You are on page 1of 10

06Forensic-victimology.

pdf

marvg_27

Angles Criminologic

1º Grado en Criminología

Facultad de Derecho
Universidad de Barcelona

Reservados todos los derechos.


No se permite la explotación económica ni la transformación de esta obra. Queda permitida la impresión en su totalidad.
UNIT 6: Forensic victimology
PPT: Forensic victimology I
Introduction to victimology.
DEFINITION OF VICTIMOLOGY
Victimology is the scientific study of victims and victimization, including the relationships between victims
and offender, investigators, courts, corrections, media, and social movements.

DEFINITION OF VICTIM
The term victim is used in the modern criminal justice system to describe any person who has experienced loss,
injury, or hardships due to illegal action of another individual, group or organization.
The term victima is a Latin word used to refer to those who were sacrificed to please God.

GENERAL VICTIMOLOGY
General victimology is the study of victimity in the broadest sense, including those that have been harmed by
accidents, natural disasters, war, and so on.

FORENSIC VICTIMOLOGY
Is the study of violent crime victims for the purposes of addressing investigative and forensic questions. It
involves the accurate, critical, and objective outlining of a victim's lifestyles and circumstances, the events
leading up to an injury, and the precise nature of any harm or loss suffered.

(Objectively and impartially): Studies victims, describing all aspects of their life and lifestyle in order to gain
a better understanding of how they came to be victimised, how the crime took place, and their relationship
with the offender.

Forensic victimology is an applied discipline as opposed to a theorical one. The forensic vicitmologist seeks
to examine, consider, and interpret particular victim evidence in a scientific fashion in order to answer
investigative and forensic questions.

Forensic victimologists serve investigations and court proceedings by endeavouring to:


- Assist with contextualizing allegations of victimization.
- Help support or refute allegations of victimization.
- Help establish the nature of victim exposure to harm or loss.
- Assist with the development of offender modus operandi and motive.
- Help establish an investigate suspect pool.
- Assist with the investigative linkage of unsolved cases.

Forensic victimology's philosophy: victim’s facts are preferable to victim fictions.

In the investigative realm, forensic victimology provides for the consistent recognition, collection,
preservation, and documentation of victim evidence. Questions are asked, context is established, and history
is documented. Helps deciding whether and how criminal charges and civil liabilities may be appropriate.

HISTORY OF VICTIMOLOGY
• The golden age
In victimology, the era thought to have occurred before written, where victims played a direct role in
determining the punishment for actions of another committed against them or their property.
- Retribution as a resolution for criminal matters.
- Blood feuds impact in other individuals (women and children) or following generations.
- Abuse of the power of accusation.

a64b0469ff35958ef4ab887a898bd50bdfbbe91a-8106909

Reservados todos los derechos. No se permite la explotación económica ni la transformación de esta obra. Queda permitida la impresión en su totalidad.
• The dark age
In victimology, the era after the emergence of written laws and structured governments, where all offenses
were viewed as perpetrated against the king or state, not against the victims or their family.
- Separate criminals from society.
- Deter others from acting criminally via ever-harsher punishment.
- Prevent future victimizations separate criminals.
- Victim as a witness → seek remedy for the harms they suffer in civil court.

Reservados todos los derechos. No se permite la explotación económica ni la transformación de esta obra. Queda permitida la impresión en su totalidad.
• Re-emerge of the victim
The era in the middle of the twentieth century, when a small number of people began to recognize that those
who were most affected by criminal acts were rarely involved in the criminal justice process. This led to
the realization that victims were also being overlooked as a source of information about crime and criminals.

Understanding victims.
GENERAL TYPES OF VICTIMS
- Primary victims (those who are directly harmed by the crime).
- Secondary victims (those who are affected by the crime but are not the primary targets).
- Tertiary victims (those who are indirectly affected by the crime, such as family members or witnesses).

TYPES OF VICTIMOLOGY (Stephen Schafer)


1. Unrelated victims (no victim responsibility).
2. Provocative victims (victims shares responsibility).
3. Precipitative victims (some degree of responsibility).
4. Biologically weak victims (no responsibility).
5. Socially weak victims (no responsibility).
6. Self-victimizing (total victim responsibility).
7. Political victims (no responsibility).

DEGREE OF VICTIM’S RESPONSIBILITY IN CRIME


1. Victim provocation (strong responsibility - Instigation).
A woman who suffered years of abused stabs and kills her husband in self-defence as he is beating her.
(The husband is to blame).
2. Precipitation (Significant contribution of the victim).
Victim using the services of a prostitute leaves his wallet on the bed stand and leaves. She decides to keep
the money in her wallet. (It does not justify the crime but makes sense in the realm of things, as he initially
is doing something illegal).
3. Facilitation (Creating an opportunity for crime - Certain degree of negligence).
Leaving the keys in the front door. (Victims carelessly and inadvertently make it easier for a thief to steal).
4. Innocent victim (no responsibility).
A sex offender kidnaps a screaming young girl from a playground and molests her.

VICTIMIZATION THEORIES
• Routine activities theory

a64b0469ff35958ef4ab887a898bd50bdfbbe91a-8106909

si lees esto me debes un besito


• Lifestyle theory
Lifestyle factors and choices can influence the level of exposure to victimisation. This, in turn, has an
influence on the subsequent dynamics of victimisation.

A victim's lifestyle exposure to violence and victimisation is related to the frequency of exposure to
potentially harmful elements in his/her usual environment, his/her personal traits, as well as his/her past
choices.

Reservados todos los derechos. No se permite la explotación económica ni la transformación de esta obra. Queda permitida la impresión en su totalidad.
Assessing lifestyle exposure to different forms of victimisation requires an investigation and assessment of
the victim's personality, and his/her environment:
1. Profession.
2. Psychological problems.
3. Personality traits.

• Victim situational exposure


Victim situational exposure is the amount of actual exposure or vulnerability experienced by the victim to
harm, resulting from their environment and personal traits, at the time of victimization.
This is distinct from lifestyle exposure, which refers to harmful events that exist, generally in a victim's
everyday life.

Notable situational factors


- Time of occurrence.
- Location of occurrence.
- Proximity to criminal activity.
- Proximity to criminal activity, violent or aggressive individuals.
- Number of potential victims.
- Availability of weapons.
- Care and supervision.
- Victim state of mind/ perception.
- Drug and alcohol use.
- Engaging in violent or aggressive behaviour.

Interpreting situational exposure


1. Low situational exposure victims.
Those who are exposed to little or no actual harm or loss immediately prior to victimization.
2. Medium situational exposure victims.
Those who are somewhat exposed to the possibility of suffering harm or loss immediately prior to
victimization.
3. High situational exposure victims.
Those who are routinely exposed to the possibility of suffering harm or loss.
4. Extreme situational exposure.
Describes the state of being a victim.

SOCIAL REPRESENTATION OF VICTIMS


The ideal victim (Christie 1986) is the one generating the most sympathy from society. The ideal victim is:
innocent, vulnerable (physically and socioeconomically), ready to forgive, etc.

The concept of ideal victim is a stereotype, and therefore it might influence social perception on victims and
affect the way they are treated in the media and in the justice system. The personal characteristics of the victim
and the offender and the circumstances surrounding the crime, have strong influences and gives them
legitimate status as victims.

a64b0469ff35958ef4ab887a898bd50bdfbbe91a-8106909

si lees esto me debes un besito


Impact of victimization.
PHYSICAL AND EMOTIONAL EFFECTS OF VICTIMIZATION
After the crime, victims may suffer a range of physical effects including insomnia, appetite disturbance,
lethargy, headaches, muscles tension, nausea, and decreased libido. It is common for these reactions to persist
for some time after the crime has occurred.

FINANCIAL AND SOCIAL EFFECTS OF VICTIMIZATION


The financial consequences of victimization, costs associated with real or threatened criminal harm to an
individual, are many and include medical expenses, costs associated with litigation (lawsuit), counselling costs,
and lost income due to the inability to work or be as productive as before the crime took place.

COPING MECHANISIMS AND RESILIENCE


• Positive coping strategies
- Information seeking
- Self-comparison/ emphasizing the positive aspects of surviving
- Social comparison
- Activism
- Time to heal
- Emotion-focused coping. Getting support

• Negative coping strategies


- Avoiding reminders of the crime
- Behavioural avoidance (Use of drugs or/and alcohol)
- Denial and self-deception (blocking memories)
- Dissociation (break in a person's normal way of thinking)
- Obsessing about the crime
- Self-harm

PPT: Forensic victimology II


The impact of technology on victimization.
Technology has brought many benefits to society, including making our lives easier, more efficient, and more
connected. But also, has brought challenges and risks, particularly when it comes to victimization.

Cybercrimes.
Cybercrime refers to all the activities done with criminal intent in cyberspace. It refers to any crime that
involves a computer/ mobile and a network. The computer may be used in the commission of the crime, or it
might be the target.

Cybercrime can take many forms, including hacking, phishing, and identity theft. These crimes an cause
significant financial losses and emotional distress for victims.

AGAINST PERSONS
• Transmission of child pornography
The transmission of child pornography refers to the distribution, sale, or sharing of images or videos
depicting minors engaged in sexual activity or posing in a sexual manner. It is considered a serious crime
and violation of child protection laws.

Main vocabulary
1. Child pornography: Images or videos that depict minors engaged in sexual activity or posing in a sexual
manner.

a64b0469ff35958ef4ab887a898bd50bdfbbe91a-8106909

Reservados todos los derechos. No se permite la explotación económica ni la transformación de esta obra. Queda permitida la impresión en su totalidad.
2. Exploitation: Taking advantage of someone for personal gain, often in a sexual or financial context.
3. Distribution: Sharing or disseminating something, such as child pornography, to others.
4. Possessions: Having images or videos of child pornography on one's computer.
5. Sexual abuse: Any sexual activity with a minor that is illegal or non-consensual.

• Cyberstalking
Cyberstalking is a type of harassment or threatening behaviour that occurs online, typically through social

Reservados todos los derechos. No se permite la explotación económica ni la transformación de esta obra. Queda permitida la impresión en su totalidad.
media, email, or other forms of digital communication. The term combines "cyber", referring to the internet
or digital technology, and "stalking", which means to pursue persistently and obsessively someone.

Main vocabulary
1. Harassment: Unwanted or threatening behaviour directed towards someone.
2. Obsession: An intense and persistent preoccupation with someone or something.
3. Cyberbullying: The use of digital technology to harass or intimidate someone.
4. Online identity: The persona or image that someone presents online.
5. Personal information: Sensitive details about someone, such as their full name, address, phone number,
or other identifying information.

• Grooming
Grooming is the process by which a person builds relationship with a child, often online, with the intention
of sexually abusing them. Groomers may use various tactics to gain a child's trust, such as pretending to be
someone else, sending gifts or compliments, or offering emotional support.

Main vocabulary
1. Manipulation: The use of deception or coercion to control someone's behaviour or feelings.
2. Trust: The belief that someone is reliable, honest, and has good intentions.
3. Predation: The act of preying on or exploiting someone, often sexual purposes.
4. Child sexual abuse: Any sexual activity with a minor that is illegal or non-consensual.
5. Online grooming: Grooming that takes place through social media or other online platforms.

• Sexting
Sexting refers to sending or receiving of sexually explicit messages, images, or videos through electronic
devices. It can be consensual or non-consensual and can sometimes lead to sextortion.

Main vocabulary
1. Sexual consent: Explicit messages, images, or videos that have sexual themes or content.
2. Consent: Willing agreement to engage in sexual activity or communication.
3. Privacy: The right to keep personal information or images confidential.
4. Revenge porn: Sharing sexually explicit images or videos of someone without their consent, often in
retaliation for a perceived wrong.

• Sextortion
Sextortion is the use of sexual images or videos to blackmail or extort someone. The perpetrator may
threaten to release the images or videos unless the victim provides money, more sexual content, or other
favours.

Main vocabulary
1. Blackmail: Making threats or demands in exchange for not revealing embarrassing or damaging
information.
2. Extortion: Using threats or coercion to obtain something from someone, often money or other resources.

a64b0469ff35958ef4ab887a898bd50bdfbbe91a-8106909

si lees esto me debes un besito


AGAINST PROPERTY
• Hacking
Hacking refers to the act of gaining unauthorized access to a computer system or network. This can be done
for various reasons, including to seal information, to cause damage to the system, or to exploit
vulnerabilities.

Main vocabulary

Reservados todos los derechos. No se permite la explotación económica ni la transformación de esta obra. Queda permitida la impresión en su totalidad.
1. Black hat hacker: A hacker who uses its skills for malicious purposes, such as stealing information or
causing damage to computer systems.
2. White hat hacker: A hacker who uses its skills for ethical purposes, such as identifying vulnerabilities
in computer systems and helping to fix them.
3. Malware: A type of software that is designed to harm computer systems or steal information.
4. Exploit: A vulnerability in a computer system that can be used by hackers to gain unauthorized access.

• Phishing
Phishing is a type of cybercrime that involves using fake emails, messages, or websites to trick individuals
into providing sensitive information, such as passwords or credit card numbers.

Main vocabulary
1. Spoofing: The act of making an email or website appear to be from a trusted source, when in fact it is
not.
2. Social engineering: The use of psychological manipulation to trick individuals into giving away
sensitive information.
3. Spear phishing: A targeted form of phishing that is aimed at a specific individual or group.
4. Two-factor authentication: A security measure that requires users to provide two forms of
identification, such as password and a code sent to their phone, to access an account.

• Identity theft
Identity theft refers to the act of stealing someone's personal information, such as their name, address, or
social security number, in order to commit fraud or other crimes.

Main vocabulary
1. Phishing scams: Phishing scams are a common way for identity thieves to obtain personal information.
2. Skimming: The act of stealing credit card information by using a device to skim the cards magnetic
strip.
3. Dumpster diving: The act of going through someone's trash to find personal information.
4. Synthetic identity theft: The creation of a new identity using a combination of real and fake information.

AGAINST GOVERNMENT
• Cyberterrorism
The use of computer technology to launch attacks on infrastructure or government or military networks,
with the aim of causing widespread disruption or destruction.

Main vocabulary
1. Cyberwarfare: The use of technology to launch attacks on a country or its infrastructure.
2. Information warfare: The use of information and communication technologies to influence or
undermine an adversary's decision-making processes.
3. Critical infrastructure: Essential systems and services that support the functioning of a society, such as
energy, water, transportation, and finance.
4. Advanced Persistent Threat (APT): A group or actor that uses sophisticated techniques to gain
unauthorized access to computer systems or networks over a prolonged period of time.
5. Hacktivism: The use of hacking or other technological means to promote a political or social agenda.

a64b0469ff35958ef4ab887a898bd50bdfbbe91a-8106909

si lees esto me debes un besito


• Other keywords
1. Viruses: A virus is a type of malware that is designed to replicate and spread from one system to another.
It usually infects a computer by attaching itself to a file or program and executing when that file or
program is run.
2. Trojans: A trojan is a type of malware that is disguised as a legitimate program but is actually designed
to steal data, gain unauthorized access, or cause other damage to a system. Unlike viruses, trojans do
not replicate themselves.
3. Rootkits: A rootkit is a type of malware that is designed to hide its presence on a computer system by
modifying system files or components and can be difficult to detect and remove.
4. Spam: Spam is unsolicited, unwanted email messages or messages sent through other electronic
communication channels. They are usually sent in bulk to a large number of recipients and often contain
advertisements or other unwanted content.

Victim’s protection (Secondary victimization).


Secondary victimization is a term used to describe the negative experiences and impact that may be suffered
by individuals who are involved in the response of the crime or traumatic events, particularly those who
provide care to the primary victim. This term can apply to a range of professionals, such as police officers,
first responders, healthcare workers, social workers, and victim advocates, among others.

Keywords
1. Trauma: Second victimization can result in trauma or PTSD for those who are involved in the response to
a crime or traumatic event.
2. Emotional distress: Individuals involved in the response to a crime or traumatic event may experience
emotional distress, including feelings of guilt, anxiety, and depression.
3. Burnout: The stress and emotional toll of responding to traumatic events can lead to burnout for
professionals, including those who work in victim services.
4. Vicarious trauma: Also known a secondary trauma, vicarious trauma occurs when individuals are exposed
to the trauma of others, leading to emotional distress and other negative impacts.
5. Resilience: Building resilience is an important factor mitigating the negative impacts of second
victimization, and may include training, education, and support for those involved in victim services.

Victim’s protection EU
Council Framework Decision of 15 March 2001 on the standing of victims in criminal proceedings
(2001/220/JHA).

EU directive that aims to ensure that victims of crime receive certain minimum rights and protections across
all EU member states. The directive outlines specific measures that member states should take to ensure that
victims are treated with respect, dignity, and sensitivity, and that they have access to the information, support,
and services they need to cope with the impact of the crime.

Key provisions
1. The right to information
Victims have the right to be informed about their rights, the criminal justice process, and the services and
support available to them.
2. The right to access services
Victims have the right to access services such as medical care, psychological support, and legal assistance.
3. The right to protection
Victims have the right to be protected from intimidation, retaliation, and further harm.
4. The right to participation
Victims have the right to participate in criminal proceedings and to have their views and concerns taken
into account.

a64b0469ff35958ef4ab887a898bd50bdfbbe91a-8106909

Reservados todos los derechos. No se permite la explotación económica ni la transformación de esta obra. Queda permitida la impresión en su totalidad.
5. The right to compensation
Victims have the right to seek compensation for the harm they have suffered.
6. The right to be heard
Victims have the right to express their views and concerns, and to have them taken into account by
authorities and the criminal justice system.
7. The right to an interpreter
Victims who do not speak the language of the criminal justice system have the right to an interpreter.

Reservados todos los derechos. No se permite la explotación económica ni la transformación de esta obra. Queda permitida la impresión en su totalidad.
8. The right to privacy
Victims have the right to have their privacy protected, and to have their personal information handled in
accordance with applicable data protection laws.
9. The right to restorative justice
Victims have the right to participate in restorative justice process, where appropriate.
10. The right to appeal
Victims have the right to appeal decisions that affect their rights or interests in criminal proceedings.
11. The right to a speedy trial
Victims have the right to have their case heard without undue delay, and to be informed about the expected
duration of the proceedings.

Victim’s protection services in Spain (Main services for victims of crime).


1. Telephone support services: In Spain, there are several helplines for victims of crime, which provide
advice, information, and emotional support to victims of crime.
2. Legal assistance: Victims of crime have the right to receive free legal assistance in Spain, both for criminal
and civil matters. These services are available through the Bar Associations and other legal assistance
services.
3. Psychological assistance: Victims of crime can receive free psychological assistance through specialized
services, such as Sexual Assault Victim Assistance Centres (CAVAS) and Victim Support Centres
(CAVD).
4. Protection and security: Victims of crime can request protection and security measures for themselves and
their families. These measures can include the assignment of a protection agent, the installation of home
security systems, and police escort.
5. Social assistance: Victims of crime can receive social assistance to cover basic needs and to help overcome
the economic difficulties caused by the crime.
6. Support programs: There are support programs for victims of crime in Spain that offer assistance and
guidance in areas such as job placement, education, and training.
7. Mediation services: Victims of crime can access mediation services to resolve conflicts and repair the harm
caused by the crime.

a64b0469ff35958ef4ab887a898bd50bdfbbe91a-8106909

si lees esto me debes un besito

You might also like