circle hypothesis.” To keep the principles basic in this illustration, we have assumed an even distribution of both familiarity and opportunity for crime. We know that such assumptions are unlikely to hold for many people, but even a model as uncomplicated as this can apply to some criminals who have committed a series of crime.

Studying The Shadow Before The Crime

What principles are available to predict the relationship between where a criminal lives and where he commits his crimes? About the only rule of thumb that FBI special agents offered was that, in some cases, particularly where the criminal appears not to have planned his attacks carefully, he may well live near the location of the first assault. This is rule of thumb to serial crimes of rape, murder, and burglary.

Two Interrelated Psychological Process Underlie the “Circle Hypothesis”

First process, Criminals commit their crimes near to where they live. Second process, The making of internal mental maps that help people evaluate their surrounds. Familiarity with an area is the biggest influence. Environmental psychologists have carried out many studies of map drawings, the process of sketching a map of a well known area. This study have revealed that internal representations, or “mental maps” that people create for themselves in order to evaluate an area assist them in their day to day activities. These representations are created mentally and represent a person’s accurate or inaccurate evaluation of an area. They can be faulty or they can be quite accurate.

The criminal who perpetrates a set of crimes in a particular area is telling us something about his familiarity with the area. This familiarity may be entirely a product of his criminal activities, but often it will be influenced by the same limitations that influence us all, where he has his base, the hours he works, if he has weekends off, the intrusion of spouse and children. Shadows do not float free of their origins.

Female Masculinities and Phallic Women (Updated)

kuspit11-3-10-2
My creative imagination sees this antiquated image in modern terms, for example when a female actress has been awarded an Oscar and is walking away with the prize.

“If the pen is mightier than the sword, might I not also, too, posses a phallus?”

Traditional feminine psychoanalytic theory postulates that little girls experience penis envy, anger and envy from the disappointment she feels that mother has not given her a penis. In the typical Freudian paradigm, normal femininity means that girls love their fathers, resent but identify with their mothers, and finally achieve contentment with their lot by having a compensatory baby, preferably one born with a penis. One alternative to this normative female Oedipus complex is the masculine protest in which the woman rebels against femininity by choosing a masculine occupation and sometimes by becoming a lesbian.

Robert Stoller, who pathologies female masculininity, discovered widespread phallic fantasies in women. He outlined a case study of Mrs. G. in which he tried to uncover the family dynamics and childhood psychology of this women who suffered the delusion of believing she had an invisible penis that protected her from predatory men, and persuades her that her desire for women were not homosexual in nature. Stoller traces her multiple personalities and sexual ambivalence, and gender dysphoria to her childhood family, including her weak father and rejecting mother. Stoller used this unique case to build generalization about gender identity in women in general. He goes on to describe Mrs. G as “very masculine.” But what those details about Mrs. G are, that make her “very masculine,” he remain vague. He explains that she is “butchy,” “tough,” and “belligerent,” with a “cocky position of her head.” And although he mentions that she is Mexican American, he never discusses her ethnicity or her working-class background as factors shaping her gender or sexuality.

Rita Moreno. Rita Moreno is an 86 year-old singer, actress, and Broadway performer who, has won 2 Emmys, a Grammy, an Oscar and a Tony. She is one of the twelve EGOT recipients. She was born in Puerto Rico and, in my opinion, may be described as phallic. She is a strong woman, straight and forth right in her demeanor, tough and also a little intrusive and outspoken in speech, brassy. When she was 5 her mother relocated to New York City from Puerto Rico. She still vividly recalls the culture shock of a different language, the snow which she had never seen before, racism even among children, and the name calling. “I was suddenly different” she says. Her relocation forced her to become tough. It was sink or swim. In her words, “A woman of grit.” She says, “I had the model of my mommy’s grit. Never give in, never quit, keep on moving.”

In psychoanalysis, phallic woman is a concept to describe a woman with the symbolic attributes, or quite literally speaking the physical attributes of the phallus. We see this in transgender men who undergo breast augmentation and, with regard to unconscious fantasies in the relational world, they may even be a male parent mothering figure who is fantasmatically endowed with a phallus. Hope I didn’t lose you on that one. Men who feel they are women on the inside. More generally, it describes any biologically born female who posses traditional masculine characteristics. So, how are we to describe and categories these female masculinities and phallic females?

Amplifications of Mirrors
We are not raised by the tribes females in the nucleus of our village huts anymore, congregating around the same hearth while the men go off to hunt. Most of us are born into single family homes with the triangulation of a mother-father-self. This means that these two personalities influence us in profound ways. We then become the amplifications of these influences. We then become the mirror or distorted reflection of our upbringing.

Stoller believed that his patient Mrs. G. would become psychologically more healthier if she finally considered herself a lesbian. Stoller believed that both female masculinity and homosexuality as pathological aberrations from a natural heterosexual norm: “Most homosexuals are what they are in order to preserve a nucleus of heterosexuality somewhere inside [themselves],” and he judges that Mrs. G’s masculine sexual behavior is a defense mechanism to keep her “from recognizing that she wanted to be taken care of and “mothered” herself.”

It would seem that abusive, harsh, and at times uncaring environments may give rise to strong, “butchy” and, often times, successful women. Serena Williams is a phallic women. She wields her tennis racket like a penis. She has the physique of a gladiator. Yet she is married with children. Both Serena Williams and her sister Venus were groomed to be professional tennis players by their father, Richard Williams a former sharecropper from Louisiana, who was determined to see his two youngest girls succeed. He gleaned what he knew from tennis books and instructional videos. Serena withstood the rigors of daily two-hour practices from her father. Raised in Compton, California with its high rate of gang activity, Richard Williams wanted to expose his daughters to the ugly possibilities of life “if they did not work hard and get an education.” In this setting, on courts that were riddled with potholes and sometimes missing nets, Serena and Venus cut their teeth on the game of tennis and the requirements for preserving in a tough climate.

Could we call these women phallic? Should we call these women phallic? What exactly should female masculinities and phallic describe?

Two horror films, Play Misty for Me (1971) and Fatal Attraction (1987) give us iconic portrayals of erotomanic, vengeful female sexual stalking. The films have intrigued feminist scholar because, in them, patriarchal values appear to disintegrate and give way to portrayals of the torments of unrequited love and erotomania in lonely, obsessional, romantic women stalkers whose appetitive and often phallic hunt for men appears to rob those men of their gendered sense of pride and power. Each of these two films presents the deconstructed image of stalked man as castrated and stripped of self-agency, one whose initial image as an active man is destroyed. In both films, the erotomanic woman stalker assumes a relational intimacy between her and her stalkee that exists only in her mind. Evelyn, in Misty, and Alex, in Fatal Attraction, turn out to be morbidly jealous and murderous, psychotically obsessed erotomanic women.

These two films each tell a story of a masochistic stalked man now stripped of self agency, whose image as a once active, potent man is deconstructed as it gives way to impotent despair. Married men who have strayed are often terrified, if not terrorized, by these films.

NOTE:  The term “phallus” is to be understood to indicate not a penis but its attributes – “intrusiveness, power, violence, dominant, potent.” Envy and hatred of maleness, penis envy, is believed to be common to all women. Freud emphasized that “non-conflictual learning” help create women’s gender identity. However, the traditional roles of gender identity have shifted Freud postulated his paradigm, as we more widely accept masculine women and feminine men. What of female machisma?

Sources:
Virginia Cueto, Katharine A. Díaz, Julia Lobaco, Carlos J. Queiros and Veronica Villafañe. The Latino American Dream. AARP Magazine. August/September 2018, pp. 30-37.

Gardiner, Judith Kegan. Female Masculinity and Phallic Women – Unruly Concepts. Feminist Studies. Vol. 38, No. 3 (FALL 2012), pp. 597-624.

Holmes, Lucy. Wrestling With Destiny: The promise of psychoanalysis. New York. Routledge Taylor & Francis Group. 2013.

Stoller, Robert. Splitting: A Case of Female Masculinity. New Haven. Yale University Press. 1973.

https://www.biography.com/people/serena-williams-9532901

Profiling A Criminal Case (Updated)

FBI-Federal-Bureau-Of-Investigation.jpg

When you can’t see your enemy, how are you expected to fight him or her? Remember the movie Predator (1987)? The one with the invisible alien enemy that could veil his position?

A forensic profile is a list of personality and character traits believed to be possessed by the perpetrators of crime. Most often these profiles are associated with the violent crimes of serial rape and serial murder.

This is a preliminary profile of a London rapist who struck the city between 1982-1986. A university professor was asked to assist in the investigation as there were no professional profilers at the time.

Residence
Has lived in the area circumscribed by the first 3 cases since 1983.
Possibly arrested some time after 14 October 1983.
Probably lived in that area at the time of arrest.
Probably lives with wife/girl friend, quite possible without children

Age and Physical Characteristics
Mid to late 20s
Light hair
About 5”9”
Right handed
“A” secretor

Occupation
Probably semi-skilled or skilled job, involving weekend work or casual labor from abut June 1984 onwards
Job does not bring him into a lot of contact with public in all probability

Character
Keeps to himself but has one or two very close men friends
Probably very little contact with women, especially in work situation
Has knowledge of the railway system along which attacks happened

Sexual Activity
The variety and mixture of his sexual actions suggest considerable sexual experience

Criminal Record
Was probably under arrest at sometime between October 1982 and January 1984
His arrest may not have been a sex-related crime at all but an aggressive attack, possibly under the influence of alcohol (or drugs ?)

You need information on how to produce a “forensic profile,” where do you look? What would you do?

In reading how investigators analysis the behavior and actions of criminals, I have come up with a list of my own regarding whom I think the identity to my victimizer may be.

Forensic Profile (of my attacker with electro-magnetic frequency)

Residence
Lives in the local or surrounding community of Trenton / Lawrence area
May live alone or with a girlfriend/wife or boyfriend/husband possibly with children

Age and Physical Characteristics
At this point age is hard to pin point but I’d guess 20s-30s ?
No height
No eye color
No hair color
White male / female (may be both as a network or liaison)
No blood typing or DNA available as no sexual assault was actually committed

Occupation
Probably works in a technically skilled job or mechanical trade
Low-moderate level of income
His job probably brings him into contact with other people of the same working class profession, possibly as network of affiliations (similar to organized crime or “business contacts”)
Works locally

Character
Advanced technological knowledge / enjoys using gadgets and gizmos
Enjoys the space provided by radio frequency / this provides a safer area for him/her to hide
Enjoys being clandestine and hidden, makes him/her feel superior like he/she has outsmarted the victim and the victim is “stupid”
Average to above average intelligence
Feels entitled / he/she is deserving which in turn makes him/her feel envious. This causes him to “steal” or “take back” that which he/she feels he/she rightfully deserves
Possess a desire to dominate and possess his/her victims
May feel a lack of control over his/her own life
Organized
Inability to see the other person’s personal desires and feelings as independent of their own and also a failure to see a person as possessing an individual past history which affects their way of being in the world
Only sees how things benefit his/her own immediate need and/or comfort level
This above stated trait suggests that he/she may lack linguistic skills in vocabulary, in exploring his/her own personal past experience objectively with the inability to recognize that their behavior is based on some past experience (unconscious and fixed fantasy).
The use of electro-magnetic frequency as a mode of torture / control / humiliation. Human rights violation suggests his ulterior motive may be at harassing or possessing control (dominance) of the other individual to suit his/her own needs in fulfillment of wish or fantasy to promote his/her own agenda or felt security. This may demonstrate his/her own failure at negotiating difference, which also reveals his/her poor performance in accepting failure / loss / or separation. These skills at navigating loss begin to be challenged during the rapprochement phase of development (this is the early childhood phases of development and as the child grows they usually learn to successfully manage and navigate their impulses with proper guidance) / may have been spoiled as a child / or abused and neglected as a child.
May have an associate who has medical knowledge / access to hospitals / medical offices / medical files / or medical personnel / finness and sophistication interacting with others in the medical field
Typical white male supremacy (social Darwinism – men with advanced technological knowledge (or at least a perceived level of some sort of intelligence) often consider themselves superior and above those lacking in advanced (mathematical and scientific) knowledge.
Views women as the “weaker” sex or may view those women lacking social refinements as “contaminants” and threats to the human bloodline / or sees them as a threat to their own felt security / or a contaminant to the purity of their culture (fantasies of feminine evil – lower class evils)
Fear of sexually dominant women / or fear of intelligent socially sophisticated educated women
Cultural views may be against outsiders (immigrants / those with opposing religious views / different views about how “women should “culturally” behave“, Etc.)       Paranoid schizoid personality constellation / narcissistic personality constellation / maybe even borderline personality but not likely / disingenuous psychopathy
Attachment style was ambivalent / avoidant (definitely split) in early childhood

Sexual Activity
Likes to think of himself as “helping a girl out” and using electro-magnetic frequency from “a far” makes him feel safe and at the same time like there is an established relationship between himself and the victim.
Stalking excitement wards off dread of aphanisis
May even make him feel potent while using EMF on his victim(s).
May have fear of actual physical contact with a female / intimacy issues.
Aphanisis is the fear of total extinction of the capacity and opportunities for sexual pleasure and excitement. This is very commonly found in men and women who are involved in erotomanic sexual stalking.
In men aphanisis takes the form of castration fears; in women, of separation fears, which can be fantasized and/or, actually realized, as “coming about through the rival mother intervening between the girl and the father.”

Criminal Record
May have prior arrests or civil complaints brought against him
May even possess a prior juvenile record

Sadly, descriptions given by the victims of serial rapists can vary considerably. Sometimes he might be described as having short black hair, sometimes longer ginger hair. Estimates of height and build can also differ from a short five and a half feet to over six feet. It is for this reason that eyewitness testimony is often considered unreliable. Investigators may only be able to come to a limited conclusion depending on the forensic evidence left at the crime scene. Eye color is hard to determine without accurate eyewitness testimony and if hair strands and bodily fluids are left at the crime scene there may be a more accurate description available to investigators.

When we consider human behavior, strong similarities emerge when we consider how people interact with one another. For example, the attacker always approaches his victims first before returning to victimize them. Taking into consideration what rapists actually did and said before, during and after the sexual assault are key to investigations.

In some large U.S. cities a murder investigation will be dropped if the couple of detectives assigned to it do not solve it within twenty-four hours. In Britain, often ten officers can be assigned to one murder investigation for six months.

TWO GENERAL PSYCHOLOGICAL PRINCIPLES TO REMEMBER

1) People Influence Each Other’s Actions – We know that people influence each other’s actions. The difference between attacks involving two men and those involving one might tell us something about both individuals. “What are the variations in the crime?” and “What might that indicate about the perpetrator?”

2) Human Behavior Changes Over Time – Most human behavior develops and changes over time, often in direct relation to the consequences one experiences from an action. (this is seen in “triggering”). “CHANGES OVER TIME” relate to “THE INFLUENCES OF OTHER PEOPLE ON THE CRIMINAL’S ACTIONS?”

MAKING CHARTS AND LOGS

Compile a list comparing all the actions that had happened n every rape / murder/ robbery (whatever). Make charts of locations where events happened. Do assailants say anything to the victim before he attacks her? This establishes social skill, if he establishes a dialogue. Were the victim’s clothes pulled off, cut off or torn off? This can establishes “state of mind”. What sort of threats were made to control the victim? Exactly what type of sexual activity took place during the attack? How did he deal with her after the assault? Often feeling remorse/or confirming a relationship a rapist has to a victim, he might say, “I’ll take you out to dinner sometime.” As if they are intimate partners. These questions make up your “CATEGORIES” and you may have more than a hundred categories.

Computers are used more today to help investigators cross reference behavior patterns (actions committed by murders/ rapists during their crimes) to other actions, and to indicate, by degree, the similarities and differences between the crimes.

The use of computers have helped investigators alleviate their work load because analysis can be time consuming if done by hand. In addition, computers help speed things up and reduce mistakes and distortions.

HOW ACTIONS CHANGE OVER TIME

A lone offender may show increasing assurance as the crimes continued. One offender started spending more time with his victims, especially after the sexual assault. On some occasions, even after he had bound a victim to rape her, he sat and talked to her. We identified certain consistencies, including: the tying of the victim’s thumbs behind her back, sitting to talk with her before the assault, offering information on how to get home and what subway train to use.

A violent crime is always a transaction between at least two people; therefore it must reveal something about the way in which the offender deals with people. We have to consider not just the fact that he was prepared to commit a violent crime, but also all the other implications of his/her actions, the way he/she related to other people, especially women.

Acts of violence can take many different forms and be preceded and followed by a great range of behaviors. These facts taken together, that is, the variations in behavior, can tell us a lot about the offender’s ways of interacting with other people.

Among the plethora of differences psychologist explore about the way people relate to each other, two seemed especially relevant to the varieties of violent crime.

A NEED TO RELATE TO THE VICTIM

How prepared was the criminal to try and relate to the victim? This mirrors years of debate around terms like “outgoing”, “extrovert”, “sociable”, or even “warm” and “considerate.” Within the context of violent crime the key issue may be the attempt to strike up or imply a relationship or not. Given the distorted nature of the relationship in a violent assault on a stranger this must be seen through the eyes of the offender. Does he demand of the victim any sense of him as a person? Request that she kiss him, or asking her name or whether she has a boyfriend may all indicate a man who is trying to convince himself that there is some personal, even intimate, contact involved in the assault. Perhaps this would indicate that he has attempted such relationships in the past with varying degrees of success.

A DESIRE TO DOMINATE

A second distinct theme, long recognized by social psychologists, is the desire for dominance. All violent men want to control their victims so that they can satisfy their urges, but criminals want to explore and relish the experience of control itself. They want to deliberately frighten, demean, and insult their victims. Would that indicate a desire to dominate in other aspects of their life? In one particular case, the offender only exerted enough control to rape his victims, so it raised the possibility that he would not be known as a very powerful, secure individual. Exerting just enough dominance to get your needs taken care of or wish fulfillment / fantasy fulfilled.